/freebsd/crypto/openssl/util/perl/TLSProxy/ |
H A D | ServerHello.pm | 39 $self->{session_id_len} = 0; 57 my $session_id_len = 0; 59 $session_id_len = unpack('C', substr($self->data, $ptr)); 61 $session = substr($self->data, $ptr, $session_id_len); 62 $ptr += $session_id_len; 113 $self->session_id_len($session_id_len); 124 print " Session ID Len:".$session_id_len."\n"; 147 $data .= pack('C', $self->session_id_len); 186 sub session_id_len subroutine 190 $self->{session_id_len} = shift; [all …]
|
H A D | ClientHello.pm | 34 $self->{session_id_len} = 0; 53 my $session_id_len = unpack('C', substr($self->data, $ptr)); 55 my $session = substr($self->data, $ptr, $session_id_len); 56 $ptr += $session_id_len; 85 $self->session_id_len($session_id_len); 97 print " Session ID Len:".$session_id_len."\n"; 139 $data .= pack('C', $self->session_id_len); 184 sub session_id_len subroutine 188 $self->{session_id_len} = shift; 190 return $self->{session_id_len};
|
/freebsd/crypto/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 50 size_t session_id_len; member 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument 255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
|
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_server_write.c | 68 conn->session_id_len = TLS_SESSION_ID_MAX_LEN; in tls_write_server_hello() 69 if (random_get_bytes(conn->session_id, conn->session_id_len)) { in tls_write_server_hello() 75 conn->session_id, conn->session_id_len); in tls_write_server_hello() 94 *pos++ = conn->session_id_len; in tls_write_server_hello() 95 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_write_server_hello() 96 pos += conn->session_id_len; in tls_write_server_hello()
|
H A D | tlsv1_client_read.c | 155 if (conn->session_id_len && conn->session_id_len == *pos && in tls_process_server_hello() 156 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { in tls_process_server_hello() 157 pos += 1 + conn->session_id_len; in tls_process_server_hello() 161 conn->session_id_len = *pos; in tls_process_server_hello() 163 os_memcpy(conn->session_id, pos, conn->session_id_len); in tls_process_server_hello() 164 pos += conn->session_id_len; in tls_process_server_hello() 167 conn->session_id, conn->session_id_len); in tls_process_server_hello()
|
H A D | tlsv1_server_i.h | 25 size_t session_id_len; member
|
H A D | tlsv1_client_i.h | 24 size_t session_id_len; member
|
H A D | tlsv1_client_write.c | 101 *pos++ = conn->session_id_len; in tls_send_client_hello() 102 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_send_client_hello() 103 pos += conn->session_id_len; in tls_send_client_hello()
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 70-test_tls13alerts.t | 54 ${$proxy->message_list}[1]->session_id_len(1);
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1379 size_t session_id_len; in tls_process_server_hello() local 1422 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello() 1423 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello() 1424 || session_id_len > SSL3_SESSION_ID_SIZE) { in tls_process_server_hello() 1470 if (session_id_len != s->tmp_session_id_len in tls_process_server_hello() 1472 session_id_len) != 0) { in tls_process_server_hello() 1554 if (session_id_len != 0 in tls_process_server_hello() 1555 && session_id_len == s->session->session_id_length in tls_process_server_hello() 1557 session_id_len) == 0) in tls_process_server_hello() 1593 s->session->session_id_length = session_id_len; in tls_process_server_hello() [all …]
|
H A D | statem_srvr.c | 1459 unsigned int ciphersuite_len, session_id_len, challenge_len; in tls_process_client_hello() local 1463 || !PACKET_get_net_2(pkt, &session_id_len) in tls_process_client_hello() 1469 if (session_id_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in tls_process_client_hello() 1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello() 1483 clienthello->session_id_len = session_id_len; in tls_process_client_hello() 1509 &clienthello->session_id_len)) { in tls_process_client_hello() 1808 s->clienthello->session_id_len); in tls_early_post_process_client_hello() 1809 s->tmp_session_id_len = s->clienthello->session_id_len; in tls_early_post_process_client_hello()
|
/freebsd/contrib/bearssl/tools/ |
H A D | sslio.c | 121 for (u = 0; u < slot.session_id_len; u ++) { in run_command() 131 for (u = 0; u < slot.session_id_len; u ++) { in run_command()
|
H A D | twrch.c | 1009 if (pp.session_id_len == 32) { in do_twrch()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap.c | 693 size_t session_id_len = 0; in eap_peer_erp_init() local 740 session_id_len = ext_session_id_len; in eap_peer_erp_init() 743 session_id_len = sm->eapSessionIdLen; in eap_peer_erp_init() 746 if (!session_id || session_id_len == 0) { in eap_peer_erp_init() 753 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, in eap_peer_erp_init()
|
/freebsd/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 512 size_t session_id_len, emsk_len; in SM_STATE() local 519 sm->eap_proxy, &session_id_len); in SM_STATE() 523 session_id_len, emsk, in SM_STATE()
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_ssl.h | 814 unsigned char session_id_len; member 2859 cc->eng.session.session_id_len = 0; in br_ssl_client_forget_session()
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_client.t0 | 440 39 addr-session_id_len get8 + addr-suites_num get8 1 << + 470 addr-session_id addr-session_id_len get8 write-blob-head8 674 idlen addr-session_id_len get8 = idlen 0 > and if 682 idlen addr-session_id_len set8
|
H A D | ssl_hs_server.c | 525 …T2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, session_id_len)), 1242 if (ENG->session.session_id_len == 32 in br_ssl_hs_server_run()
|
H A D | ssl_hs_server.t0 | 596 if (ENG->session.session_id_len == 32 634 dup addr-session_id_len set8 859 32 addr-session_id_len set8
|
H A D | ssl_hs_client.c | 475 …T2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, session_id_len)),
|
H A D | ssl_hs_common.t0 | 188 addr-session-field: session_id_len
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 639 if (hello->session_id_len > 0) { in ssl_get_prev_session() 642 hello->session_id_len); in ssl_get_prev_session()
|
H A D | ssl_local.h | 728 size_t session_id_len; member
|
H A D | t1_lib.c | 1778 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client()
|
H A D | ssl_lib.c | 5425 return s->clienthello->session_id_len; in SSL_client_hello_get0_session_id()
|