Home
last modified time | relevance | path

Searched refs:session (Results 1 – 24 of 24) sorted by relevance

/net-tools-3.6.0/python-websocket-server/tests/
Dtest_text_messages.py2 from utils import session, server
5 def test_text_message_of_length_1(session): argument
6 client, server = session
11 def test_text_message_of_length_125B(session): argument
12 client, server = session
20 def test_text_message_of_length_126B(session): argument
21 client, server = session
29 def test_text_message_of_length_127B(session): argument
30 client, server = session
38 def test_text_message_of_length_208B(session): argument
[all …]
Dutils.py23 def session(server): function
/net-tools-3.6.0/mbedtls-2.4.0/library/
Dssl_cache.c58 int mbedtls_ssl_cache_get( void *data, mbedtls_ssl_session *session ) in mbedtls_ssl_cache_get() argument
86 if( session->ciphersuite != entry->session.ciphersuite || in mbedtls_ssl_cache_get()
87 session->compression != entry->session.compression || in mbedtls_ssl_cache_get()
88 session->id_len != entry->session.id_len ) in mbedtls_ssl_cache_get()
91 if( memcmp( session->id, entry->session.id, in mbedtls_ssl_cache_get()
92 entry->session.id_len ) != 0 ) in mbedtls_ssl_cache_get()
95 memcpy( session->master, entry->session.master, 48 ); in mbedtls_ssl_cache_get()
97 session->verify_result = entry->session.verify_result; in mbedtls_ssl_cache_get()
105 if( ( session->peer_cert = mbedtls_calloc( 1, in mbedtls_ssl_cache_get()
112 mbedtls_x509_crt_init( session->peer_cert ); in mbedtls_ssl_cache_get()
[all …]
Dssl_ticket.c169 static int ssl_save_session( const mbedtls_ssl_session *session, in ssl_save_session() argument
182 memcpy( p, session, sizeof( mbedtls_ssl_session ) ); in ssl_save_session()
187 if( session->peer_cert == NULL ) in ssl_save_session()
190 cert_len = session->peer_cert->raw.len; in ssl_save_session()
199 if( session->peer_cert != NULL ) in ssl_save_session()
200 memcpy( p, session->peer_cert->raw.p, cert_len ); in ssl_save_session()
213 static int ssl_load_session( mbedtls_ssl_session *session, in ssl_load_session() argument
225 memcpy( session, p, sizeof( mbedtls_ssl_session ) ); in ssl_load_session()
237 session->peer_cert = NULL; in ssl_load_session()
246 session->peer_cert = mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) ); in ssl_load_session()
[all …]
Dssl_tls.c497 mbedtls_ssl_session *session = ssl->session_negotiate; in mbedtls_ssl_derive_keys() local
613 session->master, 48 ); in mbedtls_ssl_derive_keys()
626 session->master, 48 ); in mbedtls_ssl_derive_keys()
658 ret = handshake->tls_prf( session->master, 48, "key expansion", in mbedtls_ssl_derive_keys()
667 mbedtls_ssl_get_ciphersuite_name( session->ciphersuite ) ) ); in mbedtls_ssl_derive_keys()
668 MBEDTLS_SSL_DEBUG_BUF( 3, "master secret", session->master, 48 ); in mbedtls_ssl_derive_keys()
712 if( session->trunc_hmac == MBEDTLS_SSL_TRUNC_HMAC_ENABLED ) in mbedtls_ssl_derive_keys()
731 if( session->encrypt_then_mac == MBEDTLS_SSL_ETM_ENABLED ) in mbedtls_ssl_derive_keys()
868 session->master, keyblk, in mbedtls_ssl_derive_keys()
928 if( session->compression == MBEDTLS_SSL_COMPRESS_DEFLATE ) in mbedtls_ssl_derive_keys()
[all …]
Dssl_srv.c444 mbedtls_ssl_session session; in ssl_parse_session_ticket_ext() local
446 mbedtls_ssl_session_init( &session ); in ssl_parse_session_ticket_ext()
473 if( ( ret = ssl->conf->f_ticket_parse( ssl->conf->p_ticket, &session, in ssl_parse_session_ticket_ext()
476 mbedtls_ssl_session_free( &session ); in ssl_parse_session_ticket_ext()
492 session.id_len = ssl->session_negotiate->id_len; in ssl_parse_session_ticket_ext()
493 memcpy( &session.id, ssl->session_negotiate->id, session.id_len ); in ssl_parse_session_ticket_ext()
