Searched refs:sessionData (Results 1 - 25 of 34) sorted by relevance

12

/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DsslSession.h40 SSLBuffer *sessionData,
45 const SSLBuffer sessionData,
49 const SSLBuffer sessionData,
53 const SSLBuffer sessionData,
H A DappleSession.h39 const SSLBuffer sessionData,
44 SSLBuffer *sessionData);
H A DappleSession.c46 * exists for the specifed key (sessionID), the sessionData for the existing
47 * cache entry is updated with the new sessionData. The entry's expiration
132 const SSLBuffer *sessionData,
146 serr = SSLCopyBuffer(sessionData, &entry->mSessionData);
233 const SSLBuffer *sessionData,
243 /* cache hit - just update this entry's sessionData if necessary */
247 if((entry->mSessionData.length == sessionData->length) &&
248 (memcmp(entry->mSessionData.data, sessionData->data,
249 sessionData->length) == 0)) {
261 return SessionCacheEntrySetSessionData(entry, sessionData);
130 SessionCacheEntryCreate( const SSLBuffer *key, const SSLBuffer *sessionData, CFAbsoluteTime expirationTime) argument
230 SessionCacheAddEntry( SessionCache *cache, const SSLBuffer *sessionKey, const SSLBuffer *sessionData, uint32_t timeToLive) argument
289 SessionCacheLookupEntry( SessionCache *cache, const SSLBuffer *sessionKey, SSLBuffer *sessionData) argument
385 sslAddSession( const SSLBuffer sessionKey, const SSLBuffer sessionData, uint32_t timeToLive) argument
408 sslCopySession( const SSLBuffer sessionKey, SSLBuffer *sessionData) argument
[all...]
H A DsslSession.c62 SSLBuffer sessionData; local
163 SSLGetSessionData(SSLBuffer *sessionData, const SSLContext *ctx) argument
169 sessionData->data = 0;
171 err = sslGetSession(ctx->peerID, sessionData);
172 if (sessionData->data == 0)
190 * Given a sessionData blob, obtain the associated sessionID (NOT the key...).
194 const SSLBuffer sessionData,
200 session = (ResumableSession*) sessionData.data;
212 const SSLBuffer sessionData,
217 session = (ResumableSession*) sessionData
193 SSLRetrieveSessionID( const SSLBuffer sessionData, SSLBuffer *identifier, const SSLContext *ctx) argument
211 SSLRetrieveSessionProtocolVersion( const SSLBuffer sessionData, SSLProtocolVersion *version, const SSLContext *ctx) argument
242 SSLInstallSessionFromData(const SSLBuffer sessionData, SSLContext *ctx) argument
[all...]
H A DtlsCallbacks.c178 tls_handshake_save_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer sessionData) argument
180 sslDebugLog("%s: %p, key len=%zd, k[0]=%02x, data len=%zd\n", __FUNCTION__, (SSLContext *)ctx, sessionKey.length, sessionKey.data[0], sessionData.length);
181 return sslAddSession(sessionKey, sessionData, 0);
185 tls_handshake_load_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer *sessionData) argument
193 sslDebugLog("%p, key len=%zd, data len=%zd, err=%d\n", ctx, sessionKey.length, sessionData->length, err);
195 *sessionData = myCtx->resumableSession;
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DsslSession.h40 SSLBuffer *sessionData,
45 const SSLBuffer sessionData,
49 const SSLBuffer sessionData,
53 const SSLBuffer sessionData,
H A DappleSession.h39 const SSLBuffer sessionData,
44 SSLBuffer *sessionData);
H A DappleSession.c46 * exists for the specifed key (sessionID), the sessionData for the existing
47 * cache entry is updated with the new sessionData. The entry's expiration
132 const SSLBuffer *sessionData,
146 serr = SSLCopyBuffer(sessionData, &entry->mSessionData);
233 const SSLBuffer *sessionData,
243 /* cache hit - just update this entry's sessionData if necessary */
247 if((entry->mSessionData.length == sessionData->length) &&
248 (memcmp(entry->mSessionData.data, sessionData->data,
249 sessionData->length) == 0)) {
261 return SessionCacheEntrySetSessionData(entry, sessionData);
130 SessionCacheEntryCreate( const SSLBuffer *key, const SSLBuffer *sessionData, CFAbsoluteTime expirationTime) argument
230 SessionCacheAddEntry( SessionCache *cache, const SSLBuffer *sessionKey, const SSLBuffer *sessionData, uint32_t timeToLive) argument
289 SessionCacheLookupEntry( SessionCache *cache, const SSLBuffer *sessionKey, SSLBuffer *sessionData) argument
385 sslAddSession( const SSLBuffer sessionKey, const SSLBuffer sessionData, uint32_t timeToLive) argument
408 sslCopySession( const SSLBuffer sessionKey, SSLBuffer *sessionData) argument
[all...]
