Searched refs:sessionIDLength (Results 1 - 8 of 8) sorted by relevance
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/ |
H A D | sslServer.cpp | 252 size_t *sessionIDLength, // RETURNED 483 *sessionIDLength = MAX_SESSION_ID_LENGTH; 485 sessionIDLength); 616 size_t sessionIDLength, 643 for(unsigned dex=0; dex<sessionIDLength; dex++) { 645 if(((dex % 8) == 7) && (dex != (sessionIDLength - 1))) { 698 size_t sessionIDLength; local 1021 &sessionIDLength, 1036 sessionIDLength, 222 sslServe( otSocket listenSock, unsigned short portNum, SSLProtocol tryVersion, const char *acceptedProts, CFArrayRef serverCerts, char *password, CFArrayRef encryptServerCerts, bool allowExpired, bool allowAnyRoot, bool allowExpiredRoot, bool disableCertVerify, char *anchorFile, bool replaceAnchors, char cipherRestrict, SSLAuthenticate authenticate, unsigned char *dhParams, unsigned dhParamsLen, CFArrayRef acceptableDNList, bool resumableEnable, uint32_t sessionCacheTimeout, bool disableAnonCiphers, bool silent, bool pause, SSLProtocol *negVersion, SSLCipherSuite *negCipher, SSLClientCertificateState *certState, Boolean *sessionWasResumed, unsigned char *sessionID, size_t *sessionIDLength, CFArrayRef *peerCerts, char **argv) argument 608 showSSLResult( SSLProtocol tryVersion, char *acceptedProts, OSStatus err, SSLProtocol negVersion, SSLCipherSuite negCipher, Boolean sessionWasResumed, unsigned char *sessionID, size_t sessionIDLength, CFArrayRef peerCerts, bool displayPeerCerts, SSLClientCertificateState certState, char *fileBase) argument
|
H A D | sslViewer.cpp | 177 size_t sessionIDLength; member in struct:__anon5014 745 pargs->sessionIDLength = MAX_SESSION_ID_LENGTH; 747 &pargs->sessionIDLength); 1050 * sessionIDLength 1088 for(unsigned dex=0; dex<pargs.sessionIDLength; dex++) { 1090 if(((dex % 8) == 7) && (dex != (pargs.sessionIDLength - 1))) {
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | SecureTransportPriv.h | 116 * is returned in *sessionIDLength. Caller must allocate the 126 size_t *sessionIDLength); // IN/OUT
|
H A D | sslContext.c | 2188 size_t *sessionIDLength) // IN/OUT 2191 (sessionID == NULL) || (sessionIDLength == NULL) || 2192 (*sessionIDLength < MAX_SESSION_ID_LENGTH)) { 2197 if(ctx->sessionID.length > *sessionIDLength) { 2208 *sessionIDLength = ctx->sessionID.length; 2212 *sessionIDLength = 0; 2184 SSLGetResumableSessionInfo( SSLContextRef ctx, Boolean *sessionWasResumed, void *sessionID, size_t *sessionIDLength) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | SecureTransportPriv.h | 116 * is returned in *sessionIDLength. Caller must allocate the 126 size_t *sessionIDLength); // IN/OUT
|
H A D | sslContext.c | 2188 size_t *sessionIDLength) // IN/OUT 2191 (sessionID == NULL) || (sessionIDLength == NULL) || 2192 (*sessionIDLength < MAX_SESSION_ID_LENGTH)) { 2197 if(ctx->sessionID.length > *sessionIDLength) { 2208 *sessionIDLength = ctx->sessionID.length; 2212 *sessionIDLength = 0; 2184 SSLGetResumableSessionInfo( SSLContextRef ctx, Boolean *sessionWasResumed, void *sessionID, size_t *sessionIDLength) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | SecureTransportPriv.h | 116 * is returned in *sessionIDLength. Caller must allocate the 126 size_t *sessionIDLength); // IN/OUT
|
H A D | sslContext.c | 2188 size_t *sessionIDLength) // IN/OUT 2191 (sessionID == NULL) || (sessionIDLength == NULL) || 2192 (*sessionIDLength < MAX_SESSION_ID_LENGTH)) { 2197 if(ctx->sessionID.length > *sessionIDLength) { 2208 *sessionIDLength = ctx->sessionID.length; 2212 *sessionIDLength = 0; 2184 SSLGetResumableSessionInfo( SSLContextRef ctx, Boolean *sessionWasResumed, void *sessionID, size_t *sessionIDLength) argument
|
Completed in 96 milliseconds