Searched refs:session_id (Results 1 - 25 of 80) sorted by relevance

1234

/freebsd-11-stable/crypto/heimdal/kcm/
H A Dsessions.c43 kcm_session_add(pid_t session_id) argument
45 kcm_log(1, "monitor session: %d\n", session_id);
/freebsd-11-stable/contrib/wpa/hs20/client/
H A Dspp_client.c27 const char *session_id,
109 const char *session_id,
126 if (session_id)
128 session_id);
328 const char *session_id,
353 node = build_spp_post_dev_data(ctx, &ns, session_id,
410 const char *session_id,
423 ctx, session_id,
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL);
438 const char *session_id)
107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) argument
326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument
409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) argument
437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) argument
472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument
511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) argument
606 char *session_id = NULL; local
827 char *status, *session_id; local
863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument
891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dkexc25519c.c149 if (kex->session_id == NULL) {
151 kex->session_id = malloc(kex->session_id_len);
152 if (kex->session_id == NULL) {
156 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexc25519s.c126 if (kex->session_id == NULL) {
128 kex->session_id = malloc(kex->session_id_len);
129 if (kex->session_id == NULL) {
133 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexecdhs.c161 if (kex->session_id == NULL) {
163 kex->session_id = malloc(kex->session_id_len);
164 if (kex->session_id == NULL) {
168 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dauthfd.h41 u_char session_id[16], u_char response[16]);
H A Dkexecdhc.c196 if (kex->session_id == NULL) {
198 kex->session_id = malloc(kex->session_id_len);
199 if (kex->session_id == NULL) {
203 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgexs.c212 if (kex->session_id == NULL) {
214 kex->session_id = malloc(kex->session_id_len);
215 if (kex->session_id == NULL) {
219 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgexc.c243 if (kex->session_id == NULL) {
245 kex->session_id = malloc(kex->session_id_len);
246 if (kex->session_id == NULL) {
250 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexdhs.c181 if (kex->session_id == NULL) {
183 kex->session_id = malloc(kex->session_id_len);
184 if (kex->session_id == NULL) {
188 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexdhc.c191 if (kex->session_id == NULL) {
193 kex->session_id = malloc(kex->session_id_len);
194 if (kex->session_id == NULL) {
198 memcpy(kex->session_id, hash, kex->session_id_len);
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_tls.c24 u8 *session_id; member in struct:eap_tls_data
145 os_free(data->session_id);
219 os_free(data->session_id);
220 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
223 if (data->session_id) {
225 data->session_id, data->id_len);
343 os_free(data->session_id);
344 data->session_id = NULL;
409 if (data->session_id == NULL)
412 id = os_memdup(data->session_id, dat
[all...]
H A Deap_sake.c28 u8 session_id; member in struct:eap_sake_data
133 sake->session_id = data->session_id;
379 u8 subtype, session_id, id; local
391 session_id = req->session_id;
395 "session_id %d", subtype, session_id);
399 if (data->session_id_set && data->session_id != session_id) {
[all...]
/freebsd-11-stable/contrib/wpa/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument
149 session_id, local
161 session_id, local
171 static int session_get(const char *session_id, char *buf, size_t buflen) argument
178 id = strtoul(session_id, NULL, 0);
210 static int session_set(const char *session_id, char *buf, size_t buflen) argument
217 id = strtoul(session_id, &p, 0);
273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument
279 id = strtoul(session_id, NULL, 0);
297 static int session_initiate(const char *session_id, cha argument
320 session_respond(const char *session_id, char *buf, size_t buflen) argument
363 session_transfer(const char *session_id, char *buf, size_t buflen) argument
387 session_teardown(const char *session_id, char *buf, size_t buflen) argument
728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member in struct:eap_sake_data
70 if (os_get_random(&data->session_id, 1)) {
76 data->session_id);
109 sake->session_id = data->session_id;
241 u8 version, session_id, subtype; local
252 session_id = resp->session_id;
260 if (session_id != data->session_id) {
[all...]
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_asn1.c98 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st
195 a.session_id.length = in->session_id_length;
196 a.session_id.type = V_ASN1_OCTET_STRING;
197 a.session_id.data = in->session_id;
277 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING);
330 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING);
454 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */
455 os.length = sizeof(ret->session_id);
458 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id));
[all...]
/freebsd-11-stable/sys/netgraph/
H A Dng_l2tp.c404 u_int16_t session_id; local
416 for (session_id = i = 0; i < 4; i++) {
420 session_id = (session_id << 4) | j;
430 hpriv->conf.session_id = session_id;
435 hash = SESSHASH(hpriv->conf.session_id);
516 hpriv = ng_l2tp_find_session(priv, conf->session_id);
529 u_int16_t session_id; local
533 if (msg->header.arglen != sizeof(session_id)) {
578 uint16_t session_id; local
1511 u_int16_t session_id = 0; local
[all...]
H A Dng_l2tp.h97 u_int16_t session_id; /* local session id */ member in struct:ng_l2tp_sess_config
106 { "session_id", &ng_parse_hint16_type }, \
/freebsd-11-stable/usr.bin/iscsictl/
H A Discsictl.c378 kernel_modify(int iscsi_fd, unsigned int session_id, const struct target *targ) argument
384 ism.ism_session_id = session_id;
393 kernel_modify_some(int iscsi_fd, unsigned int session_id, const char *target, argument
427 if (state->iss_id == session_id)
431 xo_errx(1, "session-id %u not found", session_id);
450 ism.ism_session_id = session_id;
715 long long session_id = -1; local
756 session_id = strtol(optarg, &end, 10);
759 if (session_id < 0)
761 if (session_id > UINT_MA
[all...]
H A Discsictl.h101 void print_periphs(int session_id);
H A Dperiphs.c67 print_periphs(int session_id) argument
147 if ((int)bus_result->unit_number != session_id) {
148 //printf("wrong unit, %d != %d\n", bus_result->unit_number, session_id);
/freebsd-11-stable/usr.sbin/ppp/
H A Dradius.h86 char session_id[256]; /* Unique session ID */ member in struct:radacct
/freebsd-11-stable/contrib/wpa/src/p2p/
H A Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac);
373 p2p_buf_add_session_id(buf, prov->session_id,
406 u32 session_id, u16 method,
421 tmp->session_id = session_id;
463 P2PS_PD_REQ_CHECK(1, session_id);
566 u32 session_id = 0; local
652 session_id = WPA_GET_LE32(msg.session_id);
825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id,
405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) argument
1199 u32 session_id; local
[all...]
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_client_i.h23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwpas_kay.c269 const u8 *session_id; local
272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len);
273 if (session_id == NULL) {
285 os_memcpy(sid, session_id, need_len);

Completed in 147 milliseconds

1234