Home
last modified time | relevance | path

Searched refs:session_id (Results 1 – 25 of 65) sorted by relevance

123

/dragonfly/crypto/libressl/ssl/
H A Dssl_sess.c250 return ss->session_id; in SSL_SESSION_get_id()
372 if (!cb(s, ss->session_id, &tmp)) { in ssl_get_new_session()
428 ssl_session_from_cache(SSL *s, CBS *session_id) in ssl_session_from_cache() argument
441 if (!CBS_write_bytes(session_id, data.session_id, in ssl_session_from_cache()
458 ssl_session_from_callback(SSL *s, CBS *session_id) in ssl_session_from_callback() argument
468 CBS_data(session_id), CBS_len(session_id), &copy)) == NULL) in ssl_session_from_callback()
495 ssl_session_by_id(SSL *s, CBS *session_id) in ssl_session_by_id() argument
499 if (CBS_len(session_id) == 0) in ssl_session_by_id()
560 if (!CBS_write_bytes(session_id, sess->session_id, in ssl_get_prev_session()
764 explicit_bzero(ss->session_id, sizeof ss->session_id); in SSL_SESSION_free()
[all …]
H A Dssl_asn1.c50 CBB cbb, session, cipher_suite, session_id, master_key, time, timeout; in SSL_SESSION_encode() local
83 if (!CBB_add_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode()
85 if (!CBB_add_bytes(&session_id, s->session_id, in SSL_SESSION_encode()
245 CBS cbs, session, cipher_suite, session_id, master_key, peer_cert; in d2i_SSL_SESSION() local
295 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING)) in d2i_SSL_SESSION()
297 if (!CBS_write_bytes(&session_id, s->session_id, sizeof(s->session_id), in d2i_SSL_SESSION()
346 if (!CBS_get_optional_asn1_octet_string(&session, &session_id, &present, in d2i_SSL_SESSION()
350 if (!CBS_write_bytes(&session_id, (uint8_t *)&s->sid_ctx, in d2i_SSL_SESSION()
H A Dtls13_server.c147 CBS cipher_suites, client_random, compression_methods, session_id; in tls13_client_hello_process() local
159 if (!CBS_get_u8_length_prefixed(cbs, &session_id)) in tls13_client_hello_process()
181 if (!ctx->middlebox_compat && CBS_len(&session_id) != 0) { in tls13_client_hello_process()
200 if (!tls13_clienthello_hash_update(ctx, &session_id)) { in tls13_client_hello_process()
252 if (CBS_len(&session_id) != 0 && in tls13_client_hello_process()
253 CBS_len(&session_id) != sizeof(ctx->hs->tls13.legacy_session_id)) { in tls13_client_hello_process()
257 if (!CBS_write_bytes(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_client_hello_process()
334 CBB session_id; in tls13_server_hello_build() local
350 if (!CBB_add_u8_length_prefixed(cbb, &session_id)) in tls13_server_hello_build()
352 if (!CBB_add_bytes(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_server_hello_build()
H A Dssl_clnt.c646 CBB cbb, client_hello, session_id, cookie, cipher_suites; in ssl3_send_client_hello() local
691 if (!CBB_add_u8_length_prefixed(&client_hello, &session_id)) in ssl3_send_client_hello()
696 if (sl > sizeof(s->session->session_id)) { in ssl3_send_client_hello()
700 if (!CBB_add_bytes(&session_id, in ssl3_send_client_hello()
701 s->session->session_id, sl)) in ssl3_send_client_hello()
819 CBS cbs, server_random, session_id; in ssl3_get_server_hello() local
914 if (!CBS_get_u8_length_prefixed(&cbs, &session_id)) in ssl3_get_server_hello()
917 if (CBS_len(&session_id) > SSL3_SESSION_ID_SIZE) { in ssl3_get_server_hello()
954 CBS_mem_equal(&session_id, s->session->session_id, in ssl3_get_server_hello()
983 if (!CBS_write_bytes(&session_id, s->session->session_id, in ssl3_get_server_hello()
[all …]
H A Dtls13_client.c90 CBB cipher_suites, compression_methods, session_id; in tls13_client_hello_build() local
103 if (!CBB_add_u8_length_prefixed(cbb, &session_id)) in tls13_client_hello_build()
105 if (!CBB_add_bytes(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_client_hello_build()
211 CBS server_random, session_id; in tls13_server_hello_process() local
223 if (!CBS_get_u8_length_prefixed(cbs, &session_id)) in tls13_server_hello_process()
287 if (!CBS_mem_equal(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_server_hello_process()
/dragonfly/contrib/wpa_supplicant/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify()
161 session_id, in fst_ctrl_iface_notify()
178 id = strtoul(session_id, NULL, 0); in session_get()
217 id = strtoul(session_id, &p, 0); in session_set()
279 id = strtoul(session_id, NULL, 0); in session_remove()
