/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_session_id_context.pod | 11 int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx, 13 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx, 18 SSL_CTX_set_session_id_context() sets the context B<sid_ctx> of length 21 SSL_set_session_id_context() sets the context B<sid_ctx> of length 30 must set its own session id context B<sid_ctx> which is used to distinguish 31 the contexts and is stored in exported sessions. The B<sid_ctx> can be 44 The maximum length of the B<sid_ctx> is limited to 69 The length B<sid_ctx_len> of the session id context B<sid_ctx> exceeded
|
H A D | SSL_SESSION_get0_id_context.pod | 15 int SSL_SESSION_set1_id_context(SSL_SESSION *s, const unsigned char *sid_ctx, 31 B<sid_ctx> and associates it with the session B<s>. The length of the ID context
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 331 return s->sid_ctx; in SSL_SESSION_get0_id_context() 498 if (s->sid_ctx_length > sizeof(ss->sid_ctx)) { in ssl_get_new_session() 503 memcpy(ss->sid_ctx, s->sid_ctx, s->sid_ctx_length); in ssl_get_new_session() 662 || memcmp(ret->sid_ctx, s->sid_ctx, ret->sid_ctx_length)) { in ssl_get_prev_session() 1092 int SSL_SESSION_set1_id_context(SSL_SESSION *s, const unsigned char *sid_ctx, in SSL_SESSION_set1_id_context() argument 1100 if (sid_ctx != s->sid_ctx) in SSL_SESSION_set1_id_context() 1101 memcpy(s->sid_ctx, sid_ctx, sid_ctx_len); in SSL_SESSION_set1_id_context()
|
H A D | ssl_asn1.c | 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 163 ssl_session_oinit(&as.session_id_context, &sid_ctx, in i2d_SSL_SESSION() 164 in->sid_ctx, in->sid_ctx_length); in i2d_SSL_SESSION() 319 if (!ssl_session_memcpy(ret->sid_ctx, &ret->sid_ctx_length, in d2i_SSL_SESSION()
|
H A D | ssl_lib.c | 752 if (!ossl_assert(s->sid_ctx_length <= sizeof(s->sid_ctx))) in SSL_new() 754 memcpy(&s->sid_ctx, &ctx->sid_ctx, sizeof(s->sid_ctx)); in SSL_new() 889 int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx, in SSL_CTX_set_session_id_context() argument 897 memcpy(ctx->sid_ctx, sid_ctx, sid_ctx_len); in SSL_CTX_set_session_id_context() 902 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx, in SSL_set_session_id_context() argument 910 memcpy(ssl->sid_ctx, sid_ctx, sid_ctx_len); in SSL_set_session_id_context() 1658 if (!SSL_set_session_id_context(t, f->sid_ctx, (int)f->sid_ctx_length)) { in SSL_copy_session_id() 4130 if (!SSL_set_session_id_context(ret, s->sid_ctx, in SSL_dup() 4376 if (!ossl_assert(ssl->sid_ctx_length <= sizeof(ssl->sid_ctx))) in SSL_set_SSL_CTX() 4387 (memcmp(ssl->sid_ctx, ssl->ctx->sid_ctx, ssl->sid_ctx_length) == 0)) { in SSL_set_SSL_CTX() [all …]
|
H A D | ssl_txt.c | 72 if (BIO_printf(bp, "%02X", x->sid_ctx[i]) <= 0) in SSL_SESSION_print()
|
H A D | ssl_local.h | 575 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member 986 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member 1502 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 1095 memcpy(sess->sid_ctx, s->sid_ctx, s->sid_ctx_length); in tls_parse_ctos_psk()
|
H A D | statem_clnt.c | 1563 || memcmp(s->session->sid_ctx, s->sid_ctx, s->sid_ctx_length)) { in tls_process_server_hello()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ssl.h | 1755 const unsigned char *sid_ctx, 1837 const unsigned char *sid_ctx, 1843 __owur int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
|
H A D | ssl.h.in | 1683 const unsigned char *sid_ctx, 1765 const unsigned char *sid_ctx, 1771 __owur int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
|
/freebsd/contrib/unbound/services/ |
H A D | listen_dnsport.c | 4605 char* sid_ctx = "unbound server"; in doq_ctx_server_setup() local 4650 SSL_CTX_set_session_id_context(ctx, (void*)sid_ctx, strlen(sid_ctx)); in doq_ctx_server_setup()
|