/external/boringssl/src/ssl/ |
D | ssl_session.cc | 193 UniquePtr<SSL_SESSION> new_session = ssl_session_new(session->x509_method); in SSL_SESSION_dup() local 194 if (!new_session) { in SSL_SESSION_dup() 198 new_session->is_server = session->is_server; in SSL_SESSION_dup() 199 new_session->ssl_version = session->ssl_version; in SSL_SESSION_dup() 200 new_session->is_quic = session->is_quic; in SSL_SESSION_dup() 201 new_session->sid_ctx_length = session->sid_ctx_length; in SSL_SESSION_dup() 202 OPENSSL_memcpy(new_session->sid_ctx, session->sid_ctx, session->sid_ctx_length); in SSL_SESSION_dup() 205 new_session->secret_length = session->secret_length; in SSL_SESSION_dup() 206 OPENSSL_memcpy(new_session->secret, session->secret, session->secret_length); in SSL_SESSION_dup() 207 new_session->cipher = session->cipher; in SSL_SESSION_dup() [all …]
|
D | tls13_server.cc | 117 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets() 121 SSL_SESSION_dup(hs->new_session.get(), SSL_SESSION_INCLUDE_NONAUTH)); in add_new_session_tickets() 366 hs->new_session = in do_select_session() 368 if (hs->new_session == nullptr) { in do_select_session() 376 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_select_session() 416 } else if (hs->new_session->has_application_settings != in do_select_session() 418 MakeConstSpan(hs->new_session->local_application_settings) != in do_select_session() 436 hs->new_session->cipher = hs->new_cipher; in do_select_session() 441 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_select_session() 450 hs->new_session->has_application_settings && in do_select_session() [all …]
|
D | tls13_client.cc | 93 hs->new_session.get(), in close_early_data() 392 hs->new_session = in do_read_server_hello() 394 if (!hs->new_session) { in do_read_server_hello() 401 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_read_server_hello() 408 hs->new_session->cipher = cipher; in do_read_server_hello() 417 hs, MakeConstSpan(hs->new_session->secret, in do_read_server_hello() 418 hs->new_session->secret_length))) { in do_read_server_hello() 453 hs->new_session.get(), in do_read_server_hello() 460 hs->new_session.get(), in do_read_server_hello() 492 if (hs->early_session->cipher != hs->new_session->cipher) { in do_read_encrypted_extensions() [all …]
|
D | handshake_server.cc | 790 hs->new_session->session_id_length = 0; in do_select_parameters() 803 hs->new_session->cipher = hs->new_cipher; in do_select_parameters() 820 hs->new_session->verify_result = X509_V_OK; in do_select_parameters() 904 const SSL_SESSION *session = hs->new_session.get(); in do_send_server_hello() 999 hs->new_session->group_id = group_id; in do_send_server_certificate() 1156 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_client_certificate() 1158 ? hs->new_session->peer_sha256 in do_read_client_certificate() 1166 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_client_certificate() 1172 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in do_read_client_certificate() 1185 hs->new_session->verify_result = X509_V_OK; in do_read_client_certificate() [all …]
|
D | handshake.cc | 301 sk_CRYPTO_BUFFER_num(hs->new_session->certs.get())) { in ssl_verify_peer_cert() 307 for (size_t i = 0; i < sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()); in ssl_verify_peer_cert() 312 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), i); in ssl_verify_peer_cert() 327 hs->new_session->ocsp_response = UpRef(prev_session->ocsp_response); in ssl_verify_peer_cert() 328 hs->new_session->signed_cert_timestamp_list = in ssl_verify_peer_cert() 330 hs->new_session->verify_result = prev_session->verify_result; in ssl_verify_peer_cert() 340 hs->new_session->verify_result = X509_V_OK; in ssl_verify_peer_cert() 348 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION; in ssl_verify_peer_cert() 355 hs->new_session.get(), hs, &alert) in ssl_verify_peer_cert() 546 if (hs->new_session) { in ssl_handshake_session() [all …]
|
D | tls13_both.cc | 224 hs->new_session->peer_sha256); in tls13_process_certificate() 273 hs->new_session->ocsp_response.reset( in tls13_process_certificate() 275 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate() 296 hs->new_session->signed_cert_timestamp_list.reset( in tls13_process_certificate() 298 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in tls13_process_certificate() 313 hs->new_session->certs = std::move(certs); in tls13_process_certificate() 315 if (!ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in tls13_process_certificate() 321 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in tls13_process_certificate() 330 hs->new_session->verify_result = X509_V_OK; in tls13_process_certificate() 336 hs->new_session->peer_sha256_valid = retain_sha256; in tls13_process_certificate() [all …]
|
