Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 28) sorted by relevance

12

/openthread-latest/third_party/mbedtls/repo/library/
Dssl_tls.c451 static int ssl_tls12_session_load(mbedtls_ssl_session *session,
495 static void ssl_clear_peer_cert(mbedtls_ssl_session *session) in ssl_clear_peer_cert() argument
498 if (session->peer_cert != NULL) { in ssl_clear_peer_cert()
499 mbedtls_x509_crt_free(session->peer_cert); in ssl_clear_peer_cert()
500 mbedtls_free(session->peer_cert); in ssl_clear_peer_cert()
501 session->peer_cert = NULL; in ssl_clear_peer_cert()
504 if (session->peer_cert_digest != NULL) { in ssl_clear_peer_cert()
506 mbedtls_free(session->peer_cert_digest); in ssl_clear_peer_cert()
507 session->peer_cert_digest = NULL; in ssl_clear_peer_cert()
508 session->peer_cert_digest_type = MBEDTLS_MD_NONE; in ssl_clear_peer_cert()
[all …]
Dssl_tls13_client.c684 mbedtls_ssl_session *session = ssl->session_negotiate; in ssl_tls13_has_configured_ticket() local
686 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket()
689 session, MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL)); in ssl_tls13_has_configured_ticket()
695 mbedtls_ssl_session *session = ssl->session_negotiate; in ssl_tls13_early_data_has_valid_ticket() local
697 session->tls_version == MBEDTLS_SSL_VERSION_TLS1_3 && in ssl_tls13_early_data_has_valid_ticket()
698 mbedtls_ssl_tls13_session_ticket_allow_early_data(session) && in ssl_tls13_early_data_has_valid_ticket()
699 mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket()
709 mbedtls_ssl_session *session = ssl->session_negotiate; in ssl_tls13_ticket_get_identity() local
715 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity()
716 *identity = session->ticket; in ssl_tls13_ticket_get_identity()
[all …]
Dssl_cache.c77 mbedtls_ssl_session *session) in mbedtls_ssl_cache_get() argument
94 ret = mbedtls_ssl_session_load(session, in mbedtls_ssl_cache_get()
95 entry->session, in mbedtls_ssl_cache_get()
121 if (entry->session != NULL) { in ssl_cache_entry_zeroize()
122 mbedtls_zeroize_and_free(entry->session, entry->session_len); in ssl_cache_entry_zeroize()
230 if (cur->session != NULL) { in ssl_cache_pick_writing_slot()
249 const mbedtls_ssl_session *session) in mbedtls_ssl_cache_set() argument
273 ret = mbedtls_ssl_session_save(session, NULL, 0, &session_serialized_len); in mbedtls_ssl_cache_set()
285 ret = mbedtls_ssl_session_save(session, in mbedtls_ssl_cache_set()
300 cur->session = session_serialized; in mbedtls_ssl_cache_set()
Dssl_tls13_server.c187 mbedtls_ssl_session *session) in ssl_tls13_offered_psks_check_identity_match_ticket() argument
219 session, in ssl_tls13_offered_psks_check_identity_match_ticket()
254 if (session->tls_version != MBEDTLS_SSL_VERSION_TLS1_3) { in ssl_tls13_offered_psks_check_identity_match_ticket()
262 if (now < session->ticket_creation_time) { in ssl_tls13_offered_psks_check_identity_match_ticket()
266 now, session->ticket_creation_time)); in ssl_tls13_offered_psks_check_identity_match_ticket()
270 server_age = now - session->ticket_creation_time; in ssl_tls13_offered_psks_check_identity_match_ticket()
301 client_age = obfuscated_ticket_age - session->ticket_age_add; in ssl_tls13_offered_psks_check_identity_match_ticket()
320 mbedtls_ssl_session_free(session); in ssl_tls13_offered_psks_check_identity_match_ticket()
335 mbedtls_ssl_session *session) in ssl_tls13_offered_psks_check_identity_match() argument
339 ((void) session); in ssl_tls13_offered_psks_check_identity_match()
[all …]
