Home
last modified time | relevance | path

Searched refs:session_id (Results 1 – 25 of 94) sorted by relevance

1234

/freebsd/contrib/wpa/hs20/client/
H A Dspp_client.c27 const char *session_id,
109 const char *session_id, in build_spp_post_dev_data() argument
126 if (session_id) in build_spp_post_dev_data()
128 session_id); in build_spp_post_dev_data()
328 const char *session_id, in hs20_spp_upload_mo() argument
353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo()
410 const char *session_id, in process_spp_user_input_response() argument
423 ctx, session_id, in process_spp_user_input_response()
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response()
438 const char *session_id) in hs20_spp_user_input_completed() argument
[all …]
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_sake.c28 u8 session_id; member
133 sake->session_id = data->session_id; in eap_sake_build_msg()
379 u8 subtype, session_id, id; in eap_sake_process() local
391 session_id = req->session_id; in eap_sake_process()
395 "session_id %d", subtype, session_id); in eap_sake_process()
399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process()
401 session_id, data->session_id); in eap_sake_process()
405 data->session_id = session_id; in eap_sake_process()
H A Deap_tls.c24 u8 *session_id; member
152 os_free(data->session_id); in eap_tls_deinit()
226 os_free(data->session_id); in eap_tls_success()
227 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
230 if (data->session_id) { in eap_tls_success()
232 data->session_id, data->id_len); in eap_tls_success()
352 os_free(data->session_id); in eap_tls_init_for_reauth()
353 data->session_id = NULL; in eap_tls_init_for_reauth()
418 if (data->session_id == NULL) in eap_tls_get_session_id()
421 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
H A Deap_peap.c58 u8 *session_id; member
203 os_free(data->session_id); in eap_peap_deinit()
1171 os_free(data->session_id); in eap_peap_process()
1172 data->session_id = in eap_peap_process()
1176 if (data->session_id) { in eap_peap_process()
1179 data->session_id, data->id_len); in eap_peap_process()
1260 os_free(data->session_id); in eap_peap_init_for_reauth()
1261 data->session_id = NULL; in eap_peap_init_for_reauth()
1373 if (data->session_id == NULL || !data->phase2_success) in eap_peap_get_session_id()
1376 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id()
H A Deap_teap.c56 u8 *session_id; member
237 os_free(data->session_id); in eap_teap_clear()
238 data->session_id = NULL; in eap_teap_clear()
797 os_free(data->session_id); in eap_teap_session_id()
798 data->session_id = os_malloc(max_id_len); in eap_teap_session_id()
799 if (!data->session_id) in eap_teap_session_id()
802 data->session_id[0] = EAP_TYPE_TEAP; in eap_teap_session_id()
803 res = tls_get_tls_unique(data->ssl.conn, data->session_id + 1, in eap_teap_session_id()
806 os_free(data->session_id); in eap_teap_session_id()
807 data->session_id = NULL; in eap_teap_session_id()
[all …]
/freebsd/crypto/openssl/providers/implementations/kdfs/
H A Dsshkdf.c38 const unsigned char *session_id, size_t session_id_len,
49 unsigned char *session_id; member
85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset()
121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive()
131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive()
158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params()
230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument
255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
/freebsd/contrib/wpa/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify()
161 session_id, in fst_ctrl_iface_notify()
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
178 id = strtoul(session_id, NULL, 0); in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
217 id = strtoul(session_id, &p, 0); in session_set()
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
279 id = strtoul(session_id, NULL, 0); in session_remove()
297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument
[all …]
/freebsd/usr.bin/iscsictl/
H A Discsictl.c284 kernel_modify(int iscsi_fd, unsigned int session_id, const struct target *targ) in kernel_modify() argument
290 ism.ism_session_id = session_id; in kernel_modify()
299 kernel_modify_some(int iscsi_fd, unsigned int session_id, const char *target, in kernel_modify_some() argument
333 if (state->iss_id == session_id) in kernel_modify_some()
337 xo_errx(1, "session-id %u not found", session_id); in kernel_modify_some()
356 ism.ism_session_id = session_id; in kernel_modify_some()
639 long long session_id = -1; in main() local
684 session_id = strtol(optarg, &end, 10); in main()
687 if (session_id < 0) in main()
689 if (session_id > UINT_MAX) in main()
[all …]
H A Dperiphs.c65 print_periphs(int session_id) in print_periphs() argument
145 if ((int)bus_result->unit_number != session_id) { in print_periphs()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
76 data->session_id); in eap_sake_init()
109 sake->session_id = data->session_id; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
252 session_id = resp->session_id; in eap_sake_check()
260 if (session_id != data->session_id) { in eap_sake_check()
262 session_id, data->session_id); in eap_sake_check()
/freebsd/crypto/libecc/src/examples/sss/
H A Dsss.c431 u8 session_id[SSS_SESSION_ID_SIZE]; in sss_generate() local
433 ret = local_memset(session_id, 0, sizeof(session_id)); EG(ret, err); in sss_generate()
