/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslSession.h | 40 SSLBuffer *sessionData, 45 const SSLBuffer sessionData, 49 const SSLBuffer sessionData, 53 const SSLBuffer sessionData,
|
H A D | appleSession.h | 39 const SSLBuffer sessionData, 44 SSLBuffer *sessionData);
|
H A D | appleSession.c | 46 * exists for the specifed key (sessionID), the sessionData for the existing 47 * cache entry is updated with the new sessionData. The entry's expiration 132 const SSLBuffer *sessionData, 146 serr = SSLCopyBuffer(sessionData, &entry->mSessionData); 233 const SSLBuffer *sessionData, 243 /* cache hit - just update this entry's sessionData if necessary */ 247 if((entry->mSessionData.length == sessionData->length) && 248 (memcmp(entry->mSessionData.data, sessionData->data, 249 sessionData->length) == 0)) { 261 return SessionCacheEntrySetSessionData(entry, sessionData); 130 SessionCacheEntryCreate( const SSLBuffer *key, const SSLBuffer *sessionData, CFAbsoluteTime expirationTime) argument 230 SessionCacheAddEntry( SessionCache *cache, const SSLBuffer *sessionKey, const SSLBuffer *sessionData, uint32_t timeToLive) argument 289 SessionCacheLookupEntry( SessionCache *cache, const SSLBuffer *sessionKey, SSLBuffer *sessionData) argument 385 sslAddSession( const SSLBuffer sessionKey, const SSLBuffer sessionData, uint32_t timeToLive) argument 408 sslCopySession( const SSLBuffer sessionKey, SSLBuffer *sessionData) argument [all...] |
H A D | sslSession.c | 62 SSLBuffer sessionData; local 163 SSLGetSessionData(SSLBuffer *sessionData, const SSLContext *ctx) argument 169 sessionData->data = 0; 171 err = sslGetSession(ctx->peerID, sessionData); 172 if (sessionData->data == 0) 190 * Given a sessionData blob, obtain the associated sessionID (NOT the key...). 194 const SSLBuffer sessionData, 200 session = (ResumableSession*) sessionData.data; 212 const SSLBuffer sessionData, 217 session = (ResumableSession*) sessionData 193 SSLRetrieveSessionID( const SSLBuffer sessionData, SSLBuffer *identifier, const SSLContext *ctx) argument 211 SSLRetrieveSessionProtocolVersion( const SSLBuffer sessionData, SSLProtocolVersion *version, const SSLContext *ctx) argument 242 SSLInstallSessionFromData(const SSLBuffer sessionData, SSLContext *ctx) argument [all...] |
H A D | tlsCallbacks.c | 178 tls_handshake_save_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer sessionData) argument 180 sslDebugLog("%s: %p, key len=%zd, k[0]=%02x, data len=%zd\n", __FUNCTION__, (SSLContext *)ctx, sessionKey.length, sessionKey.data[0], sessionData.length); 181 return sslAddSession(sessionKey, sessionData, 0); 185 tls_handshake_load_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer *sessionData) argument 193 sslDebugLog("%p, key len=%zd, data len=%zd, err=%d\n", ctx, sessionKey.length, sessionData->length, err); 195 *sessionData = myCtx->resumableSession;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslSession.h | 40 SSLBuffer *sessionData, 45 const SSLBuffer sessionData, 49 const SSLBuffer sessionData, 53 const SSLBuffer sessionData,
|
H A D | appleSession.h | 39 const SSLBuffer sessionData, 44 SSLBuffer *sessionData);
|