Dssl_misc.h2851 int mbedtls_ssl_session_set_hostname(mbedtls_ssl_session *session,
2858 int mbedtls_ssl_session_set_ticket_alpn(mbedtls_ssl_session *session,
2867 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_get_ticket_flags() argument
2869 return session->ticket_flags & in mbedtls_ssl_tls13_session_get_ticket_flags()
2880 mbedtls_ssl_session *session, unsigned int flags) in mbedtls_ssl_tls13_session_ticket_has_flags() argument
2882 return mbedtls_ssl_tls13_session_get_ticket_flags(session, flags) != 0; in mbedtls_ssl_tls13_session_ticket_has_flags()
2886 mbedtls_ssl_session *session) in mbedtls_ssl_tls13_session_ticket_allow_psk() argument
2889 session, MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION); in mbedtls_ssl_tls13_session_ticket_allow_psk()
2893 mbedtls_ssl_session *session) in mbedtls_ssl_tls13_session_ticket_allow_psk_ephemeral() argument
2896 session, MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION); in mbedtls_ssl_tls13_session_ticket_allow_psk_ephemeral()
[all …]
Dssl_ticket.c300 const mbedtls_ssl_session *session, in mbedtls_ssl_ticket_write() argument
350 if ((ret = mbedtls_ssl_session_save(session, in mbedtls_ssl_ticket_write()
419 mbedtls_ssl_session *session, in mbedtls_ssl_ticket_parse() argument
500 if ((ret = mbedtls_ssl_session_load(session, ticket, clear_len)) != 0) { in mbedtls_ssl_ticket_parse()
509 ret = mbedtls_ssl_session_get_ticket_creation_time(session, in mbedtls_ssl_ticket_parse()
Dssl_tls12_server.c475 mbedtls_ssl_session session; in ssl_parse_session_ticket_ext() local
477 mbedtls_ssl_session_init(&session); in ssl_parse_session_ticket_ext()
503 if ((ret = ssl->conf->f_ticket_parse(ssl->conf->p_ticket, &session, in ssl_parse_session_ticket_ext()
505 mbedtls_ssl_session_free(&session); in ssl_parse_session_ticket_ext()
522 session.id_len = ssl->session_negotiate->id_len; in ssl_parse_session_ticket_ext()
523 memcpy(&session.id, ssl->session_negotiate->id, session.id_len); in ssl_parse_session_ticket_ext()
526 memcpy(ssl->session_negotiate, &session, sizeof(mbedtls_ssl_session)); in ssl_parse_session_ticket_ext()
529 mbedtls_platform_zeroize(&session, sizeof(mbedtls_ssl_session)); in ssl_parse_session_ticket_ext()
2112 mbedtls_ssl_session * const session = ssl->session_negotiate; in ssl_handle_id_based_session_resumption() local
2119 if (session->id_len == 0) { in ssl_handle_id_based_session_resumption()
[all …]
Dssl_tls13_generic.c1345 if (ssl->session) { in mbedtls_ssl_tls13_handshake_wrapup()
1346 mbedtls_ssl_session_free(ssl->session); in mbedtls_ssl_tls13_handshake_wrapup()
1347 mbedtls_free(ssl->session); in mbedtls_ssl_tls13_handshake_wrapup()
1349 ssl->session = ssl->session_negotiate; in mbedtls_ssl_tls13_handshake_wrapup()
Dssl_tls12_client.c3444 if (ssl->session != NULL && ssl->session->ticket != NULL) { in ssl_parse_new_session_ticket()
3445 mbedtls_zeroize_and_free(ssl->session->ticket, in ssl_parse_new_session_ticket()
3446 ssl->session->ticket_len); in ssl_parse_new_session_ticket()
3447 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket()
3448 ssl->session->ticket_len = 0; in ssl_parse_new_session_ticket()
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/
Dssl_helpers.c1671 int mbedtls_test_ssl_tls12_populate_session(mbedtls_ssl_session *session, in mbedtls_test_ssl_tls12_populate_session() argument
1679 session->start = mbedtls_time(NULL) - 42; in mbedtls_test_ssl_tls12_populate_session()
1681 session->tls_version = MBEDTLS_SSL_VERSION_TLS1_2; in mbedtls_test_ssl_tls12_populate_session()