D | handshake_client.cc | 671 hs->new_session->session_id_length = CBS_len(&session_id); in do_read_server_hello() 672 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id), in do_read_server_hello() 715 hs->new_session->cipher = cipher; in do_read_server_hello() 820 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_server_certificate() 826 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0 || in do_read_server_certificate() 828 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_server_certificate() 836 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), 0))) { in do_read_server_certificate() 883 hs->new_session->ocsp_response.reset( in do_read_certificate_status() 885 if (hs->new_session->ocsp_response == nullptr) { in do_read_certificate_status() 1012 hs->new_session->group_id = group_id; in do_read_server_key_exchange() [all …]
|
D | handoff.cc | 336 session = hs->new_session.get(); in SSL_serialize_handback() 338 session = s3->session_reused ? ssl->session.get() : hs->new_session.get(); in SSL_serialize_handback() 485 hs->new_session = in SSL_apply_handback() 487 session = hs->new_session.get(); in SSL_apply_handback() 692 hs->new_session.get(), in SSL_apply_handback()
|
D | t1_lib.cc | 1377 hs->new_session->signed_cert_timestamp_list.reset( in ext_sct_parse_serverhello() 1379 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in ext_sct_parse_serverhello() 2397 hs->new_session->group_id = group_id; in ssl_ext_key_share_parse_serverhello() 2484 hs->new_session->group_id = group_id; in ssl_ext_key_share_add_serverhello() 3153 if (!hs->new_session->peer_application_settings.CopyFrom(*contents)) { in ext_alps_parse_serverhello() 3158 hs->new_session->has_application_settings = true; in ext_alps_parse_serverhello() 3166 if (hs->new_session == nullptr || in ext_alps_add_serverhello() 3167 !hs->new_session->has_application_settings || in ext_alps_add_serverhello() 3176 hs->new_session->local_application_settings.data(), in ext_alps_add_serverhello() 3177 hs->new_session->local_application_settings.size()) || in ext_alps_add_serverhello() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_session.cc | 193 UniquePtr<SSL_SESSION> new_session = ssl_session_new(session->x509_method); in SSL_SESSION_dup() local 194 if (!new_session) { in SSL_SESSION_dup() 198 new_session->is_server = session->is_server; in SSL_SESSION_dup() 199 new_session->ssl_version = session->ssl_version; in SSL_SESSION_dup() 200 new_session->is_quic = session->is_quic; in SSL_SESSION_dup() 201 new_session->sid_ctx_length = session->sid_ctx_length; in SSL_SESSION_dup() 202 OPENSSL_memcpy(new_session->sid_ctx, session->sid_ctx, session->sid_ctx_length); in SSL_SESSION_dup() 205 new_session->master_key_length = session->master_key_length; in SSL_SESSION_dup() 206 OPENSSL_memcpy(new_session->master_key, session->master_key, in SSL_SESSION_dup() 208 new_session->cipher = session->cipher; in SSL_SESSION_dup() [all …]
|
D | handshake_server.cc | 784 hs->new_session->session_id_length = 0; in do_select_parameters() 797 hs->new_session->cipher = hs->new_cipher; in do_select_parameters() 814 hs->new_session->verify_result = X509_V_OK; in do_select_parameters() 898 const SSL_SESSION *session = hs->new_session.get(); in do_send_server_hello() 993 hs->new_session->group_id = group_id; in do_send_server_certificate() 1150 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_client_certificate() 1152 ? hs->new_session->peer_sha256 in do_read_client_certificate() 1160 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_client_certificate() 1166 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in do_read_client_certificate() 1179 hs->new_session->verify_result = X509_V_OK; in do_read_client_certificate() [all …]
|
D | tls13_server.cc | 117 ssl_session_rebase_time(ssl, hs->new_session.get()); in add_new_session_tickets() 121 SSL_SESSION_dup(hs->new_session.get(), SSL_SESSION_INCLUDE_NONAUTH)); in add_new_session_tickets() 368 hs->new_session = in do_select_session() 370 if (hs->new_session == nullptr) { in do_select_session() 407 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_select_session() 421 hs->new_session->cipher = hs->new_cipher; in do_select_session() 424 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_select_session() 443 hs, MakeConstSpan(hs->new_session->master_key, in do_select_session() 444 hs->new_session->master_key_length))) { in do_select_session() 567 if (!tls13_verify_psk_binder(hs, hs->new_session.get(), msg, &binders)) { in do_read_second_client_hello() [all …]
|
