• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10.1/OpenSSL098-52/src/ssl/

Lines Matching refs:session

270 					/* receive renewed session ticket */
413 s->session->cipher=s->s3->tmp.new_cipher;
415 s->session->compress_meth=0;
418 s->session->compress_meth=0;
420 s->session->compress_meth=
599 SSL_SESSION *sess = s->session;
612 /* else use the pre-loaded session */
635 i=s->session->session_id_length;
639 if (i > (int)sizeof(s->session->session_id))
644 memcpy(p,s->session->session_id,i);
760 /* get the session-id */
763 if ((j > sizeof s->session->session_id) || (j > SSL3_SESSION_ID_SIZE))
770 if (j != 0 && j == s->session->session_id_length
771 && memcmp(p,s->session->session_id,j) == 0)
773 if(s->sid_ctx_length != s->session->sid_ctx_length
774 || memcmp(s->session->sid_ctx,s->sid_ctx,s->sid_ctx_length))
786 /* If we were trying for session-id reuse, make a new
789 if (s->session->session_id_length > 0)
797 s->session->session_id_length=j;
798 memcpy(s->session->session_id,p,j); /* j could be 0 */
821 /* Depending on the session caching (internal/external), the cipher
824 if (s->session->cipher)
825 s->session->cipher_id = s->session->cipher->id;
826 if (s->hit && (s->session->cipher_id != c->id))
1005 if (s->session->sess_cert) ssl_sess_cert_free(s->session->sess_cert);
1006 s->session->sess_cert=sc;
1059 if (s->session->peer != NULL)
1060 X509_free(s->session->peer);
1062 s->session->peer=x;
1069 if (s->session->peer != NULL)
1070 X509_free(s->session->peer);
1071 s->session->peer=NULL;
1073 s->session->verify_result = s->verify_result;
1133 if (s->session->sess_cert != NULL)
1136 if (s->session->sess_cert->peer_rsa_tmp != NULL)
1138 RSA_free(s->session->sess_cert->peer_rsa_tmp);
1139 s->session->sess_cert->peer_rsa_tmp=NULL;
1143 if (s->session->sess_cert->peer_dh_tmp)
1145 DH_free(s->session->sess_cert->peer_dh_tmp);
1146 s->session->sess_cert->peer_dh_tmp=NULL;
1150 if (s->session->sess_cert->peer_ecdh_tmp)
1152 EC_KEY_free(s->session->sess_cert->peer_ecdh_tmp);
1153 s->session->sess_cert->peer_ecdh_tmp=NULL;
1159 s->session->sess_cert=ssl_sess_cert_new();
1207 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1213 s->session->sess_cert->peer_rsa_tmp=rsa;
1276 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1283 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_DSA_SIGN].x509);
1287 s->session->sess_cert->peer_dh_tmp=dh;
1384 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1388 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_ECC].x509);
1392 s->session->sess_cert->peer_ecdh_tmp=ecdh;
1735 n2l(p, s->session->tlsext_tick_lifetime_hint);
1744 if (s->session->tlsext_tick)
1746 OPENSSL_free(s->session->tlsext_tick);
1747 s->session->tlsext_ticklen = 0;
1749 s->session->tlsext_tick = OPENSSL_malloc(ticklen);
1750 if (!s->session->tlsext_tick)
1755 memcpy(s->session->tlsext_tick, p, ticklen);
1756 s->session->tlsext_ticklen = ticklen;
1758 * One is to set an appropriate session ID and then the server
1760 * client session ID matching to work and we know much
1763 * The other way is to set zero length session ID when the
1765 * session resumption.
1768 * assumptions elsewhere in OpenSSL. The session ID is set
1773 s->session->session_id, &s->session->session_id_length,
1918 if (s->session->sess_cert->peer_rsa_tmp != NULL)
1919 rsa=s->session->sess_cert->peer_rsa_tmp;
1922 pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1939 s->session->master_key_length=sizeof tmp_buf;
1964 s->session->master_key_length=
1966 s->session->master_key,
2096 s->session->master_key_length=
2098 s->session->master_key,
2110 if (s->session->sess_cert == NULL)
2117 if (s->session->sess_cert->peer_dh_tmp != NULL)
2118 dh_srvr=s->session->sess_cert->peer_dh_tmp;
2151 s->session->master_key_length=
2153 s->session->master_key,p,n);
2177 if (s->session->sess_cert == NULL)
2212 if (s->session->sess_cert->peer_ecdh_tmp != NULL)
2214 tkey = s->session->sess_cert->peer_ecdh_tmp;
2219 srvr_pub_pkey = X509_get_pubkey(s->session-> \
2304 s->session->master_key_length = s->method->ssl3_enc \
2306 s->session->master_key,
2571 sc=s->session->sess_cert;
2586 rsa=s->session->sess_cert->peer_rsa_tmp;
2589 dh=s->session->sess_cert->peer_dh_tmp;
2740 * session tickets we have to check the next message to be sure.
2748 /* If we have no ticket or session ID is non-zero length (a match of
2749 * a non-zero session length would never reach here) it cannot be a
2750 * resumed session.
2752 if (!s->session->tlsext_tick || s->session->session_id_length)