| /src/external/bsd/tcpdump/dist/ |
| print-someip.c | 86 uint16_t session_id; local 113 session_id = request_id & 0x0000FFFF; 115 ND_PRINT(", client %u, session %u", client_id, session_id);
|
| print-rpki-rtr.c | 47 nd_uint16_t session_id; /* Session id */ member in union:rpki_rtr_pdu_::__anon8107 231 GET_BE_U_2(pdu_header->u.session_id), 255 GET_BE_U_2(pdu_header->u.session_id));
|
| print-lwapp.c | 72 nd_uint32_t session_id; member in struct:lwapp_control_header 252 GET_BE_U_4(lwapp_control_header->session_id));
|
| /src/sys/net/ |
| if_pppoe.h | 60 u_int session_id; /* if state == PPPOE_STATE_SESSION */ member in struct:pppoeconnectionstate
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_asn1.c | 23 ASN1_OCTET_STRING *session_id; member in struct:__anon1643 53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; 160 ssl_session_oinit(&as.session_id, &session_id, 161 in->session_id, in->session_id_length); 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, 295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH))
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_asn1.c | 23 ASN1_OCTET_STRING *session_id; member in struct:__anon2179 52 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 111 ASN1_OCTET_STRING master_key, session_id, sid_ctx; 156 ssl_session_oinit(&as.session_id, &session_id, 157 in->session_id, in->session_id_length); 288 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, 289 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH))
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_asn1.c | 24 ASN1_OCTET_STRING *session_id; member in struct:__anon115 55 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 116 ASN1_OCTET_STRING master_key, session_id, sid_ctx; 165 ssl_session_oinit(&as.session_id, &session_id, 166 in->session_id, in->session_id_length); 314 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, 315 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH))
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| sshkdf.c | 40 const unsigned char *session_id, size_t session_id_len, 51 unsigned char *session_id; member in struct:__anon558 88 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); 104 || !ossl_prov_memdup(src->session_id, src->session_id_len, 105 &dest->session_id, &dest->session_id_len) 194 if (ctx->session_id == NULL) { 205 ctx->session_id, ctx->session_id_len, 260 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) 340 const unsigned char *session_id, size_t session_id_len, 365 if (!EVP_DigestUpdate(md, session_id, session_id_len) [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
| sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 49 unsigned char *session_id; member in struct:__anon1605 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); 121 if (ctx->session_id == NULL) { 131 ctx->session_id, ctx->session_id_len, 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) 230 const unsigned char *session_id, size_t session_id_len, 255 if (!EVP_DigestUpdate(md, session_id, session_id_len))
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| handshake_helper.h | 66 ssl_session_id_t session_id; member in struct:handshake_result
|
| bad_dtls_test.c | 51 static unsigned char session_id[32]; variable 108 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); 154 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) 258 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); 456 RAND_bytes(session_id, sizeof(session_id));
|
| /src/crypto/external/apache2/openssl/dist/test/helpers/ |
| handshake.h | 76 ssl_session_id_t session_id; member in struct:handshake_result
|
| /src/crypto/external/bsd/openssl/dist/test/helpers/ |
| handshake.h | 76 ssl_session_id_t session_id; member in struct:handshake_result
|
| /src/external/bsd/ppp/dist/pppd/plugins/pppol2tp/ |
| l2tp_event.h | 91 uint16_t session_id; member in struct:openl2tp_tlv_session_id
|
| /src/external/bsd/wpa/dist/hs20/client/ |
| spp_client.c | 27 const char *session_id, 109 const char *session_id, 126 if (session_id) 128 session_id); 328 const char *session_id, 353 node = build_spp_post_dev_data(ctx, &ns, session_id, 410 const char *session_id, 423 ctx, session_id, 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); 438 const char *session_id) 605 char *session_id = NULL; local 826 char *status, *session_id; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 133 sake->session_id = data->session_id; 379 u8 subtype, session_id, id; local 391 session_id = req->session_id; 395 "session_id %d", subtype, session_id); 399 if (data->session_id_set && data->session_id != session_id) { [all...] |
| eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 152 os_free(data->session_id); 226 os_free(data->session_id); 227 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 230 if (data->session_id) { 232 data->session_id, data->id_len); 352 os_free(data->session_id); 353 data->session_id = NULL; 418 if (data->session_id == NULL) 421 id = os_memdup(data->session_id, data->id_len) [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_gpsk.c | 27 u8 session_id[128]; member in struct:eap_gpsk_data 429 data->session_id, &data->id_len) < 0) { 435 data->session_id, data->id_len); 619 sid = os_memdup(data->session_id, data->id_len);
|
| eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
| tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
| /src/sys/dev/iscsi/ |
| iscsi_ioctl.h | 63 uint32_t session_id; member in struct:__anon3138 108 session_id 158 uint32_t session_id; member in struct:__anon3140 164 session_id 172 uint32_t session_id; member in struct:__anon3141 179 session_id 189 uint32_t session_id; member in struct:__anon3142 196 session_id 206 uint32_t session_id; member in struct:__anon3143 220 session_id 284 uint32_t session_id; member in struct:__anon3145 382 uint32_t session_id; member in struct:__anon3149 [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| bad_dtls_test.c | 53 static unsigned char session_id[32]; variable 191 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); 237 if (!PACKET_get_length_prefixed_1(&pkt, &pkt2) || !PACKET_equal(&pkt2, session_id, sizeof(session_id))) 456 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); 680 RAND_bytes(session_id, sizeof(session_id));
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| bad_dtls_test.c | 53 static unsigned char session_id[32]; variable 110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); 157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) 261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); 475 RAND_bytes(session_id, sizeof(session_id));
|