H A D | appleSession.c | 46 * exists for the specifed key (sessionID), the sessionData for the existing 47 * cache entry is updated with the new sessionData. The entry's expiration 132 const SSLBuffer *sessionData, 146 serr = SSLCopyBuffer(sessionData, &entry->mSessionData); 233 const SSLBuffer *sessionData, 243 /* cache hit - just update this entry's sessionData if necessary */ 247 if((entry->mSessionData.length == sessionData->length) && 248 (memcmp(entry->mSessionData.data, sessionData->data, 249 sessionData->length) == 0)) { 261 return SessionCacheEntrySetSessionData(entry, sessionData); 130 SessionCacheEntryCreate( const SSLBuffer *key, const SSLBuffer *sessionData, CFAbsoluteTime expirationTime) argument 230 SessionCacheAddEntry( SessionCache *cache, const SSLBuffer *sessionKey, const SSLBuffer *sessionData, uint32_t timeToLive) argument 289 SessionCacheLookupEntry( SessionCache *cache, const SSLBuffer *sessionKey, SSLBuffer *sessionData) argument 385 sslAddSession( const SSLBuffer sessionKey, const SSLBuffer sessionData, uint32_t timeToLive) argument 408 sslCopySession( const SSLBuffer sessionKey, SSLBuffer *sessionData) argument [all...] |
H A D | sslSession.c | 62 SSLBuffer sessionData; local 163 SSLGetSessionData(SSLBuffer *sessionData, const SSLContext *ctx) argument 169 sessionData->data = 0; 171 err = sslGetSession(ctx->peerID, sessionData); 172 if (sessionData->data == 0) 190 * Given a sessionData blob, obtain the associated sessionID (NOT the key...). 194 const SSLBuffer sessionData, 200 session = (ResumableSession*) sessionData.data; 212 const SSLBuffer sessionData, 217 session = (ResumableSession*) sessionData 193 SSLRetrieveSessionID( const SSLBuffer sessionData, SSLBuffer *identifier, const SSLContext *ctx) argument 211 SSLRetrieveSessionProtocolVersion( const SSLBuffer sessionData, SSLProtocolVersion *version, const SSLContext *ctx) argument 242 SSLInstallSessionFromData(const SSLBuffer sessionData, SSLContext *ctx) argument [all...] |
H A D | tlsCallbacks.c | 178 tls_handshake_save_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer sessionData) argument 180 sslDebugLog("%s: %p, key len=%zd, k[0]=%02x, data len=%zd\n", __FUNCTION__, (SSLContext *)ctx, sessionKey.length, sessionKey.data[0], sessionData.length); 181 return sslAddSession(sessionKey, sessionData, 0); 185 tls_handshake_load_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer *sessionData) argument 193 sslDebugLog("%p, key len=%zd, data len=%zd, err=%d\n", ctx, sessionKey.length, sessionData->length, err); 195 *sessionData = myCtx->resumableSession;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslSession.h | 40 SSLBuffer *sessionData, 45 const SSLBuffer sessionData, 49 const SSLBuffer sessionData, 53 const SSLBuffer sessionData,
|
H A D | appleSession.h | 39 const SSLBuffer sessionData, 44 SSLBuffer *sessionData);
|
H A D | appleSession.c | 46 * exists for the specifed key (sessionID), the sessionData for the existing 47 * cache entry is updated with the new sessionData. The entry's expiration 132 const SSLBuffer *sessionData, 146 serr = SSLCopyBuffer(sessionData, &entry->mSessionData); 233 const SSLBuffer *sessionData, 243 /* cache hit - just update this entry's sessionData if necessary */ 247 if((entry->mSessionData.length == sessionData->length) && 248 (memcmp(entry->mSessionData.data, sessionData->data, 249 sessionData->length) == 0)) { 261 return SessionCacheEntrySetSessionData(entry, sessionData); 130 SessionCacheEntryCreate( const SSLBuffer *key, const SSLBuffer *sessionData, CFAbsoluteTime expirationTime) argument 230 SessionCacheAddEntry( SessionCache *cache, const SSLBuffer *sessionKey, const SSLBuffer *sessionData, uint32_t timeToLive) argument 289 SessionCacheLookupEntry( SessionCache *cache, const SSLBuffer *sessionKey, SSLBuffer *sessionData) argument 385 sslAddSession( const SSLBuffer sessionKey, const SSLBuffer sessionData, uint32_t timeToLive) argument 408 sslCopySession( const SSLBuffer sessionKey, SSLBuffer *sessionData) argument [all...] |
