/external/openssl/ssl/ |
H A D | ssl_asn1.c | 73 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st 160 a.session_id.length=in->session_id_length; 161 a.session_id.type=V_ASN1_OCTET_STRING; 162 a.session_id.data=in->session_id; 229 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); 264 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); 365 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */ 366 os.length = sizeof(ret->session_id); 369 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id)); [all...] |
H A D | t1_lib.c | 840 int tls1_process_ticket(SSL *s, unsigned char *session_id, int len, argument 844 const unsigned char *p = session_id + len; 896 return tls_decrypt_ticket(s, p, size, session_id, len, 982 memcpy(sess->session_id, sess_id, sesslen);
|
H A D | ssl_sess.c | 139 return s->session_id; 163 /* else - woops a session_id match */ 247 if(!cb(s, ss->session_id, &tmp)) 267 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp); 271 if(SSL_has_matching_session_id(s, ss->session_id, 311 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len, argument 325 r = tls1_process_ticket(s, session_id, len, limit, &ret); 345 memcpy(data.session_id,session_id,len); 361 && (ret=s->ctx->get_session_cb(s,session_id,le [all...] |
H A D | ssl.h | 430 /* session_id - valid? */ 432 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st
|
/external/wpa_supplicant/ |
H A D | eap_sake.c | 34 u8 session_id; member in struct:eap_sake_data 146 req->session_id = data->session_id; 387 u8 subtype, session_id; local 398 session_id = req->session_id; 403 "session_id %d", subtype, session_id); 407 if (data->session_id_set && data->session_id != session_id) { [all...] |
H A D | eap_sake_common.h | 59 u8 session_id; member in struct:eap_sake_hdr
|
H A D | eap_gpsk.c | 32 u8 session_id; member in struct:eap_gpsk_data
|
H A D | tlsv1_client.c | 42 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client 210 /* SessionID session_id */ 212 os_memcpy(pos, conn->session_id, conn->session_id_len); 314 /* SessionID session_id */ 320 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { 327 os_memcpy(conn->session_id, pos, conn->session_id_len); 330 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 331 conn->session_id, conn->session_id_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.h | 55 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 33 u8 session_id; member in struct:eap_sake_data 139 sake->session_id = data->session_id; 375 u8 subtype, session_id; local 386 session_id = req->session_id; 390 "session_id %d", subtype, session_id); 394 if (data->session_id_set && data->session_id != session_id) { [all...] |
H A D | eap_gpsk.c | 31 u8 session_id; member in struct:eap_gpsk_data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sake.c | 32 u8 session_id; member in struct:eap_sake_data 77 if (os_get_random(&data->session_id, 1)) { 83 data->session_id); 122 sake->session_id = data->session_id; 261 u8 version, session_id, subtype; local 272 session_id = resp->session_id; 280 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_i.h | 29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/dropbear/ |
H A D | session.h | 133 unsigned char *session_id; /* this is the hash from the first kex */ member in struct:sshsession
|
/external/ppp/pppd/plugins/radius/ |
H A D | radius.c | 117 char session_id[MAXSESSIONID + 1]; member in struct:radius_state 864 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id)); 867 rstate.session_id, 0, VENDOR_NONE); 954 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id, 1094 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
|
/external/openssl/include/openssl/ |
H A D | ssl.h | 430 /* session_id - valid? */ 432 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st
|