/freebsd-11-stable/crypto/heimdal/kcm/ |
H A D | sessions.c | 43 kcm_session_add(pid_t session_id) argument 45 kcm_log(1, "monitor session: %d\n", session_id);
|
/freebsd-11-stable/contrib/wpa/hs20/client/ |
H A D | spp_client.c | 27 const char *session_id, 109 const char *session_id, 126 if (session_id) 128 session_id); 328 const char *session_id, 353 node = build_spp_post_dev_data(ctx, &ns, session_id, 410 const char *session_id, 423 ctx, session_id, 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); 438 const char *session_id) 107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) argument 326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument 409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) argument 437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) argument 472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument 511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) argument 606 char *session_id = NULL; local 827 char *status, *session_id; local 863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument 891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | kexc25519c.c | 149 if (kex->session_id == NULL) { 151 kex->session_id = malloc(kex->session_id_len); 152 if (kex->session_id == NULL) { 156 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexc25519s.c | 126 if (kex->session_id == NULL) { 128 kex->session_id = malloc(kex->session_id_len); 129 if (kex->session_id == NULL) { 133 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexecdhs.c | 161 if (kex->session_id == NULL) { 163 kex->session_id = malloc(kex->session_id_len); 164 if (kex->session_id == NULL) { 168 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | authfd.h | 41 u_char session_id[16], u_char response[16]);
|
H A D | kexecdhc.c | 196 if (kex->session_id == NULL) { 198 kex->session_id = malloc(kex->session_id_len); 199 if (kex->session_id == NULL) { 203 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgexs.c | 212 if (kex->session_id == NULL) { 214 kex->session_id = malloc(kex->session_id_len); 215 if (kex->session_id == NULL) { 219 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgexc.c | 243 if (kex->session_id == NULL) { 245 kex->session_id = malloc(kex->session_id_len); 246 if (kex->session_id == NULL) { 250 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexdhs.c | 181 if (kex->session_id == NULL) { 183 kex->session_id = malloc(kex->session_id_len); 184 if (kex->session_id == NULL) { 188 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexdhc.c | 191 if (kex->session_id == NULL) { 193 kex->session_id = malloc(kex->session_id_len); 194 if (kex->session_id == NULL) { 198 memcpy(kex->session_id, hash, kex->session_id_len);
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 145 os_free(data->session_id); 219 os_free(data->session_id); 220 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 223 if (data->session_id) { 225 data->session_id, data->id_len); 343 os_free(data->session_id); 344 data->session_id = NULL; 409 if (data->session_id == NULL) 412 id = os_memdup(data->session_id, dat [all...] |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 133 sake->session_id = data->session_id; 379 u8 subtype, session_id, id; local 391 session_id = req->session_id; 395 "session_id %d", subtype, session_id); 399 if (data->session_id_set && data->session_id != session_id) { [all...] |
/freebsd-11-stable/contrib/wpa/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument 149 session_id, local 161 session_id, local 171 static int session_get(const char *session_id, char *buf, size_t buflen) argument 178 id = strtoul(session_id, NULL, 0); 210 static int session_set(const char *session_id, char *buf, size_t buflen) argument 217 id = strtoul(session_id, &p, 0); 273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument 279 id = strtoul(session_id, NULL, 0); 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 98 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st 195 a.session_id.length = in->session_id_length; 196 a.session_id.type = V_ASN1_OCTET_STRING; 197 a.session_id.data = in->session_id; 277 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); 330 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); 454 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */ 455 os.length = sizeof(ret->session_id); 458 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id)); [all...] |
/freebsd-11-stable/sys/netgraph/ |
H A D | ng_l2tp.c | 404 u_int16_t session_id; local 416 for (session_id = i = 0; i < 4; i++) { 420 session_id = (session_id << 4) | j; 430 hpriv->conf.session_id = session_id; 435 hash = SESSHASH(hpriv->conf.session_id); 516 hpriv = ng_l2tp_find_session(priv, conf->session_id); 529 u_int16_t session_id; local 533 if (msg->header.arglen != sizeof(session_id)) { 578 uint16_t session_id; local 1511 u_int16_t session_id = 0; local [all...] |
H A D | ng_l2tp.h | 97 u_int16_t session_id; /* local session id */ member in struct:ng_l2tp_sess_config 106 { "session_id", &ng_parse_hint16_type }, \
|
/freebsd-11-stable/usr.bin/iscsictl/ |
H A D | iscsictl.c | 378 kernel_modify(int iscsi_fd, unsigned int session_id, const struct target *targ) argument 384 ism.ism_session_id = session_id; 393 kernel_modify_some(int iscsi_fd, unsigned int session_id, const char *target, argument 427 if (state->iss_id == session_id) 431 xo_errx(1, "session-id %u not found", session_id); 450 ism.ism_session_id = session_id; 715 long long session_id = -1; local 756 session_id = strtol(optarg, &end, 10); 759 if (session_id < 0) 761 if (session_id > UINT_MA [all...] |
H A D | iscsictl.h | 101 void print_periphs(int session_id);
|
H A D | periphs.c | 67 print_periphs(int session_id) argument 147 if ((int)bus_result->unit_number != session_id) { 148 //printf("wrong unit, %d != %d\n", bus_result->unit_number, session_id);
|
/freebsd-11-stable/usr.sbin/ppp/ |
H A D | radius.h | 86 char session_id[256]; /* Unique session ID */ member in struct:radacct
|
/freebsd-11-stable/contrib/wpa/src/p2p/ |
H A D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); 373 p2p_buf_add_session_id(buf, prov->session_id, 406 u32 session_id, u16 method, 421 tmp->session_id = session_id; 463 P2PS_PD_REQ_CHECK(1, session_id); 566 u32 session_id = 0; local 652 session_id = WPA_GET_LE32(msg.session_id); 825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, 405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) argument 1199 u32 session_id; local [all...] |
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpas_kay.c | 269 const u8 *session_id; local 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); 273 if (session_id == NULL) { 285 os_memcpy(sid, session_id, need_len);
|