H A D | sslSession.c | 62 SSLBuffer sessionData; local 163 SSLGetSessionData(SSLBuffer *sessionData, const SSLContext *ctx) argument 169 sessionData->data = 0; 171 err = sslGetSession(ctx->peerID, sessionData); 172 if (sessionData->data == 0) 190 * Given a sessionData blob, obtain the associated sessionID (NOT the key...). 194 const SSLBuffer sessionData, 200 session = (ResumableSession*) sessionData.data; 212 const SSLBuffer sessionData, 217 session = (ResumableSession*) sessionData 193 SSLRetrieveSessionID( const SSLBuffer sessionData, SSLBuffer *identifier, const SSLContext *ctx) argument 211 SSLRetrieveSessionProtocolVersion( const SSLBuffer sessionData, SSLProtocolVersion *version, const SSLContext *ctx) argument 242 SSLInstallSessionFromData(const SSLBuffer sessionData, SSLContext *ctx) argument [all...] |
H A D | tlsCallbacks.c | 178 tls_handshake_save_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer sessionData) argument 180 sslDebugLog("%s: %p, key len=%zd, k[0]=%02x, data len=%zd\n", __FUNCTION__, (SSLContext *)ctx, sessionKey.length, sessionKey.data[0], sessionData.length); 181 return sslAddSession(sessionKey, sessionData, 0); 185 tls_handshake_load_session_data_callback(tls_handshake_ctx_t ctx, SSLBuffer sessionKey, SSLBuffer *sessionData) argument 193 sslDebugLog("%p, key len=%zd, data len=%zd, err=%d\n", ctx, sessionKey.length, sessionData->length, err); 195 *sessionData = myCtx->resumableSession;
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecOTRRemote.h | 32 bool _SecOTRSessionProcessPacketRemote(CFDataRef sessionData, CFDataRef inputPacket, CFDataRef* outputSessionData, CFDataRef* outputPacket, bool *readyForMessages, CFErrorRef *error);
|
H A D | SecOTRRemote.c | 78 bool _SecOTRSessionProcessPacketRemote(CFDataRef sessionData, CFDataRef inputPacket, CFDataRef* outputSessionData, CFDataRef* outputPacket, bool *readyForMessages, CFErrorRef *error) { argument 80 SecOTRSessionRef session = SecOTRSessionCreateFromData(kCFAllocatorDefault, sessionData);
|
/macosx-10.10.1/configd-699.1.5/configd.tproj/ |
H A D | _notifychanges.c | 47 info = CFDictionaryGetValue(sessionData, sessionKey); 61 CFDictionarySetValue(sessionData, sessionKey, newInfo); 63 CFDictionaryRemoveValue(sessionData, sessionKey);
|
H A D | _configunlock.c | 97 info = CFDictionaryGetValue(sessionData, sessionKey); 121 CFDictionarySetValue(sessionData, sessionKey, newInfo); 206 sessionDict = CFDictionaryGetValue(sessionData, sessionKey); 239 CFDictionarySetValue(sessionData, sessionKey, newSessionDict);
|
H A D | _configopen.c | 55 sessionData = CFDictionaryCreateMutable(NULL, 224 info = CFDictionaryGetValue(sessionData, sessionKey); 234 CFDictionarySetValue(sessionData, sessionKey, newInfo);
|
H A D | _notifyviaport.c | 59 info = CFDictionaryGetValue(sessionData, sessionKey);
|
H A D | _notifyviasignal.c | 66 info = CFDictionaryGetValue(sessionData, sessionKey);
|
H A D | _SCD.h | 63 * keys in the "sessionData" dictionary 81 extern CFMutableDictionaryRef sessionData;
|
H A D | _configclose.c | 120 dict = CFDictionaryGetValue(sessionData, sessionKey);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecOTRSession.h | 128 bool SecOTRSessionProcessPacketRemote(CFDataRef sessionData, CFDataRef inputPacket, CFDataRef* outputSessionData, CFDataRef* outputPacket, bool *readyForMessages, CFErrorRef *error);
|