/dragonfly/crypto/libressl/ssl/ |
H A D | ssl_sess.c | 250 return ss->session_id; in SSL_SESSION_get_id() 372 if (!cb(s, ss->session_id, &tmp)) { in ssl_get_new_session() 428 ssl_session_from_cache(SSL *s, CBS *session_id) in ssl_session_from_cache() argument 441 if (!CBS_write_bytes(session_id, data.session_id, in ssl_session_from_cache() 458 ssl_session_from_callback(SSL *s, CBS *session_id) in ssl_session_from_callback() argument 468 CBS_data(session_id), CBS_len(session_id), ©)) == NULL) in ssl_session_from_callback() 495 ssl_session_by_id(SSL *s, CBS *session_id) in ssl_session_by_id() argument 499 if (CBS_len(session_id) == 0) in ssl_session_by_id() 560 if (!CBS_write_bytes(session_id, sess->session_id, in ssl_get_prev_session() 764 explicit_bzero(ss->session_id, sizeof ss->session_id); in SSL_SESSION_free() [all …]
|
H A D | ssl_asn1.c | 50 CBB cbb, session, cipher_suite, session_id, master_key, time, timeout; in SSL_SESSION_encode() local 83 if (!CBB_add_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode() 85 if (!CBB_add_bytes(&session_id, s->session_id, in SSL_SESSION_encode() 245 CBS cbs, session, cipher_suite, session_id, master_key, peer_cert; in d2i_SSL_SESSION() local 295 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING)) in d2i_SSL_SESSION() 297 if (!CBS_write_bytes(&session_id, s->session_id, sizeof(s->session_id), in d2i_SSL_SESSION() 346 if (!CBS_get_optional_asn1_octet_string(&session, &session_id, &present, in d2i_SSL_SESSION() 350 if (!CBS_write_bytes(&session_id, (uint8_t *)&s->sid_ctx, in d2i_SSL_SESSION()
|
H A D | tls13_server.c | 147 CBS cipher_suites, client_random, compression_methods, session_id; in tls13_client_hello_process() local 159 if (!CBS_get_u8_length_prefixed(cbs, &session_id)) in tls13_client_hello_process() 181 if (!ctx->middlebox_compat && CBS_len(&session_id) != 0) { in tls13_client_hello_process() 200 if (!tls13_clienthello_hash_update(ctx, &session_id)) { in tls13_client_hello_process() 252 if (CBS_len(&session_id) != 0 && in tls13_client_hello_process() 253 CBS_len(&session_id) != sizeof(ctx->hs->tls13.legacy_session_id)) { in tls13_client_hello_process() 257 if (!CBS_write_bytes(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_client_hello_process() 334 CBB session_id; in tls13_server_hello_build() local 350 if (!CBB_add_u8_length_prefixed(cbb, &session_id)) in tls13_server_hello_build() 352 if (!CBB_add_bytes(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_server_hello_build()
|
H A D | ssl_clnt.c | 646 CBB cbb, client_hello, session_id, cookie, cipher_suites; in ssl3_send_client_hello() local 691 if (!CBB_add_u8_length_prefixed(&client_hello, &session_id)) in ssl3_send_client_hello() 696 if (sl > sizeof(s->session->session_id)) { in ssl3_send_client_hello() 700 if (!CBB_add_bytes(&session_id, in ssl3_send_client_hello() 701 s->session->session_id, sl)) in ssl3_send_client_hello() 819 CBS cbs, server_random, session_id; in ssl3_get_server_hello() local 914 if (!CBS_get_u8_length_prefixed(&cbs, &session_id)) in ssl3_get_server_hello() 917 if (CBS_len(&session_id) > SSL3_SESSION_ID_SIZE) { in ssl3_get_server_hello() 954 CBS_mem_equal(&session_id, s->session->session_id, in ssl3_get_server_hello() 983 if (!CBS_write_bytes(&session_id, s->session->session_id, in ssl3_get_server_hello() [all …]
|
H A D | tls13_client.c | 90 CBB cipher_suites, compression_methods, session_id; in tls13_client_hello_build() local 103 if (!CBB_add_u8_length_prefixed(cbb, &session_id)) in tls13_client_hello_build() 105 if (!CBB_add_bytes(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_client_hello_build() 211 CBS server_random, session_id; in tls13_server_hello_process() local 223 if (!CBS_get_u8_length_prefixed(cbs, &session_id)) in tls13_server_hello_process() 287 if (!CBS_mem_equal(&session_id, ctx->hs->tls13.legacy_session_id, in tls13_server_hello_process()
|
