/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius_server.c | 78 unsigned int sess_id; member 447 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 457 sess->sess_id, sess->nas_ip, in srv_log() 514 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument 519 if (sess->sess_id == sess_id) { in radius_server_get_session() 576 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout() 586 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout() 609 sess->sess_id = data->next_sess_id++; in radius_server_new_session() 825 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session() 1069 unsigned int sess_id; radius_server_encapsulate_eap() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius_server.c | 73 unsigned int sess_id; member 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 371 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument 376 if (sess->sess_id == sess_id) { in radius_server_get_session() 433 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout() 443 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout() 466 sess->sess_id = data->next_sess_id++; in radius_server_new_session() 658 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session() 902 unsigned int sess_id; radius_server_encapsulate_eap() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | eapol_test.c | 365 const u8 *sess_id; in eapol_test_compare_pmk() local 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 396 if (!sess_id) in eapol_test_compare_pmk() 404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
H A D | ctrl_iface.c | 2043 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local 2301 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2302 if (sess_id) { in wpa_supplicant_ctrl_iface_status() 2309 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | eapol_test.c | 365 const u8 *sess_id; in eapol_test_compare_pmk() local 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 396 if (!sess_id) in eapol_test_compare_pmk() 404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
H A D | ctrl_iface.c | 2300 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local 2570 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2571 if (sess_id) { in wpa_supplicant_ctrl_iface_status() 2578 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_sess.c | 484 SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, in lookup_sess_in_cache() argument 497 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 515 ret = s->session_ctx->get_session_cb(s, sess_id, sess_id_len, ©); in lookup_sess_in_cache()
|
H A D | ssl_local.h | 2444 __owur SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, 2735 const unsigned char *sess_id,
|
H A D | t1_lib.c | 1798 * sess_id: points at the session ID. 1804 size_t eticklen, const unsigned char *sess_id, in tls_decrypt_ticket() 1983 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket() 1803 tls_decrypt_ticket(SSL *s, const unsigned char *etick, size_t eticklen, const unsigned char *sess_id, size_t sesslen, SSL_SESSION **psess) tls_decrypt_ticket() argument
|
/third_party/openssl/ssl/ |
H A D | ssl_sess.c | 512 SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, in lookup_sess_in_cache() argument 525 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 543 ret = s->session_ctx->get_session_cb(s, sess_id, sess_id_len, ©); in lookup_sess_in_cache()
|
H A D | ssl_local.h | 2388 __owur SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, 2679 const unsigned char *sess_id,
|
H A D | t1_lib.c | 1778 * sess_id: points at the session ID. 1784 size_t eticklen, const unsigned char *sess_id, in tls_decrypt_ticket() 1963 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket() 1783 tls_decrypt_ticket(SSL *s, const unsigned char *etick, size_t eticklen, const unsigned char *sess_id, size_t sesslen, SSL_SESSION **psess) tls_decrypt_ticket() argument
|
/third_party/openssl/test/helpers/ |
H A D | handshake.c | 1409 const unsigned char* sess_id = NULL; in do_handshake_internal() local 1628 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal() 1637 if (sess_id == NULL || sess_id_len == 0) in do_handshake_internal()
|