/net-tools-3.6.0/python-websocket-server/tests/ |
D | test_text_messages.py | 2 from utils import session, server 5 def test_text_message_of_length_1(session): argument 6 client, server = session 11 def test_text_message_of_length_125B(session): argument 12 client, server = session 20 def test_text_message_of_length_126B(session): argument 21 client, server = session 29 def test_text_message_of_length_127B(session): argument 30 client, server = session 38 def test_text_message_of_length_208B(session): argument [all …]
|
D | utils.py | 23 def session(server): function
|
/net-tools-3.6.0/mbedtls-2.4.0/library/ |
D | ssl_cache.c | 58 int mbedtls_ssl_cache_get( void *data, mbedtls_ssl_session *session ) in mbedtls_ssl_cache_get() argument 86 if( session->ciphersuite != entry->session.ciphersuite || in mbedtls_ssl_cache_get() 87 session->compression != entry->session.compression || in mbedtls_ssl_cache_get() 88 session->id_len != entry->session.id_len ) in mbedtls_ssl_cache_get() 91 if( memcmp( session->id, entry->session.id, in mbedtls_ssl_cache_get() 92 entry->session.id_len ) != 0 ) in mbedtls_ssl_cache_get() 95 memcpy( session->master, entry->session.master, 48 ); in mbedtls_ssl_cache_get() 97 session->verify_result = entry->session.verify_result; in mbedtls_ssl_cache_get() 105 if( ( session->peer_cert = mbedtls_calloc( 1, in mbedtls_ssl_cache_get() 112 mbedtls_x509_crt_init( session->peer_cert ); in mbedtls_ssl_cache_get() [all …]
|
D | ssl_ticket.c | 169 static int ssl_save_session( const mbedtls_ssl_session *session, in ssl_save_session() argument 182 memcpy( p, session, sizeof( mbedtls_ssl_session ) ); in ssl_save_session() 187 if( session->peer_cert == NULL ) in ssl_save_session() 190 cert_len = session->peer_cert->raw.len; in ssl_save_session() 199 if( session->peer_cert != NULL ) in ssl_save_session() 200 memcpy( p, session->peer_cert->raw.p, cert_len ); in ssl_save_session() 213 static int ssl_load_session( mbedtls_ssl_session *session, in ssl_load_session() argument 225 memcpy( session, p, sizeof( mbedtls_ssl_session ) ); in ssl_load_session() 237 session->peer_cert = NULL; in ssl_load_session() 246 session->peer_cert = mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) ); in ssl_load_session() [all …]
|
D | ssl_tls.c | 497 mbedtls_ssl_session *session = ssl->session_negotiate; in mbedtls_ssl_derive_keys() local 613 session->master, 48 ); in mbedtls_ssl_derive_keys() 626 session->master, 48 ); in mbedtls_ssl_derive_keys() 658 ret = handshake->tls_prf( session->master, 48, "key expansion", in mbedtls_ssl_derive_keys() 667 mbedtls_ssl_get_ciphersuite_name( session->ciphersuite ) ) ); in mbedtls_ssl_derive_keys() 668 MBEDTLS_SSL_DEBUG_BUF( 3, "master secret", session->master, 48 ); in mbedtls_ssl_derive_keys() 712 if( session->trunc_hmac == MBEDTLS_SSL_TRUNC_HMAC_ENABLED ) in mbedtls_ssl_derive_keys() 731 if( session->encrypt_then_mac == MBEDTLS_SSL_ETM_ENABLED ) in mbedtls_ssl_derive_keys() 868 session->master, keyblk, in mbedtls_ssl_derive_keys() 928 if( session->compression == MBEDTLS_SSL_COMPRESS_DEFLATE ) in mbedtls_ssl_derive_keys() [all …]
|
D | ssl_srv.c | 444 mbedtls_ssl_session session; in ssl_parse_session_ticket_ext() local 446 mbedtls_ssl_session_init( &session ); in ssl_parse_session_ticket_ext() 473 if( ( ret = ssl->conf->f_ticket_parse( ssl->conf->p_ticket, &session, in ssl_parse_session_ticket_ext() 476 mbedtls_ssl_session_free( &session ); in ssl_parse_session_ticket_ext() 492 session.id_len = ssl->session_negotiate->id_len; in ssl_parse_session_ticket_ext() 493 memcpy( &session.id, ssl->session_negotiate->id, session.id_len ); in ssl_parse_session_ticket_ext() 496 memcpy( ssl->session_negotiate, &session, sizeof( mbedtls_ssl_session ) ); in ssl_parse_session_ticket_ext() 499 mbedtls_zeroize( &session, sizeof( mbedtls_ssl_session ) ); in ssl_parse_session_ticket_ext()
