/asus-wl-520gu-7.0.1.45/src/linux/linux/drivers/net/skfp/h/ |
H A D | sba.h | 67 u_short session_id ; member in struct:s_sba_sessions
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/include/linux/ |
H A D | if_ppp.h | 113 __u16 session_id; /* if zero, get tunnel stats */ member in struct:pppol2tp_ioc_stats 122 int using_ipsec; /* valid only for session_id == 0 */
|
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/plugins/ |
H A D | pppol2tp.c | 79 void (*pppol2tp_send_accm_hook)(int tunnel_id, int session_id, uint32_t send_accm, uint32_t recv_accm) = NULL; 82 void (*pppol2tp_ip_updown_hook)(int tunnel_id, int session_id, int up) = NULL; 110 "PPPoL2TP session_id.", 450 fatal("tunnel_id/session_id values not specified");
|
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/plugins/ |
H A D | pppol2tp.c | 79 void (*pppol2tp_send_accm_hook)(int tunnel_id, int session_id, uint32_t send_accm, uint32_t recv_accm) = NULL; 82 void (*pppol2tp_ip_updown_hook)(int tunnel_id, int session_id, int up) = NULL; 110 "PPPoL2TP session_id.", 444 fatal("tunnel_id/session_id values not specified");
|
/asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/plugins/radius/ |
H A D | radius.c | 110 char session_id[MAXSESSIONID + 1]; member in struct:radius_state 855 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id)); 858 rstate.session_id, 0, VENDOR_NONE); 944 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id, 1036 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
|
/asus-wl-520gu-7.0.1.45/src/router/pppd.mppe/pppd/plugins/radius/ |
H A D | radius.c | 110 char session_id[MAXSESSIONID + 1]; member in struct:radius_state 855 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id)); 858 rstate.session_id, 0, VENDOR_NONE); 944 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id, 1036 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/drivers/net/ |
H A D | pppol2tp.c | 31 * attaches it to a bound UDP socket with local tunnel_id / session_id and 32 * peer tunnel_id / session_id set. Data can then be sent or received using 36 * When a PPPoL2TP socket is connected with local and peer session_id values 56 * sax.pppol2tp.s_session = session_id; 216 * x=tunnel_id, y=session_id */ 323 * The session_id SHOULD be random according to RFC2661, but several 325 * session_ids. So we do a real hash on the session_id, rather than a 329 pppol2tp_session_id_hash(struct pppol2tp_tunnel *tunnel, u16 session_id) argument 331 unsigned long hash_val = (unsigned long) session_id; 338 pppol2tp_session_find(struct pppol2tp_tunnel *tunnel, u16 session_id) argument 543 u16 tunnel_id, session_id; local [all...] |
H A D | sb1000.c | 773 unsigned char st[2], buffer[FRAMESIZE], session_id, frame_id; 801 session_id = lp->rx_session_id[ns]; 803 if (st[0] == session_id) { 811 } else if (st[0] == (session_id | 0x40)) { 827 skb ? session_id : session_id | 0x40, frame_id); 1090 /* set session_id, frame_id and pkt_type too */ 769 unsigned char st[2], buffer[FRAMESIZE], session_id, frame_id; local
|
/asus-wl-520gu-7.0.1.45/src/router/shared.asus/openssl/ |
H A D | ssl.h | 415 /* session_id - valid? */ 417 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st
|
/asus-wl-520gu-7.0.1.45/src/router/libbcmcrypto/openssl/ |
H A D | ssl.h | 429 /* session_id - valid? */ 431 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st
|