H A DsslSession.c62 SSLBuffer sessionData; local
163 SSLGetSessionData(SSLBuffer *sessionData, const SSLContext *ctx) argument
169 sessionData->data = 0;
171 err = sslGetSession(ctx->peerID, sessionData);
172 if (sessionData->data == 0)
190 * Given a sessionData blob, obtain the associated sessionID (NOT the key...).
194 const SSLBuffer sessionData,
200 session = (ResumableSession*) sessionData.data;
212 const SSLBuffer sessionData,
217 session = (ResumableSession*) sessionData
193 SSLRetrieveSessionID( const SSLBuffer sessionData, SSLBuffer *identifier, const SSLContext *ctx) argument
211 SSLRetrieveSessionProtocolVersion( const SSLBuffer sessionData, SSLProtocolVersion *version, const SSLContext *ctx) argument
242 SSLInstallSessionFromData(const SSLBuffer sessionData, SSLContext *ctx) argument
[all...]
H A DtlsCallbacks.c178 tls_handshake_save_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer sessionData) argument
180 sslDebugLog("%s: %p, key len=%zd, k[0]=%02x, data len=%zd\n", __FUNCTION__, (SSLContext *)ctx, sessionKey.length, sessionKey.data[0], sessionData.length);
181 return sslAddSession(sessionKey, sessionData, 0);
185 tls_handshake_load_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer *sessionData) argument
193 sslDebugLog("%p, key len=%zd, data len=%zd, err=%d\n", ctx, sessionKey.length, sessionData->length, err);
195 *sessionData = myCtx->resumableSession;
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DsslSession.h40 SSLBuffer *sessionData,
45 const SSLBuffer sessionData,
49 const SSLBuffer sessionData,
53 const SSLBuffer sessionData,
H A DappleSession.h39 const SSLBuffer sessionData,
44 SSLBuffer *sessionData);
H A DappleSession.c46 * exists for the specifed key (sessionID), the sessionData for the existing
47 * cache entry is updated with the new sessionData. The entry's expiration
132 const SSLBuffer *sessionData,
146 serr = SSLCopyBuffer(sessionData, &entry->mSessionData);
233 const SSLBuffer *sessionData,
243 /* cache hit - just update this entry's sessionData if necessary */
247 if((entry->mSessionData.length == sessionData->length) &&
248 (memcmp(entry->mSessionData.data, sessionData->data,
249 sessionData->length) == 0)) {
261 return SessionCacheEntrySetSessionData(entry, sessionData);
130 SessionCacheEntryCreate( const SSLBuffer *key, const SSLBuffer *sessionData, CFAbsoluteTime expirationTime) argument
230 SessionCacheAddEntry( SessionCache *cache, const SSLBuffer *sessionKey, const SSLBuffer *sessionData, uint32_t timeToLive) argument
289 SessionCacheLookupEntry( SessionCache *cache, const SSLBuffer *sessionKey, SSLBuffer *sessionData) argument
385 sslAddSession( const SSLBuffer sessionKey, const SSLBuffer sessionData, uint32_t timeToLive) argument
408 sslCopySession( const SSLBuffer sessionKey, SSLBuffer *sessionData) argument
[all...]
