Searched refs:session_id (Results 26 - 50 of 52) sorted by relevance

123

/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/
H A Dssl-43-ciphers.c290 uint32_t session_id; member in struct:__anon4963
608 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument
613 handle->session_id = session_id;
650 uint32_t session_id = (pr<<16) | (port<<8) | (i+1); local
659 //fprintf(stderr, "session_id: %d\n", session_id);
660 client = ssl_test_handle_create(session_id, false, false/*client*/,
H A Dssl-39-echo.c320 uint32_t session_id; member in struct:__anon4960
654 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument
659 handle->session_id = session_id;
697 uint32_t session_id = (k+1) << 16 | 1 << 8 | (i+1); local
698 //fprintf(stderr, "session_id: %d\n", session_id);
699 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/,
702 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/,
706 require_noerr(SSLSetPeerID(server->handle, &session_id, sizeo
[all...]
H A Dssl-45-tls12.c43 uint32_t session_id; member in struct:__anon4965
H A Dssl-47-falsestart.c37 uint32_t session_id; member in struct:__anon4966
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-extension/
H A Dl2tp_rfc.c142 u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id);
144 u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id);
610 hdr->session_id = 0;
749 /* hdr->session_id = htons(rfc->peer_session_id); */
834 hdr->session_id = htons(rfc->peer_session_id);
870 u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id)
878 //IOLog("handle_data, rfc = %p, from 0x%x, peer address = 0x%x, our tunnel id = %d, tunnel id = %d, our session id = %d, session id = %d\n", rfc, from, rfc->peer_address, rfc->our_tunnel_id, tunnel_id, rfc->our_session_id, session_id);
883 && rfc->our_session_id == session_id
892 p = &hdr->session_id;
935 u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id)
869 l2tp_handle_data(struct l2tp_rfc *rfc, mbuf_t m, struct sockaddr *from, u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id) argument
934 l2tp_handle_control(struct l2tp_rfc *rfc, mbuf_t m, struct sockaddr *from, u_int16_t flags, u_int16_t len, u_int16_t tunnel_id, u_int16_t session_id) argument
1161 u_int16_t flags, len, tunnel_id, session_id, pulllen; local
[all...]
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dkex.h129 u_char *session_id; member in struct:Kex
H A Dauth-rsa.c63 extern u_char session_id[16];
117 MD5_Update(&md, session_id, 16);
H A Dsshd.c237 u_char session_id[16]; variable
2349 cookie, session_id);
2355 session_key[i] ^= session_id[i];
2377 session_id[i] = session_key[i] ^ session_key[i + 16];
2383 mm_ssh1_session_id(session_id);
2502 session_id2 = kex->session_id;
H A Dauthfd.c372 u_char session_id[16],
393 buffer_append(&buffer, session_id, 16);
370 ssh_decrypt_challenge(AuthenticationConnection *auth, Key* key, BIGNUM *challenge, u_char session_id[16], u_int response_type, u_char response[16]) argument
H A Dmonitor_wrap.c589 buffer_put_string(m, kex->session_id, kex->session_id_len);
1072 mm_ssh1_session_id(u_char session_id[16]) argument
1081 buffer_put_char(&m, session_id[i]);
H A Dssh-agent.c256 u_char buf[32], mdbuf[16], session_id[16]; local
278 buffer_get(&e->request, session_id, 16);
300 MD5_Update(&md, session_id, 16);
H A Dkex.c533 /* K1 = HASH(K || H || "A" || session_id) */
539 EVP_DigestUpdate(&md, kex->session_id, kex->session_id_len);
H A Dmonitor.c115 extern u_char session_id[];
1582 session_id[i] = buffer_get_char(m);
1849 kex->session_id = buffer_get_string(m, &kex->session_id_len);
1852 timingsafe_bcmp(kex->session_id, session_id2, session_id2_len) != 0)
H A Dsshconnect2.c282 session_id2 = kex->session_id;
/macosx-10.9.5/postfix-252/postfix/src/tls/
H A Dtls_server.c169 static SSL_SESSION *get_server_session_cb(SSL *ssl, unsigned char *session_id, argument
190 GEN_CACHE_ID(cache_id, session_id, session_id_length, TLScontext->serverid);
229 GEN_CACHE_ID(cache_id, session->session_id, session->session_id_length,
252 GEN_CACHE_ID(cache_id, session->session_id, session->session_id_length,
/macosx-10.9.5/ruby-104/ruby/ext/openssl/lib/openssl/
H A Dssl.rb161 session_id = prng.bytes(16).unpack('H*')[0]
162 @ctx.session_id_context = session_id
/macosx-10.9.5/ruby-104/ruby/ext/openssl/
H A Dossl_ssl_session.c81 return memcmp(a->session_id,b-> session_id, a->session_id_length);
/macosx-10.9.5/tcpdump-56/tcpdump/
H A Dprint-lwapp.c75 u_int8_t session_id[4]; member in struct:lwapp_control_header
245 EXTRACT_32BITS(lwapp_control_header->session_id));
/macosx-10.9.5/ppp-727.90.1/Drivers/PPPoE/PPPoE-extension/
H A Dpppoe_rfc.c162 u_int16_t session_id; /* session id between client and server */ member in struct:pppoe_rfc
381 rfc->session_id = pppoe_unique_session_id++; // generate a session id
384 send_PAD(rfc, rfc->peer_address, PPPOE_PADS, rfc->session_id, &rfc->ac_name, &rfc->service,
470 send_PAD(rfc, rfc->peer_address, PPPOE_PADT, rfc->session_id, 0, 0, 0, 0, 0);
608 p->sessid = htons(rfc->session_id);
1120 rfc->session_id = sessid;
1146 IOLog("PPPoE receive PADT (%p): requested session id = 0x%x, our session id = 0x%x\n", rfc, sessid, rfc->session_id);
1148 if ((sessid == rfc->session_id) && !bcmp(rfc->peer_address, from, ETHER_ADDR_LEN)) {
1206 //IOLog("handle_data, rfc = %p, rfc->state = %d, rfc->session_id = 0x%x, rfc->session_id
[all...]
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-plugin/
H A Dl2tp.h146 u_int16_t session_id; member in struct:l2tp_parameters
H A Dmain.c1001 our_params.session_id = getpid(); /* our session ID - use pid as unique number */
1698 setsockopt(fd, PPPPROTO_L2TP, L2TP_OPT_SESSION_ID, &our_params->session_id, 2);
1709 setsockopt(fd, PPPPROTO_L2TP, L2TP_OPT_PEER_SESSION_ID, &peer_params->session_id, 2);
/macosx-10.9.5/apache-786.1/httpd/modules/ssl/
H A Dssl_toolkit_compat.h77 #define SSL_SESSION_get_session_id(s) (s->session_id)
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Dpfkey_racoon.c2788 struct sadb_session_id *session_id; local
2801 session_id = ALIGNED_CAST(struct sadb_session_id *)mhp[SADB_EXT_SESSION_ID];
2813 if (!session_id->sadb_session_id_v[0]) {
2820 session = ALIGNED_CAST(__typeof__(session))session_id->sadb_session_id_v[0];
/macosx-10.9.5/smb-697.95.1/kernel/netsmb/
H A Dsmb_iod.c933 (smb2_hdr->session_id == 0))
/macosx-10.9.5/xnu-2422.115.4/bsd/netkey/
H A Dkey.c9663 struct sadb_session_id *session_id; local
9734 session_id = (__typeof__(session_id))
9741 session_id->sadb_session_id_v,

Completed in 246 milliseconds

123