Home
last modified time | relevance | path

Searched refs:sid_ctx (Results 1 – 12 of 12) sorted by relevance

/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_session_id_context.pod11 int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx,
13 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
18 SSL_CTX_set_session_id_context() sets the context B<sid_ctx> of length
21 SSL_set_session_id_context() sets the context B<sid_ctx> of length
30 must set its own session id context B<sid_ctx> which is used to distinguish
31 the contexts and is stored in exported sessions. The B<sid_ctx> can be
44 The maximum length of the B<sid_ctx> is limited to
69 The length B<sid_ctx_len> of the session id context B<sid_ctx> exceeded
H A DSSL_SESSION_get0_id_context.pod15 int SSL_SESSION_set1_id_context(SSL_SESSION *s, const unsigned char *sid_ctx,
31 B<sid_ctx> and associates it with the session B<s>. The length of the ID context
/freebsd/crypto/openssl/ssl/
H A Dssl_sess.c331 return s->sid_ctx; in SSL_SESSION_get0_id_context()
498 if (s->sid_ctx_length > sizeof(ss->sid_ctx)) { in ssl_get_new_session()
503 memcpy(ss->sid_ctx, s->sid_ctx, s->sid_ctx_length); in ssl_get_new_session()
662 || memcmp(ret->sid_ctx, s->sid_ctx, ret->sid_ctx_length)) { in ssl_get_prev_session()
1092 int SSL_SESSION_set1_id_context(SSL_SESSION *s, const unsigned char *sid_ctx, in SSL_SESSION_set1_id_context() argument
1100 if (sid_ctx != s->sid_ctx) in SSL_SESSION_set1_id_context()
1101 memcpy(s->sid_ctx, sid_ctx, sid_ctx_len); in SSL_SESSION_set1_id_context()
H A Dssl_asn1.c113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local
163 ssl_session_oinit(&as.session_id_context, &sid_ctx, in i2d_SSL_SESSION()
164 in->sid_ctx, in->sid_ctx_length); in i2d_SSL_SESSION()
319 if (!ssl_session_memcpy(ret->sid_ctx, &ret->sid_ctx_length, in d2i_SSL_SESSION()
H A Dssl_lib.c752 if (!ossl_assert(s->sid_ctx_length <= sizeof(s->sid_ctx))) in SSL_new()
754 memcpy(&s->sid_ctx, &ctx->sid_ctx, sizeof(s->sid_ctx)); in SSL_new()
889 int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx, in SSL_CTX_set_session_id_context() argument
897 memcpy(ctx->sid_ctx, sid_ctx, sid_ctx_len); in SSL_CTX_set_session_id_context()
902 int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx, in SSL_set_session_id_context() argument
910 memcpy(ssl->sid_ctx, sid_ctx, sid_ctx_len); in SSL_set_session_id_context()
1658 if (!SSL_set_session_id_context(t, f->sid_ctx, (int)f->sid_ctx_length)) { in SSL_copy_session_id()
4130 if (!SSL_set_session_id_context(ret, s->sid_ctx, in SSL_dup()
4376 if (!ossl_assert(ssl->sid_ctx_length <= sizeof(ssl->sid_ctx))) in SSL_set_SSL_CTX()
4387 (memcmp(ssl->sid_ctx, ssl->ctx->sid_ctx, ssl->sid_ctx_length) == 0)) { in SSL_set_SSL_CTX()
[all …]
H A Dssl_txt.c72 if (BIO_printf(bp, "%02X", x->sid_ctx[i]) <= 0) in SSL_SESSION_print()
H A Dssl_local.h575 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member
986 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member
1502 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; member
/freebsd/crypto/openssl/ssl/statem/
H A Dextensions_srvr.c1095 memcpy(sess->sid_ctx, s->sid_ctx, s->sid_ctx_length); in tls_parse_ctos_psk()
H A Dstatem_clnt.c1563 || memcmp(s->session->sid_ctx, s->sid_ctx, s->sid_ctx_length)) { in tls_process_server_hello()
/freebsd/crypto/openssl/include/openssl/
H A Dssl.h1755 const unsigned char *sid_ctx,
1837 const unsigned char *sid_ctx,
1843 __owur int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
H A Dssl.h.in1683 const unsigned char *sid_ctx,
1765 const unsigned char *sid_ctx,
1771 __owur int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx,
/freebsd/contrib/unbound/services/
H A Dlisten_dnsport.c4605 char* sid_ctx = "unbound server"; in doq_ctx_server_setup() local
4650 SSL_CTX_set_session_id_context(ctx, (void*)sid_ctx, strlen(sid_ctx)); in doq_ctx_server_setup()