H A DsslSession.c62 SSLBuffer sessionData; local
163 SSLGetSessionData(SSLBuffer *sessionData, const SSLContext *ctx) argument
169 sessionData->data = 0;
171 err = sslGetSession(ctx->peerID, sessionData);
172 if (sessionData->data == 0)
190 * Given a sessionData blob, obtain the associated sessionID (NOT the key...).
194 const SSLBuffer sessionData,
200 session = (ResumableSession*) sessionData.data;
212 const SSLBuffer sessionData,
217 session = (ResumableSession*) sessionData
193 SSLRetrieveSessionID( const SSLBuffer sessionData, SSLBuffer *identifier, const SSLContext *ctx) argument
211 SSLRetrieveSessionProtocolVersion( const SSLBuffer sessionData, SSLProtocolVersion *version, const SSLContext *ctx) argument
242 SSLInstallSessionFromData(const SSLBuffer sessionData, SSLContext *ctx) argument
[all...]
H A DtlsCallbacks.c178 tls_handshake_save_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer sessionData) argument
180 sslDebugLog("%s: %p, key len=%zd, k[0]=%02x, data len=%zd\n", __FUNCTION__, (SSLContext *)ctx, sessionKey.length, sessionKey.data[0], sessionData.length);
181 return sslAddSession(sessionKey, sessionData, 0);
185 tls_handshake_load_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer *sessionData) argument
193 sslDebugLog("%p, key len=%zd, data len=%zd, err=%d\n", ctx, sessionKey.length, sessionData->length, err);
195 *sessionData = myCtx->resumableSession;
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/
H A DSecOTRRemote.h32 bool _SecOTRSessionProcessPacketRemote(CFDataRef sessionData, CFDataRef inputPacket, CFDataRef* outputSessionData, CFDataRef* outputPacket, bool *readyForMessages, CFErrorRef *error);
H A DSecOTRRemote.c78 bool _SecOTRSessionProcessPacketRemote(CFDataRef sessionData, CFDataRef inputPacket, CFDataRef* outputSessionData, CFDataRef* outputPacket, bool *readyForMessages, CFErrorRef *error) { argument
80 SecOTRSessionRef session = SecOTRSessionCreateFromData(kCFAllocatorDefault, sessionData);
/macosx-10.10.1/configd-699.1.5/configd.tproj/
H A D_notifychanges.c47 info = CFDictionaryGetValue(sessionData, sessionKey);
61 CFDictionarySetValue(sessionData, sessionKey, newInfo);
63 CFDictionaryRemoveValue(sessionData, sessionKey);
H A D_configunlock.c97 info = CFDictionaryGetValue(sessionData, sessionKey);
121 CFDictionarySetValue(sessionData, sessionKey, newInfo);
206 sessionDict = CFDictionaryGetValue(sessionData, sessionKey);
239 CFDictionarySetValue(sessionData, sessionKey, newSessionDict);
H A D_configopen.c55 sessionData = CFDictionaryCreateMutable(NULL,
224 info = CFDictionaryGetValue(sessionData, sessionKey);
234 CFDictionarySetValue(sessionData, sessionKey, newInfo);
H A D_notifyviaport.c59 info = CFDictionaryGetValue(sessionData, sessionKey);
H A D_notifyviasignal.c66 info = CFDictionaryGetValue(sessionData, sessionKey);
H A D_SCD.h63 * keys in the "sessionData" dictionary
81 extern CFMutableDictionaryRef sessionData;
H A D_configclose.c120 dict = CFDictionaryGetValue(sessionData, sessionKey);
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A DSecOTRSession.h128 bool SecOTRSessionProcessPacketRemote(CFDataRef sessionData, CFDataRef inputPacket, CFDataRef* outputSessionData, CFDataRef* outputPacket, bool *readyForMessages, CFErrorRef *error);

Completed in 285 milliseconds

12