/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/ |
H A D | ssl-43-ciphers.c | 290 uint32_t session_id; member in struct:__anon4963 608 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument 613 handle->session_id = session_id; 650 uint32_t session_id = (pr<<16) | (port<<8) | (i+1); local 659 //fprintf(stderr, "session_id: %d\n", session_id); 660 client = ssl_test_handle_create(session_id, false, false/*client*/,
|
H A D | ssl-39-echo.c | 320 uint32_t session_id; member in struct:__anon4960 654 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument 659 handle->session_id = session_id; 697 uint32_t session_id = (k+1) << 16 | 1 << 8 | (i+1); local 698 //fprintf(stderr, "session_id: %d\n", session_id); 699 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/, 702 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/, 706 require_noerr(SSLSetPeerID(server->handle, &session_id, sizeo [all...] |
H A D | ssl-45-tls12.c | 43 uint32_t session_id; member in struct:__anon4965
|
H A D | ssl-47-falsestart.c | 37 uint32_t session_id; member in struct:__anon4966
|
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-extension/ |
H A D | l2tp_rfc.c | 142 u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id); 144 u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id); 610 hdr->session_id = 0; 749 /* hdr->session_id = htons(rfc->peer_session_id); */ 834 hdr->session_id = htons(rfc->peer_session_id); 870 u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id) 878 //IOLog("handle_data, rfc = %p, from 0x%x, peer address = 0x%x, our tunnel id = %d, tunnel id = %d, our session id = %d, session id = %d\n", rfc, from, rfc->peer_address, rfc->our_tunnel_id, tunnel_id, rfc->our_session_id, session_id); 883 && rfc->our_session_id == session_id 892 p = &hdr->session_id; 935 u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id) 869 l2tp_handle_data(struct l2tp_rfc *rfc, mbuf_t m, struct sockaddr *from, u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id) argument 934 l2tp_handle_control(struct l2tp_rfc *rfc, mbuf_t m, struct sockaddr *from, u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id) argument 1161 u_int16_t flags, len, tunnel_id, session_id, pulllen; local [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | kex.h | 129 u_char *session_id; member in struct:Kex
|
H A D | auth-rsa.c | 63 extern u_char session_id[16]; 117 MD5_Update(&md, session_id, 16);
|
H A D | sshd.c | 237 u_char session_id[16]; variable 2349 cookie, session_id); 2355 session_key[i] ^= session_id[i]; 2377 session_id[i] = session_key[i] ^ session_key[i + 16]; 2383 mm_ssh1_session_id(session_id); 2502 session_id2 = kex->session_id;
|
H A D | authfd.c | 372 u_char session_id[16], 393 buffer_append(&buffer, session_id, 16); 370 ssh_decrypt_challenge(AuthenticationConnection *auth, Key* key, BIGNUM *challenge, u_char session_id[16], u_int response_type, u_char response[16]) argument
|
H A D | monitor_wrap.c | 589 buffer_put_string(m, kex->session_id, kex->session_id_len); 1072 mm_ssh1_session_id(u_char session_id[16]) argument 1081 buffer_put_char(&m, session_id[i]);
|
H A D | ssh-agent.c | 256 u_char buf[32], mdbuf[16], session_id[16]; local 278 buffer_get(&e->request, session_id, 16); 300 MD5_Update(&md, session_id, 16);
|
H A D | kex.c | 533 /* K1 = HASH(K || H || "A" || session_id) */ 539 EVP_DigestUpdate(&md, kex->session_id, kex->session_id_len);
|
H A D | monitor.c | 115 extern u_char session_id[]; 1582 session_id[i] = buffer_get_char(m); 1849 kex->session_id = buffer_get_string(m, &kex->session_id_len); 1852 timingsafe_bcmp(kex->session_id, session_id2, session_id2_len) != 0)
|
H A D | sshconnect2.c | 282 session_id2 = kex->session_id;
|
/macosx-10.9.5/postfix-252/postfix/src/tls/ |
H A D | tls_server.c | 169 static SSL_SESSION *get_server_session_cb(SSL *ssl, unsigned char *session_id, argument 190 GEN_CACHE_ID(cache_id, session_id, session_id_length, TLScontext->serverid); 229 GEN_CACHE_ID(cache_id, session->session_id, session->session_id_length, 252 GEN_CACHE_ID(cache_id, session->session_id, session->session_id_length,
|
/macosx-10.9.5/ruby-104/ruby/ext/openssl/lib/openssl/ |
H A D | ssl.rb | 161 session_id = prng.bytes(16).unpack('H*')[0] 162 @ctx.session_id_context = session_id
|
/macosx-10.9.5/ruby-104/ruby/ext/openssl/ |
H A D | ossl_ssl_session.c | 81 return memcmp(a->session_id,b-> session_id, a->session_id_length);
|
/macosx-10.9.5/tcpdump-56/tcpdump/ |
H A D | print-lwapp.c | 75 u_int8_t session_id[4]; member in struct:lwapp_control_header 245 EXTRACT_32BITS(lwapp_control_header->session_id));
|
/macosx-10.9.5/ppp-727.90.1/Drivers/PPPoE/PPPoE-extension/ |
H A D | pppoe_rfc.c | 162 u_int16_t session_id; /* session id between client and server */ member in struct:pppoe_rfc 381 rfc->session_id = pppoe_unique_session_id++; // generate a session id 384 send_PAD(rfc, rfc->peer_address, PPPOE_PADS, rfc->session_id, &rfc->ac_name, &rfc->service, 470 send_PAD(rfc, rfc->peer_address, PPPOE_PADT, rfc->session_id, 0, 0, 0, 0, 0); 608 p->sessid = htons(rfc->session_id); 1120 rfc->session_id = sessid; 1146 IOLog("PPPoE receive PADT (%p): requested session id = 0x%x, our session id = 0x%x\n", rfc, sessid, rfc->session_id); 1148 if ((sessid == rfc->session_id) && !bcmp(rfc->peer_address, from, ETHER_ADDR_LEN)) { 1206 //IOLog("handle_data, rfc = %p, rfc->state = %d, rfc->session_id = 0x%x, rfc->session_id [all...] |
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-plugin/ |
H A D | l2tp.h | 146 u_int16_t session_id; member in struct:l2tp_parameters
|
H A D | main.c | 1001 our_params.session_id = getpid(); /* our session ID - use pid as unique number */ 1698 setsockopt(fd, PPPPROTO_L2TP, L2TP_OPT_SESSION_ID, &our_params->session_id, 2); 1709 setsockopt(fd, PPPPROTO_L2TP, L2TP_OPT_PEER_SESSION_ID, &peer_params->session_id, 2);
|
/macosx-10.9.5/apache-786.1/httpd/modules/ssl/ |
H A D | ssl_toolkit_compat.h | 77 #define SSL_SESSION_get_session_id(s) (s->session_id)
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | pfkey_racoon.c | 2788 struct sadb_session_id *session_id; local 2801 session_id = ALIGNED_CAST(struct sadb_session_id *)mhp[SADB_EXT_SESSION_ID]; 2813 if (!session_id->sadb_session_id_v[0]) { 2820 session = ALIGNED_CAST(__typeof__(session))session_id->sadb_session_id_v[0];
|
/macosx-10.9.5/smb-697.95.1/kernel/netsmb/ |
H A D | smb_iod.c | 933 (smb2_hdr->session_id == 0))
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netkey/ |
H A D | key.c | 9663 struct sadb_session_id *session_id; local 9734 session_id = (__typeof__(session_id)) 9741 session_id->sadb_session_id_v,
|