Searched defs:session_id (Results 1 - 17 of 17) sorted by relevance

/external/openssl/ssl/
H A Dssl_asn1.c73 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st
160 a.session_id.length=in->session_id_length;
161 a.session_id.type=V_ASN1_OCTET_STRING;
162 a.session_id.data=in->session_id;
229 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING);
264 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING);
365 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */
366 os.length = sizeof(ret->session_id);
369 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id));
[all...]
H A Dt1_lib.c840 int tls1_process_ticket(SSL *s, unsigned char *session_id, int len, argument
844 const unsigned char *p = session_id + len;
896 return tls_decrypt_ticket(s, p, size, session_id, len,
982 memcpy(sess->session_id, sess_id, sesslen);
H A Dssl_sess.c139 return s->session_id;
163 /* else - woops a session_id match */
247 if(!cb(s, ss->session_id, &tmp))
267 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp);
271 if(SSL_has_matching_session_id(s, ss->session_id,
311 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len, argument
325 r = tls1_process_ticket(s, session_id, len, limit, &ret);
345 memcpy(data.session_id,session_id,len);
361 && (ret=s->ctx->get_session_cb(s,session_id,le
[all...]
H A Dssl.h430 /* session_id - valid? */
432 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st
/external/wpa_supplicant/
H A Deap_sake.c34 u8 session_id; member in struct:eap_sake_data
146 req->session_id = data->session_id;
387 u8 subtype, session_id; local
398 session_id = req->session_id;
403 "session_id %d", subtype, session_id);
407 if (data->session_id_set && data->session_id != session_id) {
[all...]
H A Deap_sake_common.h59 u8 session_id; member in struct:eap_sake_hdr
H A Deap_gpsk.c32 u8 session_id; member in struct:eap_gpsk_data
H A Dtlsv1_client.c42 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
210 /* SessionID session_id */
212 os_memcpy(pos, conn->session_id, conn->session_id_len);
314 /* SessionID session_id */
320 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) {
327 os_memcpy(conn->session_id, pos, conn->session_id_len);
330 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
331 conn->session_id, conn->session_id_len);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sake_common.h55 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sake.c33 u8 session_id; member in struct:eap_sake_data
139 sake->session_id = data->session_id;
375 u8 subtype, session_id; local
386 session_id = req->session_id;
390 "session_id %d", subtype, session_id);
394 if (data->session_id_set && data->session_id != session_id) {
[all...]
H A Deap_gpsk.c31 u8 session_id; member in struct:eap_gpsk_data
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sake.c32 u8 session_id; member in struct:eap_sake_data
77 if (os_get_random(&data->session_id, 1)) {
83 data->session_id);
122 sake->session_id = data->session_id;
261 u8 version, session_id, subtype; local
272 session_id = resp->session_id;
280 if (session_id != data->session_id) {
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_client_i.h29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
/external/dropbear/
H A Dsession.h133 unsigned char *session_id; /* this is the hash from the first kex */ member in struct:sshsession
/external/ppp/pppd/plugins/radius/
H A Dradius.c117 char session_id[MAXSESSIONID + 1]; member in struct:radius_state
864 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id));
867 rstate.session_id, 0, VENDOR_NONE);
954 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
1094 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
/external/openssl/include/openssl/
H A Dssl.h430 /* session_id - valid? */
432 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st

Completed in 245 milliseconds