1686 session->endpoint = endpoint_type; in mbedtls_test_ssl_tls12_populate_session()
1687 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls12_populate_session()
1688 session->id_len = sizeof(session->id); in mbedtls_test_ssl_tls12_populate_session()
1689 memset(session->id, 66, session->id_len); in mbedtls_test_ssl_tls12_populate_session()
1690 memset(session->master, 17, sizeof(session->master)); in mbedtls_test_ssl_tls12_populate_session()
1705 session->peer_cert = mbedtls_calloc(1, sizeof(*session->peer_cert)); in mbedtls_test_ssl_tls12_populate_session()
1706 if (session->peer_cert == NULL) { in mbedtls_test_ssl_tls12_populate_session()
[all …]
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dssl_cache.h58 unsigned char *MBEDTLS_PRIVATE(session); /*!< serialized session */
102 mbedtls_ssl_session *session);
120 const mbedtls_ssl_session *session);
Dssl.h917 mbedtls_ssl_session *session);
939 const mbedtls_ssl_session *session);
1741 … mbedtls_ssl_session *MBEDTLS_PRIVATE(session); /*!< negotiated session data */
2609 const mbedtls_ssl_session *session,
2639 mbedtls_ssl_session *session,
2678 mbedtls_ssl_session *session, mbedtls_ms_time_t *ticket_creation_time) in mbedtls_ssl_session_get_ticket_creation_time() argument
2680 if (session == NULL || ticket_creation_time == NULL || in mbedtls_ssl_session_get_ticket_creation_time()
2681 session->MBEDTLS_PRIVATE(endpoint) != MBEDTLS_SSL_IS_SERVER) { in mbedtls_ssl_session_get_ticket_creation_time()
2685 *ticket_creation_time = session->MBEDTLS_PRIVATE(ticket_creation_time); in mbedtls_ssl_session_get_ticket_creation_time()
2700 session))[32] in mbedtls_ssl_session_get_id() argument
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/include/test/
Dssl_helpers.h548 int mbedtls_test_ssl_tls12_populate_session(mbedtls_ssl_session *session,
554 int mbedtls_test_ssl_tls13_populate_session(mbedtls_ssl_session *session,
611 void *p_ticket, const mbedtls_ssl_session *session,
615 int mbedtls_test_ticket_parse(void *p_ticket, mbedtls_ssl_session *session,
625 mbedtls_ssl_session *session);
/openthread-latest/third_party/mbedtls/repo/tests/
DDescriptions.txt21 covered by compat.sh: session resumption (using session cache or tickets),
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ssl.function1996 /* Prepare a dummy session to work on */
2021 /* Restore session from serialized data */
2025 * Make sure both session structures are identical
2157 mbedtls_ssl_session session;
2164 mbedtls_ssl_session_init(&session);
2167 /* Prepare a dummy session to work on */
2175 &session, 0, endpoint_type) == 0);
2182 &session, ticket_len, endpoint_type, crt_file) == 0);
2192 TEST_ASSERT(mbedtls_ssl_session_save(&session, NULL, 0, &len0)
2199 /* Serialize to buffer and free live session */
[all …]
Dtest_suite_ssl.data916 SSL session serialization: Wrong major version
920 SSL session serialization: Wrong minor version
924 SSL session serialization: Wrong patch version
928 SSL session serialization: Wrong config
932 TLS 1.3: CLI: session serialization: Wrong major version
936 TLS 1.3: CLI: session serialization: Wrong minor version
940 TLS 1.3: CLI: session serialization: Wrong patch version
944 TLS 1.3: CLI: session serialization: Wrong config
948 TLS 1.3: SRV: session serialization: Wrong major version
952 TLS 1.3: SRV: session serialization: Wrong minor version
[all …]
/openthread-latest/third_party/mbedtls/repo/programs/ssl/
Dssl_server2.c1386 int dummy_ticket_write(void *p_ticket, const mbedtls_ssl_session *session, in dummy_ticket_write() argument