443 ret = get_random(session_id, sizeof(session_id)); EG(ret, err); in sss_generate()
448 u8 *cur_id = (u8*)&(shares[i].session_id); in sss_generate()
457 ret = local_memcpy(cur_id, session_id, SSS_SESSION_ID_SIZE); EG(ret, err); in sss_generate()
464 IGNORE_RET_VAL(local_memset(session_id, 0, sizeof(session_id))); in sss_generate()
491 const u8 *cur_id = (const u8*)&(shares[i].session_id); in sss_combine()
492 const u8 *cur_id0 = (const u8*)&(shares[0].session_id); in sss_combine()
559 u8 *cur_id = (u8*)&(shares[i].session_id); in sss_regenerate()
560 u8 *cur_id0 = (u8*)&(shares[0].session_id); in sss_regenerate()
[all …]
/freebsd/crypto/openssl/test/
H A Dbad_dtls_test.c53 static unsigned char session_id[32]; variable
110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session()
157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello()
261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello()
475 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
/freebsd/contrib/wpa/src/p2p/
H A Dp2p_pd.c168 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs()
385 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp()
418 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument
433 tmp->session_id = session_id; in p2ps_setup_p2ps_prov()
475 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req()
578 u32 session_id = 0; in p2p_process_prov_disc_req() local
666 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req()
839 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
871 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
901 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req()
[all …]
/freebsd/sys/netgraph/
H A Dng_l2tp.c409 u_int16_t session_id; in ng_l2tp_newhook() local
421 for (session_id = i = 0; i < 4; i++) { in ng_l2tp_newhook()
425 session_id = (session_id << 4) | j; in ng_l2tp_newhook()
435 hpriv->conf.session_id = session_id; in ng_l2tp_newhook()
440 hash = SESSHASH(hpriv->conf.session_id); in ng_l2tp_newhook()
521 hpriv = ng_l2tp_find_session(priv, conf->session_id); in ng_l2tp_rcvmsg()
534 u_int16_t session_id; in ng_l2tp_rcvmsg() local
538 if (msg->header.arglen != sizeof(session_id)) { in ng_l2tp_rcvmsg()
542 memcpy(&session_id, msg->data, 2); in ng_l2tp_rcvmsg()
545 hpriv = ng_l2tp_find_session(priv, session_id); in ng_l2tp_rcvmsg()
[all …]
/freebsd/contrib/tcpdump/
H A Dprint-someip.c86 uint16_t session_id; in someip_print() local
113 session_id = request_id & 0x0000FFFF; in someip_print()
115 ND_PRINT(", client %u, session %u", client_id, session_id); in someip_print()
H A Dprint-rpki-rtr.c42 nd_uint16_t session_id; /* Session id */ member
226 GET_BE_U_2(pdu_header->u.session_id), in rpki_rtr_pdu_print()
250 GET_BE_U_2(pdu_header->u.session_id)); in rpki_rtr_pdu_print()
H A Dprint-lwapp.c67 nd_uint32_t session_id; member
247 GET_BE_U_4(lwapp_control_header->session_id)); in lwapp_control_print()
/freebsd/crypto/openssl/ssl/
H A Dssl_asn1.c23 ASN1_OCTET_STRING *session_id; member
53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING),
113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local
160 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION()
161 in->session_id, in->session_id_length); in i2d_SSL_SESSION()
294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION()
295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION()
H A Dssl_sess.c324 return s->session_id; in SSL_SESSION_get_id()
431 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id()
433 if (!cb(s, ss->session_id, &tmp)) { in ssl_generate_session_id()
451 if (SSL_has_matching_session_id(s, ss->session_id, in ssl_generate_session_id()
529 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache()
641 ret = lookup_sess_in_cache(s, hello->session_id, in ssl_get_prev_session()
876 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free()
932 if (sid != s->session_id) in SSL_SESSION_set1_id()
933 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
H A Dssl_txt.c66 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print()
187 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print_keylog()
/freebsd/crypto/heimdal/kcm/
H A Dsessions.c43 kcm_session_add(pid_t session_id) in kcm_session_add() argument
45 kcm_log(1, "monitor session: %d\n", session_id); in kcm_session_add()
/freebsd/crypto/openssl/doc/man7/
H A DEVP_KDF-SSHKDF.pod41 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string>
104 "xcghash" and "session_id" values:
111 unsigned char session_id[32] = "012345...";
127 session_id, (size_t)32);
/freebsd/contrib/wpa/src/eap_common/
H A Deap_pwd_common.c334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument
352 session_id[0] = EAP_TYPE_PWD; in compute_keys()
373 eap_pwd_h_final(hash, &session_id[1]); in compute_keys()
395 session_id, SHA256_MAC_LEN + 1, in compute_keys()
/freebsd/lib/libtacplus/
H A Dtaclib.c330 MD5Update(&base_ctx, msg->session_id, sizeof msg->session_id); in crypt_msg()
433 msg->session_id[0] = r >> 8; in gen_session_id()
434 msg->session_id[1] = r; in gen_session_id()
436 msg->session_id[2] = r >> 8; in gen_session_id()
437 msg->session_id[3] = r; in gen_session_id()
554 if (memcmp(msg->session_id, h->request.session_id, in recv_msg()
555 sizeof msg->session_id) != 0) { in recv_msg()
/freebsd/sys/dev/ice/
H A Dice_protocol_type.h289 __be16 session_id;
295 __be32 session_id;
288 __be16 session_id; global() member
294 __be32 session_id; global() member

1234