|
/net-tools-3.6.0/tinydtls-0.8.2/examples/contiki/ |
D | dtls-server.c | 83 session_t *session, uint8 *data, size_t len) { in read_from_peer() argument 89 dtls_write(ctx, session, data, len); in read_from_peer() 95 session_t *session, uint8 *data, size_t len) { in send_to_peer() argument 99 uip_ipaddr_copy(&conn->ripaddr, &session->addr); in send_to_peer() 100 conn->rport = session->port; in send_to_peer() 120 get_psk_info(struct dtls_context_t *ctx, const session_t *session, in get_psk_info() argument 165 const session_t *session, in get_ecdsa_key() argument 180 const session_t *session, in verify_ecdsa_key() argument 193 session_t session; in dtls_handle_read() local 196 uip_ipaddr_copy(&session.addr, &UIP_IP_BUF->srcipaddr); in dtls_handle_read() [all …]
|
D | dtls-client.c | 101 session_t *session, uint8 *data, size_t len) { in read_from_peer() argument 110 session_t *session, uint8 *data, size_t len) { in send_to_peer() argument 114 uip_ipaddr_copy(&conn->ripaddr, &session->addr); in send_to_peer() 115 conn->rport = session->port; in send_to_peer() 148 const session_t *session UNUSED_PARAM, in get_psk_info() 184 const session_t *session, in get_ecdsa_key() argument 199 const session_t *session, in verify_ecdsa_key() argument 212 static session_t session; in dtls_handle_read() local 215 uip_ipaddr_copy(&session.addr, &UIP_IP_BUF->srcipaddr); in dtls_handle_read() 216 session.port = UIP_UDP_BUF->srcport; in dtls_handle_read() [all …]
|
/net-tools-3.6.0/tinydtls-0.8.2/tests/ |
D | dtls-server.c | 54 get_psk_info(struct dtls_context_t *ctx, const session_t *session, in get_psk_info() argument 100 const session_t *session, in get_ecdsa_key() argument 115 const session_t *session, in verify_ecdsa_key() argument 128 session_t *session, uint8 *data, size_t len) { in read_from_peer() argument 135 dtls_close(ctx, session); in read_from_peer() 140 dtls_renegotiate(ctx, session); in read_from_peer() 144 return dtls_write(ctx, session, data, len); in read_from_peer() 149 session_t *session, uint8 *data, size_t len) { in send_to_peer() argument 153 &session->addr.sa, session->size); in send_to_peer() 159 session_t session; in dtls_handle_read() local [all …]
|
D | dtls-client.c | 106 const session_t *session UNUSED_PARAM, in get_psk_info() 146 const session_t *session, in get_ecdsa_key() argument 161 const session_t *session, in verify_ecdsa_key() argument 187 session_t *session, uint8 *data, size_t len) { in read_from_peer() argument 196 session_t *session, uint8 *data, size_t len) { in send_to_peer() argument 200 &session->addr.sa, session->size); in send_to_peer() 206 session_t session; in dtls_handle_read() local 216 memset(&session, 0, sizeof(session_t)); in dtls_handle_read() 217 session.size = sizeof(session.addr); in dtls_handle_read() 219 &session.addr.sa, &session.size); in dtls_handle_read() [all …]
|
/net-tools-3.6.0/tinydtls-0.8.2/ |
D | dtls.h | 100 session_t *session, uint8 *buf, size_t len); 115 session_t *session, uint8 *buf, size_t len); 129 int (*event)(struct dtls_context_t *ctx, session_t *session, 156 const session_t *session, 185 const session_t *session, 215 const session_t *session, 309 int dtls_write(struct dtls_context_t *ctx, session_t *session, 403 int dtls_handle_message(dtls_context_t *ctx, session_t *session, 416 const session_t *session);
|
D | peer.c | 72 dtls_new_peer(const session_t *session) { in dtls_new_peer() argument 78 memcpy(&peer->session, session, sizeof(session_t)); in dtls_new_peer() 86 dtls_dsrv_log_addr(DTLS_LOG_DEBUG, "dtls_new_peer", session); in dtls_new_peer()
|
