/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_sake.c | 33 u8 session_id; member in struct:eap_sake_data 139 sake->session_id = data->session_id; 375 u8 subtype, session_id; local 386 session_id = req->session_id; 390 "session_id %d", subtype, session_id); 394 if (data->session_id_set && data->session_id != session_id) { [all...] |
/freebsd-9.3-release/crypto/openssh/ |
H A D | kexc25519c.c | 120 if (kex->session_id == NULL) { 122 kex->session_id = xmalloc(kex->session_id_len); 123 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexc25519s.c | 98 if (kex->session_id == NULL) { 100 kex->session_id = xmalloc(kex->session_id_len); 101 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexdhc.c | 152 if (kex->session_id == NULL) { 154 kex->session_id = xmalloc(kex->session_id_len); 155 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexdhs.c | 133 if (kex->session_id == NULL) { 135 kex->session_id = xmalloc(kex->session_id_len); 136 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexecdhc.c | 149 if (kex->session_id == NULL) { 151 kex->session_id = xmalloc(kex->session_id_len); 152 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexecdhs.c | 127 if (kex->session_id == NULL) { 129 kex->session_id = xmalloc(kex->session_id_len); 130 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgexc.c | 198 if (kex->session_id == NULL) { 200 kex->session_id = xmalloc(kex->session_id_len); 201 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgexs.c | 179 if (kex->session_id == NULL) { 181 kex->session_id = xmalloc(kex->session_id_len); 182 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | sshconnect1.c | 52 u_char session_id[16]; variable 116 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { 184 ssh_digest_update(md, session_id, 16) < 0 || 545 derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id); 572 if (BN_add_word(key, session_key[i] ^ session_id[i])
|
H A D | auth-rsa.c | 59 extern u_char session_id[16]; 114 ssh_digest_update(md, session_id, 16) < 0 ||
|
H A D | kex.h | 123 u_char *session_id; member in struct:Kex
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 32 u8 session_id; member in struct:eap_sake_data 77 if (os_get_random(&data->session_id, 1)) { 83 data->session_id); 122 sake->session_id = data->session_id; 261 u8 version, session_id, subtype; local 272 session_id = resp->session_id; 280 if (session_id != data->session_id) { [all...] |
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 72 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st 156 a.session_id.length = in->session_id_length; 157 a.session_id.type = V_ASN1_OCTET_STRING; 158 a.session_id.data = in->session_id; 218 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); 257 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); 361 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */ 362 os.length = sizeof(ret->session_id); 365 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id)); [all...] |
H A D | ssl_sess.c | 216 return s->session_id; 243 /* else - woops a session_id match */ 314 if (!cb(s, ss->session_id, &tmp)) { 334 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp); 338 if (SSL_has_matching_session_id(s, ss->session_id, 373 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len, argument 387 if (limit - session_id < len) { 393 r = tls1_process_ticket(s, session_id, len, limit, &ret); 413 memcpy(data.session_id, session_id, le [all...] |
/freebsd-9.3-release/sys/netgraph/ |
H A D | ng_l2tp.c | 404 u_int16_t session_id; local 416 for (session_id = i = 0; i < 4; i++) { 420 session_id = (session_id << 4) | j; 430 hpriv->conf.session_id = session_id; 435 hash = SESSHASH(hpriv->conf.session_id); 516 hpriv = ng_l2tp_find_session(priv, conf->session_id); 529 u_int16_t session_id; local 533 if (msg->header.arglen != sizeof(session_id)) { 578 uint16_t session_id; local 1506 u_int16_t session_id = 0; local [all...] |
H A D | ng_l2tp.h | 97 u_int16_t session_id; /* local session id */ member in struct:ng_l2tp_sess_config 106 { "session_id", &ng_parse_hint16_type }, \
|
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_server_i.h | 30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
H A D | tlsv1_client_i.h | 29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
/freebsd-9.3-release/usr.sbin/ppp/ |
H A D | radius.h | 84 char session_id[256]; /* Unique session ID */ member in struct:radacct
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_sake_common.h | 55 u8 session_id; member in struct:eap_sake_hdr
|
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-rpki-rtr.c | 49 u_char session_id[2]; /* Session id */ member in union:rpki_rtr_pdu_::__anon4153 206 EXTRACT_16BITS(pdu_header->u.session_id), 224 EXTRACT_16BITS(pdu_header->u.session_id));
|
H A D | print-lwapp.c | 75 u_int8_t session_id[4]; member in struct:lwapp_control_header 245 EXTRACT_32BITS(lwapp_control_header->session_id));
|
/freebsd-9.3-release/lib/libtacplus/ |
H A D | taclib_private.h | 160 u_int8_t session_id[4]; member in struct:tac_msg
|
H A D | taclib.c | 328 MD5Update(&base_ctx, msg->session_id, sizeof msg->session_id); 431 msg->session_id[0] = r >> 8; 432 msg->session_id[1] = r; 434 msg->session_id[2] = r >> 8; 435 msg->session_id[3] = r; 559 if (memcmp(msg->session_id, h->request.session_id, 560 sizeof msg->session_id) != 0) {
|