302 id = strtoul(session_id, NULL, 0); in session_initiate()
327 id = strtoul(session_id, &p, 0); in session_respond()
368 id = strtoul(session_id, NULL, 0); in session_transfer()
392 id = strtoul(session_id, NULL, 0); in session_teardown()
[all …]
/dragonfly/sys/netgraph7/l2tp/
H A Dng_l2tp.c407 u_int16_t session_id; in ng_l2tp_newhook() local
423 session_id = (session_id << 4) | j; in ng_l2tp_newhook()
433 hpriv->conf.session_id = htons(session_id); in ng_l2tp_newhook()
525 conf->session_id = htons(conf->session_id); in ng_l2tp_rcvmsg()
542 u_int16_t session_id; in ng_l2tp_rcvmsg() local
551 session_id = htons(session_id); in ng_l2tp_rcvmsg()
570 conf->session_id = ntohs(conf->session_id); in ng_l2tp_rcvmsg()
596 uint16_t session_id; in ng_l2tp_rcvmsg() local
605 session_id = htons(session_id); in ng_l2tp_rcvmsg()
732 if (hpriv->conf.session_id == sid) in ng_l2tp_find_session()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_sake.c28 u8 session_id; member
133 sake->session_id = data->session_id; in eap_sake_build_msg()
379 u8 subtype, session_id, id; in eap_sake_process() local
391 session_id = req->session_id; in eap_sake_process()
395 "session_id %d", subtype, session_id); in eap_sake_process()
399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process()
401 session_id, data->session_id); in eap_sake_process()
405 data->session_id = session_id; in eap_sake_process()
H A Deap_tls.c24 u8 *session_id; member
145 os_free(data->session_id); in eap_tls_deinit()
219 os_free(data->session_id); in eap_tls_success()
220 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
223 if (data->session_id) { in eap_tls_success()
225 data->session_id, data->id_len); in eap_tls_success()
343 os_free(data->session_id); in eap_tls_init_for_reauth()
344 data->session_id = NULL; in eap_tls_init_for_reauth()
409 if (data->session_id == NULL) in eap_tls_get_session_id()
412 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
H A Deap_peap.c58 u8 *session_id; member
188 os_free(data->session_id); in eap_peap_deinit()
1105 os_free(data->session_id); in eap_peap_process()
1106 data->session_id = in eap_peap_process()
1110 if (data->session_id) { in eap_peap_process()
1113 data->session_id, data->id_len); in eap_peap_process()
1193 os_free(data->session_id); in eap_peap_init_for_reauth()
1194 data->session_id = NULL; in eap_peap_init_for_reauth()
1306 if (data->session_id == NULL || !data->phase2_success) in eap_peap_get_session_id()
1309 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id()
H A Deap_teap.c55 u8 *session_id; member
236 os_free(data->session_id); in eap_teap_clear()
237 data->session_id = NULL; in eap_teap_clear()
735 os_free(data->session_id); in eap_teap_session_id()
736 data->session_id = os_malloc(max_id_len); in eap_teap_session_id()
737 if (!data->session_id) in eap_teap_session_id()
740 data->session_id[0] = EAP_TYPE_TEAP; in eap_teap_session_id()
744 os_free(data->session_id); in eap_teap_session_id()
745 data->session_id = NULL; in eap_teap_session_id()
752 data->session_id, data->id_len); in eap_teap_session_id()
[all …]
H A Deap_ttls.c58 u8 *session_id; member
198 os_free(data->session_id); in eap_ttls_deinit()
288 os_free(data->session_id); in eap_ttls_v0_derive_key()
289 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_ttls_v0_derive_key()
292 if (data->session_id) { in eap_ttls_v0_derive_key()
294 data->session_id, data->id_len); in eap_ttls_v0_derive_key()
1690 os_free(data->session_id); in eap_ttls_init_for_reauth()
1691 data->session_id = NULL; in eap_ttls_init_for_reauth()
1780 if (data->session_id == NULL || !data->phase2_success) in eap_ttls_get_session_id()
1783 id = os_memdup(data->session_id, data->id_len); in eap_ttls_get_session_id()
H A Deap_fast.c56 u8 *session_id; member
252 os_free(data->session_id); in eap_fast_deinit()
809 os_free(data->session_id); in eap_fast_process_crypto_binding()
810 data->session_id = eap_peer_tls_derive_session_id( in eap_fast_process_crypto_binding()
812 if (data->session_id) { in eap_fast_process_crypto_binding()
814 data->session_id, data->id_len); in eap_fast_process_crypto_binding()
1703 os_free(data->session_id);
1704 data->session_id = NULL;
1767 if (!data->success || !data->session_id) in eap_fast_get_session_id()
