/freebsd/contrib/wpa/hs20/client/ |
H A D | spp_client.c | 27 const char *session_id, 109 const char *session_id, in build_spp_post_dev_data() argument 126 if (session_id) in build_spp_post_dev_data() 128 session_id); in build_spp_post_dev_data() 328 const char *session_id, in hs20_spp_upload_mo() argument 353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo() 410 const char *session_id, in process_spp_user_input_response() argument 423 ctx, session_id, in process_spp_user_input_response() 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response() 438 const char *session_id) in hs20_spp_user_input_completed() argument [all …]
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_sake.c | 28 u8 session_id; member 133 sake->session_id = data->session_id; in eap_sake_build_msg() 379 u8 subtype, session_id, id; in eap_sake_process() local 391 session_id = req->session_id; in eap_sake_process() 395 "session_id %d", subtype, session_id); in eap_sake_process() 399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() 401 session_id, data->session_id); in eap_sake_process() 405 data->session_id = session_id; in eap_sake_process()
|
H A D | eap_tls.c | 24 u8 *session_id; member 152 os_free(data->session_id); in eap_tls_deinit() 226 os_free(data->session_id); in eap_tls_success() 227 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 230 if (data->session_id) { in eap_tls_success() 232 data->session_id, data->id_len); in eap_tls_success() 352 os_free(data->session_id); in eap_tls_init_for_reauth() 353 data->session_id = NULL; in eap_tls_init_for_reauth() 418 if (data->session_id == NULL) in eap_tls_get_session_id() 421 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
|
H A D | eap_peap.c | 58 u8 *session_id; member 203 os_free(data->session_id); in eap_peap_deinit() 1171 os_free(data->session_id); in eap_peap_process() 1172 data->session_id = in eap_peap_process() 1176 if (data->session_id) { in eap_peap_process() 1179 data->session_id, data->id_len); in eap_peap_process() 1260 os_free(data->session_id); in eap_peap_init_for_reauth() 1261 data->session_id = NULL; in eap_peap_init_for_reauth() 1373 if (data->session_id == NULL || !data->phase2_success) in eap_peap_get_session_id() 1376 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id()
|
H A D | eap_teap.c | 56 u8 *session_id; member 237 os_free(data->session_id); in eap_teap_clear() 238 data->session_id = NULL; in eap_teap_clear() 797 os_free(data->session_id); in eap_teap_session_id() 798 data->session_id = os_malloc(max_id_len); in eap_teap_session_id() 799 if (!data->session_id) in eap_teap_session_id() 802 data->session_id[0] = EAP_TYPE_TEAP; in eap_teap_session_id() 803 res = tls_get_tls_unique(data->ssl.conn, data->session_id + 1, in eap_teap_session_id() 806 os_free(data->session_id); in eap_teap_session_id() 807 data->session_id = NULL; in eap_teap_session_id() [all …]
|
/freebsd/crypto/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 49 unsigned char *session_id; member 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive() 131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument 255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
|
/freebsd/contrib/wpa/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() 161 session_id, in fst_ctrl_iface_notify() 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 178 id = strtoul(session_id, NULL, 0); in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 217 id = strtoul(session_id, &p, 0); in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 279 id = strtoul(session_id, NULL, 0); in session_remove() 297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument [all …]
|
/freebsd/usr.bin/iscsictl/ |
H A D | iscsictl.c | 284 kernel_modify(int iscsi_fd, unsigned int session_id, const struct target *targ) in kernel_modify() argument 290 ism.ism_session_id = session_id; in kernel_modify() 299 kernel_modify_some(int iscsi_fd, unsigned int session_id, const char *target, in kernel_modify_some() argument 333 if (state->iss_id == session_id) in kernel_modify_some() 337 xo_errx(1, "session-id %u not found", session_id); in kernel_modify_some() 356 ism.ism_session_id = session_id; in kernel_modify_some() 639 long long session_id = -1; in main() local 684 session_id = strtol(optarg, &end, 10); in main() 687 if (session_id < 0) in main() 689 if (session_id > UINT_MAX) in main() [all …]
|
H A D | periphs.c | 65 print_periphs(int session_id) in print_periphs() argument 145 if ((int)bus_result->unit_number != session_id) { in print_periphs()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() 262 session_id, data->session_id); in eap_sake_check()
|
/freebsd/crypto/libecc/src/examples/sss/ |