1403 if ((ret = mbedtls_ssl_session_save(session, p, end - p, in dummy_ticket_write()
1413 int dummy_ticket_parse(void *p_ticket, mbedtls_ssl_session *session, in dummy_ticket_parse() argument
1419 if ((ret = mbedtls_ssl_session_load(session, buf + 4, len - 4)) != 0) { in dummy_ticket_parse()
1430 session->ticket_creation_time = mbedtls_ms_time() + 1000; in dummy_ticket_parse()
1434 session->ticket_creation_time = mbedtls_ms_time() - in dummy_ticket_parse()
1440 session->ticket_age_add += MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE + 4 * 1000; in dummy_ticket_parse()
1442 session->ticket_creation_time = mbedtls_ms_time(); in dummy_ticket_parse()
1447 session->ticket_age_add -= MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE + 4 * 1000; in dummy_ticket_parse()
1449 session->ticket_creation_time = mbedtls_ms_time(); in dummy_ticket_parse()
[all …]
/openthread-latest/src/cli/
DREADME_JOINER.md38 …Note this value takes the place of the place of EUI-64 during the joiner session of Thread commiss…
DREADME_COMMISSIONER.md199 Get current commissioner session id.
DREADME_COAPS.md130 Establish DTLS session.
/openthread-latest/third_party/mbedtls/repo/docs/
D3.0-migration-guide.md844 1. Users who manually inspect parts of the current session through
847 2. Users of session resumption who query the current session
900 to configure a custom session cache implementation different
903 Those users will need to modify the API of their session cache
905 session IDs and values being instances of `mbedtls_ssl_session`:
911 mbedtls_ssl_session *session );
915 const mbedtls_ssl_session *session );
919 onwards, portable session cache implementations must not access fields of
921 find themselves unable to migrate their session cache functionality without
979 the same session. This use of `mbedtls_ssl_get_session()`
[all …]
/openthread-latest/src/core/meshcop/
Dsecure_transport.cpp603 … mSsl.MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(peer_cert)->raw.p, in GetPeerCertificateBase64()
604 … mSsl.MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(peer_cert)->raw.len) == 0, in GetPeerCertificateBase64()
610 …mSsl.MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(peer_cert)->MBEDTLS_PRIVATE(raw).MBEDTLS_PRIVATE(p), in GetPeerCertificateBase64()
611 …mSsl.MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(peer_cert)->MBEDTLS_PRIVATE(raw).MBEDTLS_PRIVATE(le… in GetPeerCertificateBase64()
/openthread-latest/tools/tcat_ble_client/ble/
Dble_stream_secure.py142 if self.ssl_object.session is not None:
/openthread-latest/tests/scripts/thread-cert/
Dnode.py2354 session = None
2364 if session:
2365 session['counters'] = session_counters
2366 sessions.append(session)
2367 session = {
2385 if not session:
2400 if session:
2401 session['counters'] = session_counters
2402 sessions.append(session)
/openthread-latest/third_party/mbedtls/repo/
DChangeLog127 * Add new accessors to expose the private session-id,
128 session-id length, and ciphersuite-id members of
218 * Fix missing bitflags in SSL session serialization headers. Their absence
653 its session id.
699 * In TLS 1.3, when using a ticket for session resumption, tweak its age
753 * Fix TLS 1.3 session resumption when the established pre-shared key is
755 session where the cipher suite is TLS_AES_256_GCM_SHA384.
864 mechanism (session resumption).
893 calculation that can be used to derive the session secret in TLS 1.2,
960 * Fix TLS 1.3 session resumption. Fixes #6488.
[all …]

12