1770 id = os_memdup(data->session_id, data->id_len); in eap_fast_get_session_id()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
76 data->session_id); in eap_sake_init()
109 sake->session_id = data->session_id; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
252 session_id = resp->session_id; in eap_sake_check()
260 if (session_id != data->session_id) { in eap_sake_check()
262 session_id, data->session_id); in eap_sake_check()
H A Deap_server_gpsk.c27 u8 session_id[128]; member
428 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2()
434 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2()
618 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
/dragonfly/sys/netgraph/l2tp/
H A Dng_l2tp.c359 u_int16_t session_id; in ng_l2tp_newhook() local
374 session_id = (session_id << 4) | j; in ng_l2tp_newhook()
384 hpriv->conf.session_id = htons(session_id); in ng_l2tp_newhook()
481 conf->session_id = htons(conf->session_id); in ng_l2tp_rcvmsg()
488 if (hpriv->conf.session_id == conf->session_id) in ng_l2tp_rcvmsg()
504 u_int16_t session_id; in ng_l2tp_rcvmsg() local
512 memcpy(&session_id, msg->data, 2); in ng_l2tp_rcvmsg()
513 session_id = htons(session_id); in ng_l2tp_rcvmsg()
519 if (hpriv->conf.session_id == session_id) in ng_l2tp_rcvmsg()
537 conf->session_id = ntohs(conf->session_id); in ng_l2tp_rcvmsg()
[all …]
/dragonfly/contrib/wpa_supplicant/src/p2p/
H A Dp2p_pd.c406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument
421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov()
463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req()
566 u32 session_id = 0; in p2p_process_prov_disc_req() local
654 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req()
889 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req()
1042 session_id, conncap, 0, in p2p_process_prov_disc_req()
1052 session_id, conncap, in p2p_process_prov_disc_req()
1201 u32 session_id; in p2p_validate_p2ps_pd_resp() local
1221 session_id = WPA_GET_LE32(msg->session_id); in p2p_validate_p2ps_pd_resp()
[all …]
/dragonfly/contrib/tcpdump/
H A Dprint-someip.c89 uint16_t session_id; in someip_print() local
116 session_id = request_id & 0x0000FFFF; in someip_print()
118 ND_PRINT(", client %u, session %u", client_id, session_id); in someip_print()
H A Dprint-rpki-rtr.c44 nd_uint16_t session_id; /* Session id */ member
228 GET_BE_U_2(pdu_header->u.session_id), in rpki_rtr_pdu_print()
252 GET_BE_U_2(pdu_header->u.session_id)); in rpki_rtr_pdu_print()
H A Dprint-lwapp.c69 nd_uint32_t session_id; member
249 GET_BE_U_4(lwapp_control_header->session_id)); in lwapp_control_print()
/dragonfly/sys/dev/drm/amd/amdgpu/
H A Dpsp_gfx_if.h116 uint32_t session_id; /* Session ID of the loaded TA to be unloaded */ member
149 uint32_t session_id; /* Session ID of the TA to be executed */ member
234 uint32_t session_id; /* +4 session ID in response to LoadTa command */ member
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Dwpas_kay.c269 const u8 *session_id; in ieee802_1x_auth_get_session_id() local
272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id()
273 if (session_id == NULL) { in ieee802_1x_auth_get_session_id()
285 os_memcpy(sid, session_id, need_len); in ieee802_1x_auth_get_session_id()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.c308 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument
326 session_id[0] = EAP_TYPE_PWD; in compute_keys()
337 eap_pwd_h_final(hash, &session_id[1]); in compute_keys()
354 session_id, SHA256_MAC_LEN + 1, in compute_keys()
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dwpa_auth_kay.c358 const u8 *session_id; in ieee802_1x_auth_get_session_id() local
361 session_id = ieee802_1x_get_session_id(sta->eapol_sm, &id_len); in ieee802_1x_auth_get_session_id()
362 if (!session_id) { in ieee802_1x_auth_get_session_id()
374 os_memcpy(sid, session_id, need_len); in ieee802_1x_auth_get_session_id()
/dragonfly/crypto/libressl/tls/
H A Dtls_config.c845 const unsigned char *session_id, size_t len) in tls_config_set_session_id() argument
851 memset(config->session_id, 0, sizeof(config->session_id)); in tls_config_set_session_id()
852 memcpy(config->session_id, session_id, len); in tls_config_set_session_id()

123