Home
last modified time | relevance | path

Searched refs:session_id_len (Results 1 – 25 of 25) sorted by relevance

/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DServerHello.pm39 $self->{session_id_len} = 0;
57 my $session_id_len = 0;
59 $session_id_len = unpack('C', substr($self->data, $ptr));
61 $session = substr($self->data, $ptr, $session_id_len);
62 $ptr += $session_id_len;
113 $self->session_id_len($session_id_len);
124 print " Session ID Len:".$session_id_len."\n";
147 $data .= pack('C', $self->session_id_len);
186 sub session_id_len subroutine
190 $self->{session_id_len} = shift;
[all …]
H A DClientHello.pm34 $self->{session_id_len} = 0;
53 my $session_id_len = unpack('C', substr($self->data, $ptr));
55 my $session = substr($self->data, $ptr, $session_id_len);
56 $ptr += $session_id_len;
85 $self->session_id_len($session_id_len);
97 print " Session ID Len:".$session_id_len."\n";
139 $data .= pack('C', $self->session_id_len);
184 sub session_id_len subroutine
188 $self->{session_id_len} = shift;
190 return $self->{session_id_len};
/freebsd/crypto/openssl/providers/implementations/kdfs/
H A Dsshkdf.c38 const unsigned char *session_id, size_t session_id_len,
50 size_t session_id_len; member
85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset()
131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive()
158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params()
230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument
255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_server_write.c68 conn->session_id_len = TLS_SESSION_ID_MAX_LEN; in tls_write_server_hello()
69 if (random_get_bytes(conn->session_id, conn->session_id_len)) { in tls_write_server_hello()
75 conn->session_id, conn->session_id_len); in tls_write_server_hello()
94 *pos++ = conn->session_id_len; in tls_write_server_hello()
95 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_write_server_hello()
96 pos += conn->session_id_len; in tls_write_server_hello()
H A Dtlsv1_client_read.c155 if (conn->session_id_len && conn->session_id_len == *pos && in tls_process_server_hello()
156 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { in tls_process_server_hello()
157 pos += 1 + conn->session_id_len; in tls_process_server_hello()
161 conn->session_id_len = *pos; in tls_process_server_hello()
163 os_memcpy(conn->session_id, pos, conn->session_id_len); in tls_process_server_hello()
164 pos += conn->session_id_len; in tls_process_server_hello()
167 conn->session_id, conn->session_id_len); in tls_process_server_hello()
H A Dtlsv1_server_i.h25 size_t session_id_len; member
H A Dtlsv1_client_i.h24 size_t session_id_len; member
H A Dtlsv1_client_write.c101 *pos++ = conn->session_id_len; in tls_send_client_hello()
102 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_send_client_hello()
103 pos += conn->session_id_len; in tls_send_client_hello()
/freebsd/crypto/openssl/test/recipes/
H A D70-test_tls13alerts.t54 ${$proxy->message_list}[1]->session_id_len(1);
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_clnt.c1379 size_t session_id_len; in tls_process_server_hello() local
1422 session_id_len = PACKET_remaining(&session_id); in tls_process_server_hello()
1423 if (session_id_len > sizeof(s->session->session_id) in tls_process_server_hello()
1424 || session_id_len > SSL3_SESSION_ID_SIZE) { in tls_process_server_hello()
1470 if (session_id_len != s->tmp_session_id_len in tls_process_server_hello()
1472 session_id_len) != 0) { in tls_process_server_hello()
1554 if (session_id_len != 0 in tls_process_server_hello()
1555 && session_id_len == s->session->session_id_length in tls_process_server_hello()
1557 session_id_len) == 0) in tls_process_server_hello()
1593 s->session->session_id_length = session_id_len; in tls_process_server_hello()
[all …]
H A Dstatem_srvr.c1459 unsigned int ciphersuite_len, session_id_len, challenge_len; in tls_process_client_hello() local
1463 || !PACKET_get_net_2(pkt, &session_id_len) in tls_process_client_hello()
1469 if (session_id_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in tls_process_client_hello()
1476 || !PACKET_copy_bytes(pkt, clienthello->session_id, session_id_len) in tls_process_client_hello()
1483 clienthello->session_id_len = session_id_len; in tls_process_client_hello()
1509 &clienthello->session_id_len)) { in tls_process_client_hello()
1808 s->clienthello->session_id_len); in tls_early_post_process_client_hello()
1809 s->tmp_session_id_len = s->clienthello->session_id_len; in tls_early_post_process_client_hello()
/freebsd/contrib/bearssl/tools/
H A Dsslio.c121 for (u = 0; u < slot.session_id_len; u ++) { in run_command()
131 for (u = 0; u < slot.session_id_len; u ++) { in run_command()
H A Dtwrch.c1009 if (pp.session_id_len == 32) { in do_twrch()
/freebsd/contrib/wpa/src/eap_peer/
H A Deap.c693 size_t session_id_len = 0; in eap_peer_erp_init() local
740 session_id_len = ext_session_id_len; in eap_peer_erp_init()
743 session_id_len = sm->eapSessionIdLen; in eap_peer_erp_init()
746 if (!session_id || session_id_len == 0) { in eap_peer_erp_init()
753 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, in eap_peer_erp_init()
/freebsd/contrib/wpa/src/eapol_supp/
H A Deapol_supp_sm.c512 size_t session_id_len, emsk_len; in SM_STATE() local
519 sm->eap_proxy, &session_id_len); in SM_STATE()
523 session_id_len, emsk, in SM_STATE()
/freebsd/contrib/bearssl/inc/
H A Dbearssl_ssl.h814 unsigned char session_id_len; member
2859 cc->eng.session.session_id_len = 0; in br_ssl_client_forget_session()
/freebsd/contrib/bearssl/src/ssl/
H A Dssl_hs_client.t0440 39 addr-session_id_len get8 + addr-suites_num get8 1 << +
470 addr-session_id addr-session_id_len get8 write-blob-head8
674 idlen addr-session_id_len get8 = idlen 0 > and if
682 idlen addr-session_id_len set8
H A Dssl_hs_server.c525 …T2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, session_id_len)),
1242 if (ENG->session.session_id_len == 32 in br_ssl_hs_server_run()
H A Dssl_hs_server.t0596 if (ENG->session.session_id_len == 32
634 dup addr-session_id_len set8
859 32 addr-session_id_len set8
H A Dssl_hs_client.c475 …T2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, session_id_len)),
H A Dssl_hs_common.t0188 addr-session-field: session_id_len
/freebsd/crypto/openssl/ssl/
H A Dssl_sess.c639 if (hello->session_id_len > 0) { in ssl_get_prev_session()
642 hello->session_id_len); in ssl_get_prev_session()
H A Dssl_local.h728 size_t session_id_len; member
H A Dt1_lib.c1778 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client()
H A Dssl_lib.c5425 return s->clienthello->session_id_len; in SSL_client_hello_get0_session_id()