/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_ikev2.c | 485 size_t sid_len; in eap_ikev2_get_session_id() local 491 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id() 492 sid = os_malloc(sid_len); in eap_ikev2_get_session_id() 502 *len = sid_len; in eap_ikev2_get_session_id() 504 sid, sid_len); in eap_ikev2_get_session_id()
|
H A D | eap_eke.c | 748 size_t sid_len; in eap_eke_get_session_id() local 753 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 754 sid = os_malloc(sid_len); in eap_eke_get_session_id() 761 *len = sid_len; in eap_eke_get_session_id()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_SESSION_set1_id.pod | 16 unsigned int sid_len); 25 to B<sid> of length B<sid_len>.
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_ikev2.c | 523 size_t sid_len; in eap_ikev2_get_session_id() local 529 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id() 530 sid = os_malloc(sid_len); in eap_ikev2_get_session_id() 540 *len = sid_len; in eap_ikev2_get_session_id() 542 sid, sid_len); in eap_ikev2_get_session_id()
|
H A D | eap_server_eke.c | 772 size_t sid_len; in eap_eke_get_session_id() local 777 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 778 sid = os_malloc(sid_len); in eap_eke_get_session_id() 785 *len = sid_len; in eap_eke_get_session_id()
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | wpas_kay.c | 306 size_t sid_len; in ieee802_1x_notify_create_actor() local 331 sid = eapol_sm_get_session_id(wpa_s->eapol, &sid_len); in ieee802_1x_notify_create_actor() 351 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor()
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth_kay.c | 388 size_t sid_len; in ieee802_1x_notify_create_actor_hapd() local 413 sid = ieee802_1x_get_session_id(sta->eapol_sm, &sid_len); in ieee802_1x_notify_create_actor_hapd() 435 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.h | 61 u8 method_type, u8 *sid, size_t *sid_len);
|
H A D | eap_gpsk_common.c | 422 u8 method_type, u8 *sid, size_t *sid_len) in eap_gpsk_derive_session_id() argument 468 *sid_len = 1 + sizeof(kdf_out); in eap_gpsk_derive_session_id()
|
/freebsd/contrib/tcpdump/ |
H A D | print-isoclns.c | 2383 uint8_t flags, sid_tlen, sid_type, sid_len; in isis_print_router_cap_subtlv() local 2397 sid_len = GET_U_1(sid_ptr+1); in isis_print_router_cap_subtlv() 2404 if (sid_len > sid_tlen) { in isis_print_router_cap_subtlv() 2410 if (sid_len == 3) { in isis_print_router_cap_subtlv() 2412 } else if (sid_len == 4) { in isis_print_router_cap_subtlv() 2415 ND_PRINT(", Unknown SID length%u", sid_len); in isis_print_router_cap_subtlv() 2419 print_unknown_data(ndo, sid_ptr, "\n\t\t ", sid_len); in isis_print_router_cap_subtlv() 2422 sid_ptr += sid_len; in isis_print_router_cap_subtlv() 2423 sid_tlen -= sid_len; in isis_print_router_cap_subtlv()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 925 unsigned int sid_len) in SSL_SESSION_set1_id() argument 927 if (sid_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in SSL_SESSION_set1_id() 931 s->session_id_length = sid_len; in SSL_SESSION_set1_id() 933 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
|
/freebsd/contrib/wpa/src/pae/ |
H A D | ieee802_1x_kay_i.h | 72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ssl.h | 1758 unsigned int sid_len);
|
H A D | ssl.h.in | 1686 unsigned int sid_len);
|