/dragonfly/contrib/wpa_supplicant/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() 161 session_id, in fst_ctrl_iface_notify() 178 id = strtoul(session_id, NULL, 0); in session_get() 217 id = strtoul(session_id, &p, 0); in session_set() 279 id = strtoul(session_id, NULL, 0); in session_remove() 302 id = strtoul(session_id, NULL, 0); in session_initiate() 327 id = strtoul(session_id, &p, 0); in session_respond() 368 id = strtoul(session_id, NULL, 0); in session_transfer() 392 id = strtoul(session_id, NULL, 0); in session_teardown() [all …]
|
/dragonfly/sys/netgraph7/l2tp/ |
H A D | ng_l2tp.c | 407 u_int16_t session_id; in ng_l2tp_newhook() local 423 session_id = (session_id << 4) | j; in ng_l2tp_newhook() 433 hpriv->conf.session_id = htons(session_id); in ng_l2tp_newhook() 525 conf->session_id = htons(conf->session_id); in ng_l2tp_rcvmsg() 542 u_int16_t session_id; in ng_l2tp_rcvmsg() local 551 session_id = htons(session_id); in ng_l2tp_rcvmsg() 570 conf->session_id = ntohs(conf->session_id); in ng_l2tp_rcvmsg() 596 uint16_t session_id; in ng_l2tp_rcvmsg() local 605 session_id = htons(session_id); in ng_l2tp_rcvmsg() 732 if (hpriv->conf.session_id == sid) in ng_l2tp_find_session() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 28 u8 session_id; member 133 sake->session_id = data->session_id; in eap_sake_build_msg() 379 u8 subtype, session_id, id; in eap_sake_process() local 391 session_id = req->session_id; in eap_sake_process() 395 "session_id %d", subtype, session_id); in eap_sake_process() 399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() 401 session_id, data->session_id); in eap_sake_process() 405 data->session_id = session_id; in eap_sake_process()
|
H A D | eap_tls.c | 24 u8 *session_id; member 145 os_free(data->session_id); in eap_tls_deinit() 219 os_free(data->session_id); in eap_tls_success() 220 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 223 if (data->session_id) { in eap_tls_success() 225 data->session_id, data->id_len); in eap_tls_success() 343 os_free(data->session_id); in eap_tls_init_for_reauth() 344 data->session_id = NULL; in eap_tls_init_for_reauth() 409 if (data->session_id == NULL) in eap_tls_get_session_id() 412 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
|
H A D | eap_peap.c | 58 u8 *session_id; member 188 os_free(data->session_id); in eap_peap_deinit() 1105 os_free(data->session_id); in eap_peap_process() 1106 data->session_id = in eap_peap_process() 1110 if (data->session_id) { in eap_peap_process() 1113 data->session_id, data->id_len); in eap_peap_process() 1193 os_free(data->session_id); in eap_peap_init_for_reauth() 1194 data->session_id = NULL; in eap_peap_init_for_reauth() 1306 if (data->session_id == NULL || !data->phase2_success) in eap_peap_get_session_id() 1309 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id()
|
H A D | eap_teap.c | 55 u8 *session_id; member 236 os_free(data->session_id); in eap_teap_clear() 237 data->session_id = NULL; in eap_teap_clear() 735 os_free(data->session_id); in eap_teap_session_id() 736 data->session_id = os_malloc(max_id_len); in eap_teap_session_id() 737 if (!data->session_id) in eap_teap_session_id() 740 data->session_id[0] = EAP_TYPE_TEAP; in eap_teap_session_id() 744 os_free(data->session_id); in eap_teap_session_id() 745 data->session_id = NULL; in eap_teap_session_id() 752 data->session_id, data->id_len); in eap_teap_session_id() [all …]
|
H A D | eap_ttls.c | 58 u8 *session_id; member 198 os_free(data->session_id); in eap_ttls_deinit() 288 os_free(data->session_id); in eap_ttls_v0_derive_key() 289 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_ttls_v0_derive_key() 292 if (data->session_id) { in eap_ttls_v0_derive_key() 294 data->session_id, data->id_len); in eap_ttls_v0_derive_key() 1690 os_free(data->session_id); in eap_ttls_init_for_reauth() 1691 data->session_id = NULL; in eap_ttls_init_for_reauth() 1780 if (data->session_id == NULL || !data->phase2_success) in eap_ttls_get_session_id() 1783 id = os_memdup(data->session_id, data->id_len); in eap_ttls_get_session_id()
|
