/freebsd/contrib/wpa/src/radius/ |
H A D | radius_server.c | 73 unsigned int sess_id; member 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 371 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument 376 if (sess->sess_id == sess_id) { in radius_server_get_session() 433 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout() 443 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout() 466 sess->sess_id = data->next_sess_id++; in radius_server_new_session() 658 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session() 902 unsigned int sess_id; in radius_server_encapsulate_eap() local [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-cmds.pod.in | 48 sess_id, 129 L<openssl-sess_id(1)>,
|
H A D | openssl-sess_id.pod.in | 6 openssl-sess_id - SSL/TLS session handling command 10 B<openssl> B<sess_id>
|
H A D | build.info | 46 DEPEND[openssl-sess_id.pod]=../perlvars.pm
|
H A D | openssl.pod | 256 =item B<sess_id> 801 L<openssl-sess_id(1)>,
|
H A D | openssl-s_server.pod.in | 897 The session parameters can printed out using the L<openssl-sess_id(1)> command. 915 L<openssl-sess_id(1)>,
|
H A D | openssl-s_client.pod.in | 897 L<openssl-sess_id(1)>,
|
/freebsd/secure/usr.bin/openssl/ |
H A D | Makefile.man | 48 MAN+= openssl-sess_id.1
|
H A D | Makefile | 22 SRCS+= sess_id.c smime.c speed.c spkac.c srp.c storeutl.c ts.c verify.c
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | eapol_test.c | 369 const u8 *sess_id; in eapol_test_compare_pmk() local 399 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 400 if (!sess_id) in eapol_test_compare_pmk() 408 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 412 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
H A D | ctrl_iface.c | 2250 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local 2521 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2522 if (sess_id) { in wpa_supplicant_ctrl_iface_status() 2529 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/freebsd/crypto/openssl/apps/ |
H A D | build.info | 19 s_client.c s_server.c s_time.c sess_id.c smime.c speed.c \
|
/freebsd/crypto/openssh/ |
H A D | ssh-agent.c | 709 struct sshbuf *b = NULL, *sess_id = NULL; in parse_userauth_request() local 725 if ((r = sshbuf_froms(b, &sess_id)) != 0) in parse_userauth_request() 727 if (sshbuf_len(sess_id) == 0) { in parse_userauth_request() 766 *sess_idp = sess_id; in parse_userauth_request() 767 sess_id = NULL; in parse_userauth_request() 775 sshbuf_free(sess_id); in parse_userauth_request()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 516 SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, in lookup_sess_in_cache() argument 529 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 547 ret = s->session_ctx->get_session_cb(s, sess_id, sess_id_len, ©); in lookup_sess_in_cache()
|
H A D | ssl_local.h | 2388 __owur SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, 2679 const unsigned char *sess_id,
|
H A D | t1_lib.c | 1805 size_t eticklen, const unsigned char *sess_id, in tls_decrypt_ticket() argument 1984 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
|
/freebsd/crypto/openssl/test/helpers/ |
H A D | handshake.c | 1415 const unsigned char* sess_id = NULL; in do_handshake_internal() local 1634 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal() 1643 if (sess_id == NULL || sess_id_len == 0) in do_handshake_internal()
|
/freebsd/crypto/openssl/doc/ |
H A D | build.info | 277 DEPEND[html/man1/openssl-sess_id.html]=man1/openssl-sess_id.pod 278 GENERATE[html/man1/openssl-sess_id.html]=man1/openssl-sess_id.pod 279 DEPEND[man/man1/openssl-sess_id.1]=man1/openssl-sess_id.pod 280 GENERATE[man/man1/openssl-sess_id.1]=man1/openssl-sess_id.pod 281 DEPEND[man1/openssl-sess_id.pod]{pod}=man1/openssl-sess_id.pod.in 282 GENERATE[man1/openssl-sess_id.pod]=man1/openssl-sess_id.pod.in 397 html/man1/openssl-sess_id.html \ 457 man/man1/openssl-sess_id.1 \
|
/freebsd/crypto/openssl/ |
H A D | CHANGES.md | 4961 * New output format NSS in the sess_id command line tool. This allows
|
/freebsd/ |
H A D | ObsoleteFiles.inc | 18732 OLD_FILES+=usr/share/man/man1/sess_id.1.gz
|