Searched refs:session_id (Results 1 - 10 of 10) sorted by relevance

/asus-wl-520gu-7.0.1.45/src/linux/linux/drivers/net/skfp/h/
H A Dsba.h67 u_short session_id ; member in struct:s_sba_sessions
/asus-wl-520gu-7.0.1.45/src/linux/linux/include/linux/
H A Dif_ppp.h113 __u16 session_id; /* if zero, get tunnel stats */ member in struct:pppol2tp_ioc_stats
122 int using_ipsec; /* valid only for session_id == 0 */
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/plugins/
H A Dpppol2tp.c79 void (*pppol2tp_send_accm_hook)(int tunnel_id, int session_id, uint32_t send_accm, uint32_t recv_accm) = NULL;
82 void (*pppol2tp_ip_updown_hook)(int tunnel_id, int session_id, int up) = NULL;
110 "PPPoL2TP session_id.",
450 fatal("tunnel_id/session_id values not specified");
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/plugins/
H A Dpppol2tp.c79 void (*pppol2tp_send_accm_hook)(int tunnel_id, int session_id, uint32_t send_accm, uint32_t recv_accm) = NULL;
82 void (*pppol2tp_ip_updown_hook)(int tunnel_id, int session_id, int up) = NULL;
110 "PPPoL2TP session_id.",
444 fatal("tunnel_id/session_id values not specified");
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/plugins/radius/
H A Dradius.c110 char session_id[MAXSESSIONID + 1]; member in struct:radius_state
855 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id));
858 rstate.session_id, 0, VENDOR_NONE);
944 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
1036 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/plugins/radius/
H A Dradius.c110 char session_id[MAXSESSIONID + 1]; member in struct:radius_state
855 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id));
858 rstate.session_id, 0, VENDOR_NONE);
944 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
1036 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
/asus-wl-520gu-7.0.1.45/src/linux/linux/drivers/net/
H A Dpppol2tp.c31 * attaches it to a bound UDP socket with local tunnel_id / session_id and
32 * peer tunnel_id / session_id set. Data can then be sent or received using
36 * When a PPPoL2TP socket is connected with local and peer session_id values
56 * sax.pppol2tp.s_session = session_id;
216 * x=tunnel_id, y=session_id */
323 * The session_id SHOULD be random according to RFC2661, but several
325 * session_ids. So we do a real hash on the session_id, rather than a
329 pppol2tp_session_id_hash(struct pppol2tp_tunnel *tunnel, u16 session_id) argument
331 unsigned long hash_val = (unsigned long) session_id;
338 pppol2tp_session_find(struct pppol2tp_tunnel *tunnel, u16 session_id) argument
543 u16 tunnel_id, session_id; local
[all...]
H A Dsb1000.c773 unsigned char st[2], buffer[FRAMESIZE], session_id, frame_id;
801 session_id = lp->rx_session_id[ns];
803 if (st[0] == session_id) {
811 } else if (st[0] == (session_id | 0x40)) {
827 skb ? session_id : session_id | 0x40, frame_id);
1090 /* set session_id, frame_id and pkt_type too */
769 unsigned char st[2], buffer[FRAMESIZE], session_id, frame_id; local
/asus-wl-520gu-7.0.1.45/src/router/shared.asus/openssl/
H A Dssl.h415 /* session_id - valid? */
417 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st
/asus-wl-520gu-7.0.1.45/src/router/libbcmcrypto/openssl/
H A Dssl.h429 /* session_id - valid? */
431 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st

Completed in 87 milliseconds