496 memcpy( ssl->session_negotiate, &session, sizeof( mbedtls_ssl_session ) ); in ssl_parse_session_ticket_ext()
499 mbedtls_zeroize( &session, sizeof( mbedtls_ssl_session ) ); in ssl_parse_session_ticket_ext()
/net-tools-3.6.0/tinydtls-0.8.2/examples/contiki/
Ddtls-server.c83 session_t *session, uint8 *data, size_t len) { in read_from_peer() argument
89 dtls_write(ctx, session, data, len); in read_from_peer()
95 session_t *session, uint8 *data, size_t len) { in send_to_peer() argument
99 uip_ipaddr_copy(&conn->ripaddr, &session->addr); in send_to_peer()
100 conn->rport = session->port; in send_to_peer()
120 get_psk_info(struct dtls_context_t *ctx, const session_t *session, in get_psk_info() argument
165 const session_t *session, in get_ecdsa_key() argument
180 const session_t *session, in verify_ecdsa_key() argument
193 session_t session; in dtls_handle_read() local
196 uip_ipaddr_copy(&session.addr, &UIP_IP_BUF->srcipaddr); in dtls_handle_read()
[all …]
Ddtls-client.c101 session_t *session, uint8 *data, size_t len) { in read_from_peer() argument
110 session_t *session, uint8 *data, size_t len) { in send_to_peer() argument
114 uip_ipaddr_copy(&conn->ripaddr, &session->addr); in send_to_peer()
115 conn->rport = session->port; in send_to_peer()
148 const session_t *session UNUSED_PARAM, in get_psk_info()
184 const session_t *session, in get_ecdsa_key() argument
199 const session_t *session, in verify_ecdsa_key() argument
212 static session_t session; in dtls_handle_read() local
215 uip_ipaddr_copy(&session.addr, &UIP_IP_BUF->srcipaddr); in dtls_handle_read()
216 session.port = UIP_UDP_BUF->srcport; in dtls_handle_read()
[all …]
/net-tools-3.6.0/tinydtls-0.8.2/tests/
Ddtls-server.c54 get_psk_info(struct dtls_context_t *ctx, const session_t *session, in get_psk_info() argument
100 const session_t *session, in get_ecdsa_key() argument
115 const session_t *session, in verify_ecdsa_key() argument
128 session_t *session, uint8 *data, size_t len) { in read_from_peer() argument
135 dtls_close(ctx, session); in read_from_peer()
140 dtls_renegotiate(ctx, session); in read_from_peer()
144 return dtls_write(ctx, session, data, len); in read_from_peer()
149 session_t *session, uint8 *data, size_t len) { in send_to_peer() argument
153 &session->addr.sa, session->size); in send_to_peer()
159 session_t session; in dtls_handle_read() local
[all …]
Ddtls-client.c106 const session_t *session UNUSED_PARAM, in get_psk_info()
146 const session_t *session, in get_ecdsa_key() argument
161 const session_t *session, in verify_ecdsa_key() argument
187 session_t *session, uint8 *data, size_t len) { in read_from_peer() argument
196 session_t *session, uint8 *data, size_t len) { in send_to_peer() argument
200 &session->addr.sa, session->size); in send_to_peer()
206 session_t session; in dtls_handle_read() local
216 memset(&session, 0, sizeof(session_t)); in dtls_handle_read()
217 session.size = sizeof(session.addr); in dtls_handle_read()
219 &session.addr.sa, &session.size); in dtls_handle_read()
[all …]
/net-tools-3.6.0/tinydtls-0.8.2/
Ddtls.h100 session_t *session, uint8 *buf, size_t len);
115 session_t *session, uint8 *buf, size_t len);
129 int (*event)(struct dtls_context_t *ctx, session_t *session,
156 const session_t *session,
185 const session_t *session,
215 const session_t *session,
309 int dtls_write(struct dtls_context_t *ctx, session_t *session,
403 int dtls_handle_message(dtls_context_t *ctx, session_t *session,
416 const session_t *session);
Dpeer.c72 dtls_new_peer(const session_t *session) { in dtls_new_peer() argument
78 memcpy(&peer->session, session, sizeof(session_t)); in dtls_new_peer()
86 dtls_dsrv_log_addr(DTLS_LOG_DEBUG, "dtls_new_peer", session); in dtls_new_peer()
