| /src/sys/netinet/ |
| in_l2tp.c | 98 uint32_t sess_id; local 184 sess_id = htonl(var->lv_peer_sess_id); 192 memcpy(mtod(m, uint32_t *), &sess_id, sizeof(uint32_t)); local 247 uint32_t sess_id; local 261 m_copydata(m, off, sizeof(uint32_t), (void *)&sess_id); 262 NTOHL(sess_id); 264 log(LOG_DEBUG, "%s: sess_id = %" PRIu32 "\n", __func__, sess_id); 266 if (sess_id == 0) { 277 var = l2tp_lookup_session_ref(sess_id, &psref) 364 uint32_t sess_id; local [all...] |
| /src/sys/netinet6/ |
| in6_l2tp.c | 102 uint32_t sess_id; local 184 sess_id = htonl(var->lv_peer_sess_id); 190 memcpy(mtod(m, uint32_t *), &sess_id, sizeof(uint32_t)); 243 uint32_t sess_id; local 256 m_copydata(m, off, sizeof(uint32_t), (void *)&sess_id); 257 NTOHL(sess_id); 259 log(LOG_DEBUG, "%s: sess_id = %" PRIu32 "\n", __func__, sess_id); 261 if (sess_id == 0) { 273 var = l2tp_lookup_session_ref(sess_id, &psref) 359 uint32_t sess_id; local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/helpers/ |
| handshake.c | 1429 const unsigned char *sess_id = NULL; local 1648 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); 1657 if (sess_id == NULL || sess_id_len == 0)
|
| /src/crypto/external/bsd/openssl/dist/test/helpers/ |
| handshake.c | 1415 const unsigned char* sess_id = NULL; local 1634 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); 1643 if (sess_id == NULL || sess_id_len == 0)
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| handshake_helper.c | 1437 const unsigned char* sess_id = NULL; local 1655 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); 1664 if (sess_id == NULL || sess_id_len == 0)
|
| /src/external/bsd/openldap/dist/servers/slapd/overlays/ |
| sssvlv.c | 355 int sess_id; local 359 for (sess_id = 0; sess_id < svi_max_percon; sess_id++) { 360 if ( sort_conns[conn_id] && sort_conns[conn_id][sess_id] == so ) 361 return sess_id; 373 int sess_id; local 374 for(sess_id = 0; sess_id < svi_max_percon; sess_id++) 387 int sess_id; local 403 int sess_id; local 437 int sess_id; local 822 int sess_id; local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| eapol_test.c | 369 const u8 *sess_id; local 399 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); 400 if (!sess_id) 408 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) 412 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len);
|
| ctrl_iface.c | 2253 const u8 *sess_id; local 2524 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); 2525 if (sess_id) { 2532 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len);
|
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-agent.c | 689 struct sshbuf *b = NULL, *sess_id = NULL; local 705 if ((r = sshbuf_froms(b, &sess_id)) != 0) 707 if (sshbuf_len(sess_id) == 0) { 746 *sess_idp = sess_id; 747 sess_id = NULL; 755 sshbuf_free(sess_id);
|
| /src/external/bsd/wpa/dist/src/radius/ |
| radius_server.c | 73 unsigned int sess_id; member in struct:radius_session 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 314 sess->sess_id, sess->nas_ip, 371 radius_server_get_session(struct radius_client *client, unsigned int sess_id) 376 if (sess->sess_id == sess_id) { 433 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); 443 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); 466 sess->sess_id = data->next_sess_id++; 658 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); 902 unsigned int sess_id; local [all...] |