Searched refs:sessionIDLength (Results 1 - 8 of 8) sorted by relevance

/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/
H A DsslServer.cpp252 size_t *sessionIDLength, // RETURNED
483 *sessionIDLength = MAX_SESSION_ID_LENGTH;
485 sessionIDLength);
616 size_t sessionIDLength,
643 for(unsigned dex=0; dex<sessionIDLength; dex++) {
645 if(((dex % 8) == 7) && (dex != (sessionIDLength - 1))) {
698 size_t sessionIDLength; local
1021 &sessionIDLength,
1036 sessionIDLength,
222 sslServe( otSocket listenSock, unsigned short portNum, SSLProtocol tryVersion, const char *acceptedProts, CFArrayRef serverCerts, char *password, CFArrayRef encryptServerCerts, bool allowExpired, bool allowAnyRoot, bool allowExpiredRoot, bool disableCertVerify, char *anchorFile, bool replaceAnchors, char cipherRestrict, SSLAuthenticate authenticate, unsigned char *dhParams, unsigned dhParamsLen, CFArrayRef acceptableDNList, bool resumableEnable, uint32_t sessionCacheTimeout, bool disableAnonCiphers, bool silent, bool pause, SSLProtocol *negVersion, SSLCipherSuite *negCipher, SSLClientCertificateState *certState, Boolean *sessionWasResumed, unsigned char *sessionID, size_t *sessionIDLength, CFArrayRef *peerCerts, char **argv) argument
608 showSSLResult( SSLProtocol tryVersion, char *acceptedProts, OSStatus err, SSLProtocol negVersion, SSLCipherSuite negCipher, Boolean sessionWasResumed, unsigned char *sessionID, size_t sessionIDLength, CFArrayRef peerCerts, bool displayPeerCerts, SSLClientCertificateState certState, char *fileBase) argument
H A DsslViewer.cpp177 size_t sessionIDLength; member in struct:__anon5014
745 pargs->sessionIDLength = MAX_SESSION_ID_LENGTH;
747 &pargs->sessionIDLength);
1050 * sessionIDLength
1088 for(unsigned dex=0; dex<pargs.sessionIDLength; dex++) {
1090 if(((dex % 8) == 7) && (dex != (pargs.sessionIDLength - 1))) {
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A DSecureTransportPriv.h116 * is returned in *sessionIDLength. Caller must allocate the
126 size_t *sessionIDLength); // IN/OUT
H A DsslContext.c2188 size_t *sessionIDLength) // IN/OUT
2191 (sessionID == NULL) || (sessionIDLength == NULL) ||
2192 (*sessionIDLength < MAX_SESSION_ID_LENGTH)) {
2197 if(ctx->sessionID.length > *sessionIDLength) {
2208 *sessionIDLength = ctx->sessionID.length;
2212 *sessionIDLength = 0;
2184 SSLGetResumableSessionInfo( SSLContextRef ctx, Boolean *sessionWasResumed, void *sessionID, size_t *sessionIDLength) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A DSecureTransportPriv.h116 * is returned in *sessionIDLength. Caller must allocate the
126 size_t *sessionIDLength); // IN/OUT
H A DsslContext.c2188 size_t *sessionIDLength) // IN/OUT
2191 (sessionID == NULL) || (sessionIDLength == NULL) ||
2192 (*sessionIDLength < MAX_SESSION_ID_LENGTH)) {
2197 if(ctx->sessionID.length > *sessionIDLength) {
2208 *sessionIDLength = ctx->sessionID.length;
2212 *sessionIDLength = 0;
2184 SSLGetResumableSessionInfo( SSLContextRef ctx, Boolean *sessionWasResumed, void *sessionID, size_t *sessionIDLength) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A DSecureTransportPriv.h116 * is returned in *sessionIDLength. Caller must allocate the
126 size_t *sessionIDLength); // IN/OUT
H A DsslContext.c2188 size_t *sessionIDLength) // IN/OUT
2191 (sessionID == NULL) || (sessionIDLength == NULL) ||
2192 (*sessionIDLength < MAX_SESSION_ID_LENGTH)) {
2197 if(ctx->sessionID.length > *sessionIDLength) {
2208 *sessionIDLength = ctx->sessionID.length;
2212 *sessionIDLength = 0;
2184 SSLGetResumableSessionInfo( SSLContextRef ctx, Boolean *sessionWasResumed, void *sessionID, size_t *sessionIDLength) argument

Completed in 96 milliseconds