Ddtls.c181 dtls_security_parameters_t *security , session_t *session,
202 return dtls_send_multi(ctx, peer, dtls_security_params(peer), &peer->session, in dtls_send()
212 dtls_get_peer(const dtls_context_t *ctx, const session_t *session) { in dtls_get_peer() argument
216 HASH_FIND_PEER(ctx->peers, session, p); in dtls_get_peer()
219 if (dtls_session_equals(&p->session, session)) in dtls_get_peer()
229 HASH_ADD_PEER(ctx->peers, session, peer); in dtls_add_peer()
287 session_t *session, in dtls_create_cookie() argument
313 (unsigned char *)&session->addr, session->size); in dtls_create_cookie()
602 session_t *session, in calculate_key_block() argument
621 len = CALL(ctx, get_psk_info, session, DTLS_PSK_KEY, in calculate_key_block()
[all …]
Dpeer.h59 session_t session; /**< peer address and local interface */ member
130 dtls_peer_t *dtls_new_peer(const session_t *session);
DMakefile.tinydtls24 …dtls_src = dtls.c crypto.c hmac.c rijndael.c sha2.c ccm.c netq.c ecc.c dtls_time.c peer.c session.c
DMakefile.in45 SOURCES:= dtls.c crypto.c ccm.c hmac.c netq.c peer.c dtls_time.c session.c
52 netq.h t_list.h alert.h utlist.h prng.h peer.h state.h dtls_time.h session.h \
/net-tools-3.6.0/mbedtls-2.4.0/include/mbedtls/
Dssl_cache.h65 mbedtls_ssl_session session; /*!< entry session */ member
99 int mbedtls_ssl_cache_get( void *data, mbedtls_ssl_session *session );
108 int mbedtls_ssl_cache_set( void *data, const mbedtls_ssl_session *session );
Dssl.h789 mbedtls_ssl_session *session; /*!< negotiated session data */ member
1184 const mbedtls_ssl_session *session,
1243 mbedtls_ssl_session *session,
1518 int mbedtls_ssl_set_session( mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session );
2312 int mbedtls_ssl_get_session( const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session );
2538 void mbedtls_ssl_session_init( mbedtls_ssl_session *session );
2546 void mbedtls_ssl_session_free( mbedtls_ssl_session *session );
/net-tools-3.6.0/
Dcoap-client.c142 static session_t session; variable
529 const session_t *session UNUSED_PARAM, in get_psk_info()
571 const session_t *session, in get_ecdsa_key() argument
586 const session_t *session, in verify_ecdsa_key() argument
937 session_t *session, in read_from_peer() argument
947 memcpy(&(addr.addr), &(session->addr), session->size); in read_from_peer()
948 addr.size = session->size; in read_from_peer()
970 dtls_renegotiate(ctx, session); in read_from_peer()
990 session_t *session, in send_to_peer() argument
1004 &session->addr.sa, session->size); in send_to_peer()
[all …]
/net-tools-3.6.0/mbedtls-2.4.0/tests/
DDescriptions.txt21 covered by compat.sh: session resumption (using session cache or tickets),
/net-tools-3.6.0/libcoap/include/coap/
Dcoap_io.h149 void *session; /**< opaque session data */ member
/net-tools-3.6.0/mbedtls-2.4.0/programs/x509/
Dcert_app.c455 ssl.session->peer_cert ); in main()
/net-tools-3.6.0/mbedtls-2.4.0/
DChangeLog7 with RFC-5116 and could lead to session key recovery in very long TLS
210 overflow of the hostname or session ticket. Found by Guido Vranken,
335 * New server-side implementation of session tickets that rotate keys to
383 place of mbedtls_ssl_conf_session_tickets() to enable session tickets.
624 * Add support for Extended Master Secret (draft-ietf-tls-session-hash).
928 * Fixed bug with session tickets and non-blocking I/O in the unlikely case
1065 * Support for session tickets (RFC 5077)
1279 * Fixed potential memory leak when failing to resume a session
1339 * Fixed memory leak in ssl_free() and ssl_reset() for active session
1354 * The SSL session cache module (ssl_cache) now also retains peer_cert
[all …]
/net-tools-3.6.0/libcoap/src/
Dcoap_io.c48 void *session; /**< opaque session data */ member