D | tls13_both.cc | 224 hs->new_session->peer_sha256); in tls13_process_certificate() 274 hs->new_session->ocsp_response.reset( in tls13_process_certificate() 276 if (hs->new_session->ocsp_response == nullptr) { in tls13_process_certificate() 297 hs->new_session->signed_cert_timestamp_list.reset( in tls13_process_certificate() 299 if (hs->new_session->signed_cert_timestamp_list == nullptr) { in tls13_process_certificate() 314 hs->new_session->certs = std::move(certs); in tls13_process_certificate() 316 if (!ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in tls13_process_certificate() 322 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0) { in tls13_process_certificate() 331 hs->new_session->verify_result = X509_V_OK; in tls13_process_certificate() 337 hs->new_session->peer_sha256_valid = retain_sha256; in tls13_process_certificate() [all …]
|
D | handshake.cc | 299 sk_CRYPTO_BUFFER_num(hs->new_session->certs.get())) { in ssl_verify_peer_cert() 305 for (size_t i = 0; i < sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()); in ssl_verify_peer_cert() 310 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), i); in ssl_verify_peer_cert() 325 hs->new_session->ocsp_response = UpRef(prev_session->ocsp_response); in ssl_verify_peer_cert() 326 hs->new_session->signed_cert_timestamp_list = in ssl_verify_peer_cert() 328 hs->new_session->verify_result = prev_session->verify_result; in ssl_verify_peer_cert() 338 hs->new_session->verify_result = X509_V_OK; in ssl_verify_peer_cert() 346 hs->new_session->verify_result = X509_V_ERR_APPLICATION_VERIFICATION; in ssl_verify_peer_cert() 353 hs->new_session.get(), hs, &alert) in ssl_verify_peer_cert()
|
D | handshake_client.cc | 675 hs->new_session->session_id_length = CBS_len(&session_id); in do_read_server_hello() 676 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id), in do_read_server_hello() 719 hs->new_session->cipher = cipher; in do_read_server_hello() 824 if (!ssl_parse_cert_chain(&alert, &hs->new_session->certs, &hs->peer_pubkey, in do_read_server_certificate() 830 if (sk_CRYPTO_BUFFER_num(hs->new_session->certs.get()) == 0 || in do_read_server_certificate() 832 !ssl->ctx->x509_method->session_cache_objects(hs->new_session.get())) { in do_read_server_certificate() 840 sk_CRYPTO_BUFFER_value(hs->new_session->certs.get(), 0))) { in do_read_server_certificate() 887 hs->new_session->ocsp_response.reset( in do_read_certificate_status() 889 if (hs->new_session->ocsp_response == nullptr) { in do_read_certificate_status() 1016 hs->new_session->group_id = group_id; in do_read_server_key_exchange() [all …]
|
D | tls13_client.cc | 92 hs->new_session.get(), in close_early_data() 393 hs->new_session = in do_read_server_hello() 395 if (!hs->new_session) { in do_read_server_hello() 402 ssl_session_renew_timeout(ssl, hs->new_session.get(), in do_read_server_hello() 409 hs->new_session->cipher = cipher; in do_read_server_hello() 418 hs, MakeConstSpan(hs->new_session->master_key, in do_read_server_hello() 419 hs->new_session->master_key_length))) { in do_read_server_hello() 454 hs->new_session.get(), in do_read_server_hello() 461 hs->new_session.get(), in do_read_server_hello() 493 if (!hs->new_session->early_alpn.CopyFrom(ssl->s3->alpn_selected)) { in do_read_encrypted_extensions() [all …]
|
D | handoff.cc | 301 session = hs->new_session.get(); in SSL_serialize_handback() 303 session = s3->session_reused ? ssl->session.get() : hs->new_session.get(); in SSL_serialize_handback() 450 hs->new_session = in SSL_apply_handback() 452 session = hs->new_session.get(); in SSL_apply_handback() 657 hs->new_session.get(), in SSL_apply_handback()
|
/external/webrtc/rtc_base/ |
D | openssl_session_cache.cc | 39 SSL_SESSION* new_session) { in AddSession() argument 42 sessions_[hostname] = new_session; in AddSession()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/test/ |
D | test_state.cc | 69 UniquePtr<SSL_SESSION> new_session = SSL_SESSION_dup( in ssl_ctx_add_session() local 71 if (new_session != nullptr) { in ssl_ctx_add_session() 72 SSL_CTX_add_session(ctx, new_session.get()); in ssl_ctx_add_session()
|
D | test_state.h | 56 bssl::UniquePtr<SSL_SESSION> new_session; member
|
/external/boringssl/src/ssl/test/ |
D | test_state.cc | 69 UniquePtr<SSL_SESSION> new_session = SSL_SESSION_dup( in ssl_ctx_add_session() local 71 if (new_session != nullptr) { in ssl_ctx_add_session() 72 SSL_CTX_add_session(ctx, new_session.get()); in ssl_ctx_add_session()
|
D | test_state.h | 56 bssl::UniquePtr<SSL_SESSION> new_session; member
|
/external/tensorflow/tensorflow/cc/client/ |
D | client_session.cc | 54 Session* new_session; in ClientSession() local 55 Status status = NewSession(session_options, &new_session); in ClientSession() 57 impl_.reset(new Impl(new_session, scope.graph_as_shared_ptr())); in ClientSession()
|
/external/crosvm/devices/src/virtio/video/decoder/backend/ |
D | mod.rs | 105 fn new_session(&self, format: Format) -> VideoResult<Self::Session>; in new_session() method
|
/external/toybox/toys/pending/ |
D | telnetd.c | 148 static int new_session(int sockfd) in new_session() function 286 pty_fd = new_session(master_fd); //master_fd = 0 in telnetd_main() 333 pty_fd = new_session(new_fd); in telnetd_main()
|