Searched refs:session_id (Results 1 - 25 of 48) sorted by relevance

12

/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_sake.c33 u8 session_id; member in struct:eap_sake_data
139 sake->session_id = data->session_id;
375 u8 subtype, session_id; local
386 session_id = req->session_id;
390 "session_id %d", subtype, session_id);
394 if (data->session_id_set && data->session_id != session_id) {
[all...]
/freebsd-9.3-release/crypto/openssh/
H A Dkexc25519c.c120 if (kex->session_id == NULL) {
122 kex->session_id = xmalloc(kex->session_id_len);
123 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexc25519s.c98 if (kex->session_id == NULL) {
100 kex->session_id = xmalloc(kex->session_id_len);
101 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexdhc.c152 if (kex->session_id == NULL) {
154 kex->session_id = xmalloc(kex->session_id_len);
155 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexdhs.c133 if (kex->session_id == NULL) {
135 kex->session_id = xmalloc(kex->session_id_len);
136 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexecdhc.c149 if (kex->session_id == NULL) {
151 kex->session_id = xmalloc(kex->session_id_len);
152 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexecdhs.c127 if (kex->session_id == NULL) {
129 kex->session_id = xmalloc(kex->session_id_len);
130 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgexc.c198 if (kex->session_id == NULL) {
200 kex->session_id = xmalloc(kex->session_id_len);
201 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgexs.c179 if (kex->session_id == NULL) {
181 kex->session_id = xmalloc(kex->session_id_len);
182 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dsshconnect1.c52 u_char session_id[16]; variable
116 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) {
184 ssh_digest_update(md, session_id, 16) < 0 ||
545 derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id);
572 if (BN_add_word(key, session_key[i] ^ session_id[i])
H A Dauth-rsa.c59 extern u_char session_id[16];
114 ssh_digest_update(md, session_id, 16) < 0 ||
H A Dkex.h123 u_char *session_id; member in struct:Kex
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap_server_sake.c32 u8 session_id; member in struct:eap_sake_data
77 if (os_get_random(&data->session_id, 1)) {
83 data->session_id);
122 sake->session_id = data->session_id;
261 u8 version, session_id, subtype; local
272 session_id = resp->session_id;
280 if (session_id != data->session_id) {
[all...]
/freebsd-9.3-release/crypto/openssl/ssl/
H A Dssl_asn1.c72 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st
156 a.session_id.length = in->session_id_length;
157 a.session_id.type = V_ASN1_OCTET_STRING;
158 a.session_id.data = in->session_id;
218 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING);
257 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING);
361 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */
362 os.length = sizeof(ret->session_id);
365 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id));
[all...]
H A Dssl_sess.c216 return s->session_id;
243 /* else - woops a session_id match */
314 if (!cb(s, ss->session_id, &tmp)) {
334 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp);
338 if (SSL_has_matching_session_id(s, ss->session_id,
373 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len, argument
387 if (limit - session_id < len) {
393 r = tls1_process_ticket(s, session_id, len, limit, &ret);
413 memcpy(data.session_id, session_id, le
[all...]
/freebsd-9.3-release/sys/netgraph/
H A Dng_l2tp.c404 u_int16_t session_id; local
416 for (session_id = i = 0; i < 4; i++) {
420 session_id = (session_id << 4) | j;
430 hpriv->conf.session_id = session_id;
435 hash = SESSHASH(hpriv->conf.session_id);
516 hpriv = ng_l2tp_find_session(priv, conf->session_id);
529 u_int16_t session_id; local
533 if (msg->header.arglen != sizeof(session_id)) {
578 uint16_t session_id; local
1506 u_int16_t session_id = 0; local
[all...]
H A Dng_l2tp.h97 u_int16_t session_id; /* local session id */ member in struct:ng_l2tp_sess_config
106 { "session_id", &ng_parse_hint16_type }, \
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dtlsv1_server_i.h30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
H A Dtlsv1_client_i.h29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
/freebsd-9.3-release/usr.sbin/ppp/
H A Dradius.h84 char session_id[256]; /* Unique session ID */ member in struct:radacct
/freebsd-9.3-release/contrib/wpa/src/eap_common/
H A Deap_sake_common.h55 u8 session_id; member in struct:eap_sake_hdr
/freebsd-9.3-release/contrib/tcpdump/
H A Dprint-rpki-rtr.c49 u_char session_id[2]; /* Session id */ member in union:rpki_rtr_pdu_::__anon4153
206 EXTRACT_16BITS(pdu_header->u.session_id),
224 EXTRACT_16BITS(pdu_header->u.session_id));
H A Dprint-lwapp.c75 u_int8_t session_id[4]; member in struct:lwapp_control_header
245 EXTRACT_32BITS(lwapp_control_header->session_id));
/freebsd-9.3-release/lib/libtacplus/
H A Dtaclib_private.h160 u_int8_t session_id[4]; member in struct:tac_msg
H A Dtaclib.c328 MD5Update(&base_ctx, msg->session_id, sizeof msg->session_id);
431 msg->session_id[0] = r >> 8;
432 msg->session_id[1] = r;
434 msg->session_id[2] = r >> 8;
435 msg->session_id[3] = r;
559 if (memcmp(msg->session_id, h->request.session_id,
560 sizeof msg->session_id) != 0) {

Completed in 136 milliseconds

12