/freebsd-13-stable/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 324 CRYPTO_THREAD_read_lock(s->session_ctx->lock); 327 else if (s->session_ctx->generate_session_id) 328 cb = s->session_ctx->generate_session_id; 329 CRYPTO_THREAD_unlock(s->session_ctx->lock); 375 if (s->session_ctx->session_timeout == 0) 378 ss->timeout = s->session_ctx->session_timeout; 424 if ((s->session_ctx->session_cache_mode 435 CRYPTO_THREAD_read_lock(s->session_ctx->lock); 436 ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); 441 CRYPTO_THREAD_unlock(s->session_ctx [all...] |
H A D | s3_msg.c | 53 SSL_CTX_remove_session(s->session_ctx, s->session);
|
H A D | ssl_lib.c | 778 s->session_ctx = ctx; 943 CRYPTO_THREAD_read_lock(ssl->session_ctx->lock); 944 p = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &r); 945 CRYPTO_THREAD_unlock(ssl->session_ctx->lock); 1197 SSL_CTX_free(s->session_ctx); 3566 i = s->session_ctx->session_cache_mode; 3585 || s->session_ctx->remove_session_cb != NULL 3587 SSL_CTX_add_session(s->session_ctx, s->session); 3594 if (s->session_ctx->new_session_cb != NULL) { 3596 if (!s->session_ctx [all...] |
H A D | t1_lib.c | 1369 SSL_CTX *tctx = s->session_ctx; 1530 if (s->session_ctx->decrypt_ticket_cb != NULL 1540 retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len, 1542 s->session_ctx->ticket_cb_data);
|
H A D | ssl_local.h | 1400 SSL_CTX *session_ctx; /* initial ctx, used to store sessions */ member in struct:ssl_st
|
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 35 void (*get_complete_cb)(void *ctx, void *session_ctx),
|
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; local 76 os_memcpy(session_ctx, "hostapd", 7); 77 session_ctx[7] = (u8) eap_type; 79 flags, session_ctx, 80 sizeof(session_ctx))) {
|
H A D | eap_sim_db.c | 64 void (*get_complete_cb)(void *ctx, void *session_ctx); 756 void (*get_complete_cb)(void *ctx, void *session_ctx), 755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
|
/freebsd-13-stable/contrib/wpa/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | tls_none.c | 83 const u8 *session_ctx, size_t session_ctx_len) 81 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls.h | 360 * @session_ctx: Session caching context or %NULL to use default 361 * @session_ctx_len: Length of @session_ctx in bytes. 368 const u8 *session_ctx,
|
H A D | tls_internal.c | 375 const u8 *session_ctx, size_t session_ctx_len) 373 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_gnutls.c | 863 const u8 *session_ctx, size_t session_ctx_len) 861 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_openssl.c | 3138 const u8 *session_ctx, size_t session_ctx_len) 3172 } else if (session_ctx) { 3173 SSL_set_session_id_context(conn->ssl, session_ctx, 3136 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_wolfssl.c | 1584 const u8 *session_ctx, size_t session_ctx_len) 1582 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
/freebsd-13-stable/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 134 /* N.B. s->session_ctx == s->ctx here */ 135 tsan_counter(&s->session_ctx->stats.sess_accept); 137 /* N.B. s->ctx may not equal s->session_ctx */ 144 tsan_counter(&s->session_ctx->stats.sess_connect); 146 tsan_counter(&s->session_ctx->stats.sess_connect_renegotiate); 1090 /* N.B. s->ctx may not equal s->session_ctx */ 1099 if ((s->session_ctx->session_cache_mode 1101 SSL_CTX_remove_session(s->session_ctx, s->session); 1110 tsan_counter(&s->session_ctx->stats.sess_hit); 1113 tsan_counter(&s->session_ctx [all...] |
H A D | extensions.c | 932 if (!ossl_assert(s->ctx != NULL) || !ossl_assert(s->session_ctx != NULL)) { 941 else if (s->session_ctx->ext.servername_cb != NULL) 942 ret = s->session_ctx->ext.servername_cb(s, &altmp, 943 s->session_ctx->ext.servername_arg); 967 * move the sess_accept increment from the session_ctx to the new 971 if (SSL_IS_FIRST_HANDSHAKE(s) && s->ctx != s->session_ctx 974 tsan_decr(&s->session_ctx->stats.sess_accept);
|
H A D | extensions_srvr.c | 771 s->session_ctx->ext.cookie_hmac_key, 772 sizeof(s->session_ctx->ext 1205 && !SSL_CTX_remove_session(s->session_ctx, sess)) { 1853 s->session_ctx->ext.cookie_hmac_key, 1854 sizeof(s->session_ctx->ext
|
H A D | statem_clnt.c | 1611 tsan_counter(&s->session_ctx->stats.sess_miss); 2626 if ((s->session_ctx->session_cache_mode & SSL_SESS_CACHE_CLIENT) != 0 2633 SSL_CTX_remove_session(s->session_ctx, s->session);
|
H A D | statem_srvr.c | 3867 SSL_CTX *tctx = s->session_ctx; 4052 SSL_CTX *tctx = s->session_ctx;
|
/freebsd-13-stable/crypto/openssl/ssl/record/ |
H A D | rec_layer_d1.c | 620 SSL_CTX_remove_session(s->session_ctx, s->session);
|
H A D | rec_layer_s3.c | 1608 SSL_CTX_remove_session(s->session_ctx, s->session);
|