D | dtls.c | 181 dtls_security_parameters_t *security , session_t *session, 202 return dtls_send_multi(ctx, peer, dtls_security_params(peer), &peer->session, in dtls_send() 212 dtls_get_peer(const dtls_context_t *ctx, const session_t *session) { in dtls_get_peer() argument 216 HASH_FIND_PEER(ctx->peers, session, p); in dtls_get_peer() 219 if (dtls_session_equals(&p->session, session)) in dtls_get_peer() 229 HASH_ADD_PEER(ctx->peers, session, peer); in dtls_add_peer() 287 session_t *session, in dtls_create_cookie() argument 313 (unsigned char *)&session->addr, session->size); in dtls_create_cookie() 602 session_t *session, in calculate_key_block() argument 621 len = CALL(ctx, get_psk_info, session, DTLS_PSK_KEY, in calculate_key_block() [all …]
|
D | peer.h | 59 session_t session; /**< peer address and local interface */ member 130 dtls_peer_t *dtls_new_peer(const session_t *session);
|
D | Makefile.tinydtls | 24 …dtls_src = dtls.c crypto.c hmac.c rijndael.c sha2.c ccm.c netq.c ecc.c dtls_time.c peer.c session.c
|
D | Makefile.in | 45 SOURCES:= dtls.c crypto.c ccm.c hmac.c netq.c peer.c dtls_time.c session.c 52 netq.h t_list.h alert.h utlist.h prng.h peer.h state.h dtls_time.h session.h \
|
/net-tools-3.6.0/mbedtls-2.4.0/include/mbedtls/ |
D | ssl_cache.h | 65 mbedtls_ssl_session session; /*!< entry session */ member 99 int mbedtls_ssl_cache_get( void *data, mbedtls_ssl_session *session ); 108 int mbedtls_ssl_cache_set( void *data, const mbedtls_ssl_session *session );
|
D | ssl.h | 789 mbedtls_ssl_session *session; /*!< negotiated session data */ member 1184 const mbedtls_ssl_session *session, 1243 mbedtls_ssl_session *session, 1518 int mbedtls_ssl_set_session( mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session ); 2312 int mbedtls_ssl_get_session( const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session ); 2538 void mbedtls_ssl_session_init( mbedtls_ssl_session *session ); 2546 void mbedtls_ssl_session_free( mbedtls_ssl_session *session );
|
/net-tools-3.6.0/ |
D | coap-client.c | 142 static session_t session; variable 529 const session_t *session UNUSED_PARAM, in get_psk_info() 571 const session_t *session, in get_ecdsa_key() argument 586 const session_t *session, in verify_ecdsa_key() argument 937 session_t *session, in read_from_peer() argument 947 memcpy(&(addr.addr), &(session->addr), session->size); in read_from_peer() 948 addr.size = session->size; in read_from_peer() 970 dtls_renegotiate(ctx, session); in read_from_peer() 990 session_t *session, in send_to_peer() argument 1004 &session->addr.sa, session->size); in send_to_peer() [all …]
|
/net-tools-3.6.0/mbedtls-2.4.0/tests/ |
D | Descriptions.txt | 21 covered by compat.sh: session resumption (using session cache or tickets),
|
/net-tools-3.6.0/libcoap/include/coap/ |
D | coap_io.h | 149 void *session; /**< opaque session data */ member
|
/net-tools-3.6.0/mbedtls-2.4.0/programs/x509/ |
D | cert_app.c | 455 ssl.session->peer_cert ); in main()
|
/net-tools-3.6.0/mbedtls-2.4.0/ |
D | ChangeLog | 7 with RFC-5116 and could lead to session key recovery in very long TLS 210 overflow of the hostname or session ticket. Found by Guido Vranken, 335 * New server-side implementation of session tickets that rotate keys to 383 place of mbedtls_ssl_conf_session_tickets() to enable session tickets. 624 * Add support for Extended Master Secret (draft-ietf-tls-session-hash). 928 * Fixed bug with session tickets and non-blocking I/O in the unlikely case 1065 * Support for session tickets (RFC 5077) 1279 * Fixed potential memory leak when failing to resume a session 1339 * Fixed memory leak in ssl_free() and ssl_reset() for active session 1354 * The SSL session cache module (ssl_cache) now also retains peer_cert [all …]
|
/net-tools-3.6.0/libcoap/src/ |
D | coap_io.c | 48 void *session; /**< opaque session data */ member
|