H A D | sss.c | 431 u8 session_id[SSS_SESSION_ID_SIZE]; in sss_generate() local 433 ret = local_memset(session_id, 0, sizeof(session_id)); EG(ret, err); in sss_generate() 443 ret = get_random(session_id, sizeof(session_id)); EG(ret, err); in sss_generate() 448 u8 *cur_id = (u8*)&(shares[i].session_id); in sss_generate() 457 ret = local_memcpy(cur_id, session_id, SSS_SESSION_ID_SIZE); EG(ret, err); in sss_generate() 464 IGNORE_RET_VAL(local_memset(session_id, 0, sizeof(session_id))); in sss_generate() 491 const u8 *cur_id = (const u8*)&(shares[i].session_id); in sss_combine() 492 const u8 *cur_id0 = (const u8*)&(shares[0].session_id); in sss_combine() 559 u8 *cur_id = (u8*)&(shares[i].session_id); in sss_regenerate() 560 u8 *cur_id0 = (u8*)&(shares[0].session_id); in sss_regenerate() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | bad_dtls_test.c | 53 static unsigned char session_id[32]; variable 110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session() 157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello() 261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello() 475 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
|
/freebsd/contrib/wpa/src/p2p/ |
H A D | p2p_pd.c | 168 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs() 385 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp() 418 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument 433 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 475 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 578 u32 session_id = 0; in p2p_process_prov_disc_req() local 666 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 839 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 871 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 901 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req() [all …]
|
/freebsd/sys/netgraph/ |
H A D | ng_l2tp.c | 409 u_int16_t session_id; in ng_l2tp_newhook() local 421 for (session_id = i = 0; i < 4; i++) { in ng_l2tp_newhook() 425 session_id = (session_id << 4) | j; in ng_l2tp_newhook() 435 hpriv->conf.session_id = session_id; in ng_l2tp_newhook() 440 hash = SESSHASH(hpriv->conf.session_id); in ng_l2tp_newhook() 521 hpriv = ng_l2tp_find_session(priv, conf->session_id); in ng_l2tp_rcvmsg() 534 u_int16_t session_id; in ng_l2tp_rcvmsg() local 538 if (msg->header.arglen != sizeof(session_id)) { in ng_l2tp_rcvmsg() 542 memcpy(&session_id, msg->data, 2); in ng_l2tp_rcvmsg() 545 hpriv = ng_l2tp_find_session(priv, session_id); in ng_l2tp_rcvmsg() [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | print-someip.c | 86 uint16_t session_id; in someip_print() local 113 session_id = request_id & 0x0000FFFF; in someip_print() 115 ND_PRINT(", client %u, session %u", client_id, session_id); in someip_print()
|
H A D | print-rpki-rtr.c | 42 nd_uint16_t session_id; /* Session id */ member 226 GET_BE_U_2(pdu_header->u.session_id), in rpki_rtr_pdu_print() 250 GET_BE_U_2(pdu_header->u.session_id)); in rpki_rtr_pdu_print()
|
H A D | print-lwapp.c | 67 nd_uint32_t session_id; member 247 GET_BE_U_4(lwapp_control_header->session_id)); in lwapp_control_print()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_asn1.c | 23 ASN1_OCTET_STRING *session_id; member 53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 160 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION() 161 in->session_id, in->session_id_length); in i2d_SSL_SESSION() 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION() 295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION()
|
H A D | ssl_sess.c | 324 return s->session_id; in SSL_SESSION_get_id() 431 memset(ss->session_id, 0, ss->session_id_length); in ssl_generate_session_id() 433 if (!cb(s, ss->session_id, &tmp)) { in ssl_generate_session_id() 451 if (SSL_has_matching_session_id(s, ss->session_id, in ssl_generate_session_id() 529 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 641 ret = lookup_sess_in_cache(s, hello->session_id, in ssl_get_prev_session() 876 OPENSSL_cleanse(ss->session_id, sizeof(ss->session_id)); in SSL_SESSION_free() 932 if (sid != s->session_id) in SSL_SESSION_set1_id() 933 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
|
H A D | ssl_txt.c | 66 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print() 187 if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0) in SSL_SESSION_print_keylog()
|
/freebsd/crypto/heimdal/kcm/ |
H A D | sessions.c | 43 kcm_session_add(pid_t session_id) in kcm_session_add() argument 45 kcm_log(1, "monitor session: %d\n", session_id); in kcm_session_add()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_KDF-SSHKDF.pod | 41 =item "session_id" (B<OSSL_KDF_PARAM_SSHKDF_SESSION_ID>) <octet string> 104 "xcghash" and "session_id" values: 111 unsigned char session_id[32] = "012345..."; 127 session_id, (size_t)32);
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument 352 session_id[0] = EAP_TYPE_PWD; in compute_keys() 373 eap_pwd_h_final(hash, &session_id[1]); in compute_keys() 395 session_id, SHA256_MAC_LEN + 1, in compute_keys()
|
/freebsd/lib/libtacplus/ |
H A D | taclib.c | 330 MD5Update(&base_ctx, msg->session_id, sizeof msg->session_id); in crypt_msg() 433 msg->session_id[0] = r >> 8; in gen_session_id() 434 msg->session_id[1] = r; in gen_session_id() 436 msg->session_id[2] = r >> 8; in gen_session_id() 437 msg->session_id[3] = r; in gen_session_id() 554 if (memcmp(msg->session_id, h->request.session_id, in recv_msg() 555 sizeof msg->session_id) != 0) { in recv_msg()
|
/freebsd/sys/dev/ice/ |
H A D | ice_protocol_type.h | 289 __be16 session_id; 295 __be32 session_id; 288 __be16 session_id; global() member 294 __be32 session_id; global() member
|