H A D | eap_fast.c | 56 u8 *session_id; member 252 os_free(data->session_id); in eap_fast_deinit() 809 os_free(data->session_id); in eap_fast_process_crypto_binding() 810 data->session_id = eap_peer_tls_derive_session_id( in eap_fast_process_crypto_binding() 812 if (data->session_id) { in eap_fast_process_crypto_binding() 814 data->session_id, data->id_len); in eap_fast_process_crypto_binding() 1703 os_free(data->session_id); 1704 data->session_id = NULL; 1767 if (!data->success || !data->session_id) in eap_fast_get_session_id() 1770 id = os_memdup(data->session_id, data->id_len); in eap_fast_get_session_id()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() 262 session_id, data->session_id); in eap_sake_check()
|
H A D | eap_server_gpsk.c | 27 u8 session_id[128]; member 428 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2() 434 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2() 618 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
|
/dragonfly/sys/netgraph/l2tp/ |
H A D | ng_l2tp.c | 359 u_int16_t session_id; in ng_l2tp_newhook() local 374 session_id = (session_id << 4) | j; in ng_l2tp_newhook() 384 hpriv->conf.session_id = htons(session_id); in ng_l2tp_newhook() 481 conf->session_id = htons(conf->session_id); in ng_l2tp_rcvmsg() 488 if (hpriv->conf.session_id == conf->session_id) in ng_l2tp_rcvmsg() 504 u_int16_t session_id; in ng_l2tp_rcvmsg() local 512 memcpy(&session_id, msg->data, 2); in ng_l2tp_rcvmsg() 513 session_id = htons(session_id); in ng_l2tp_rcvmsg() 519 if (hpriv->conf.session_id == session_id) in ng_l2tp_rcvmsg() 537 conf->session_id = ntohs(conf->session_id); in ng_l2tp_rcvmsg() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/p2p/ |
H A D | p2p_pd.c | 406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument 421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 654 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 889 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req() 1042 session_id, conncap, 0, in p2p_process_prov_disc_req() 1052 session_id, conncap, in p2p_process_prov_disc_req() 1201 u32 session_id; in p2p_validate_p2ps_pd_resp() local 1221 session_id = WPA_GET_LE32(msg->session_id); in p2p_validate_p2ps_pd_resp() [all …]
|
/dragonfly/contrib/tcpdump/ |
H A D | print-someip.c | 89 uint16_t session_id; in someip_print() local 116 session_id = request_id & 0x0000FFFF; in someip_print() 118 ND_PRINT(", client %u, session %u", client_id, session_id); in someip_print()
|
H A D | print-rpki-rtr.c | 44 nd_uint16_t session_id; /* Session id */ member 228 GET_BE_U_2(pdu_header->u.session_id), in rpki_rtr_pdu_print() 252 GET_BE_U_2(pdu_header->u.session_id)); in rpki_rtr_pdu_print()
|
H A D | print-lwapp.c | 69 nd_uint32_t session_id; member 249 GET_BE_U_4(lwapp_control_header->session_id)); in lwapp_control_print()
|
/dragonfly/sys/dev/drm/amd/amdgpu/ |
H A D | psp_gfx_if.h | 116 uint32_t session_id; /* Session ID of the loaded TA to be unloaded */ member 149 uint32_t session_id; /* Session ID of the TA to be executed */ member 234 uint32_t session_id; /* +4 session ID in response to LoadTa command */ member
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | wpas_kay.c | 269 const u8 *session_id; in ieee802_1x_auth_get_session_id() local 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id() 273 if (session_id == NULL) { in ieee802_1x_auth_get_session_id() 285 os_memcpy(sid, session_id, need_len); in ieee802_1x_auth_get_session_id()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.c | 308 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument 326 session_id[0] = EAP_TYPE_PWD; in compute_keys() 337 eap_pwd_h_final(hash, &session_id[1]); in compute_keys() 354 session_id, SHA256_MAC_LEN + 1, in compute_keys()
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | wpa_auth_kay.c | 358 const u8 *session_id; in ieee802_1x_auth_get_session_id() local 361 session_id = ieee802_1x_get_session_id(sta->eapol_sm, &id_len); in ieee802_1x_auth_get_session_id() 362 if (!session_id) { in ieee802_1x_auth_get_session_id() 374 os_memcpy(sid, session_id, need_len); in ieee802_1x_auth_get_session_id()
|
/dragonfly/crypto/libressl/tls/ |
H A D | tls_config.c | 845 const unsigned char *session_id, size_t len) in tls_config_set_session_id() argument 851 memset(config->session_id, 0, sizeof(config->session_id)); in tls_config_set_session_id() 852 memcpy(config->session_id, session_id, len); in tls_config_set_session_id()
|