/third_party/openssl/doc/man1/ |
D | sess_id.pod | 5 openssl-sess_id, 6 sess_id - SSL/TLS session handling utility 10 B<openssl> B<sess_id> 22 The B<sess_id> process the encoded version of the SSL session structure
|
D | openssl.pod | 249 =item B<sess_id> 547 L<s_server(1)>, L<s_time(1)>, L<sess_id(1)>,
|
D | s_server.pod | 817 The session parameters can printed out using the B<sess_id> program. 834 L<SSL_CONF_cmd(3)>, L<sess_id(1)>, L<s_client(1)>, L<ciphers(1)>
|
D | s_client.pod | 820 L<SSL_CONF_cmd(3)>, L<sess_id(1)>, L<s_server(1)>, L<ciphers(1)>,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 73 unsigned int sess_id; member 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 371 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument 376 if (sess->sess_id == sess_id) { in radius_server_get_session() 433 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout() 443 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout() 466 sess->sess_id = data->next_sess_id++; in radius_server_new_session() 658 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session() 902 unsigned int sess_id; in radius_server_encapsulate_eap() local [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 78 unsigned int sess_id; member 447 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 457 sess->sess_id, sess->nas_ip, in srv_log() 514 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument 519 if (sess->sess_id == sess_id) { in radius_server_get_session() 576 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout() 586 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout() 609 sess->sess_id = data->next_sess_id++; in radius_server_new_session() 825 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session() 1069 unsigned int sess_id; in radius_server_encapsulate_eap() local [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | eapol_test.c | 365 const u8 *sess_id; in eapol_test_compare_pmk() local 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 396 if (!sess_id) in eapol_test_compare_pmk() 404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
D | ctrl_iface.c | 2043 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local 2301 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2302 if (sess_id) { in wpa_supplicant_ctrl_iface_status() 2309 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | eapol_test.c | 365 const u8 *sess_id; in eapol_test_compare_pmk() local 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 396 if (!sess_id) in eapol_test_compare_pmk() 404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
D | ctrl_iface.c | 2213 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local 2475 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2476 if (sess_id) { in wpa_supplicant_ctrl_iface_status() 2483 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/third_party/openssl/apps/ |
D | build.info | 7 s_client.c s_server.c s_time.c sess_id.c smime.c speed.c spkac.c
|
/third_party/gstreamer/gstplugins_base/gst-libs/gst/sdp/ |
D | gstsdpmessage.c | 204 FREE_STRING (origin->sess_id); in gst_sdp_origin_init() 357 gst_sdp_message_set_origin (cp, msg->origin.username, msg->origin.sess_id, in gst_sdp_message_copy() 508 if (msg->origin.sess_id && msg->origin.sess_version && msg->origin.nettype && in gst_sdp_message_as_text() 511 msg->origin.username ? msg->origin.username : "-", msg->origin.sess_id, in gst_sdp_message_as_text() 825 const gchar * sess_id, const gchar * sess_version, const gchar * nettype, in gst_sdp_message_set_origin() argument 831 REPLACE_STRING (msg->origin.sess_id, sess_id); in gst_sdp_message_set_origin() 3003 READ_STRING (c->msg->origin.sess_id); in gst_sdp_parse_line() 3293 g_print (" sess_id: '%s'\n", GST_STR_NULL (msg->origin.sess_id)); in gst_sdp_message_dump()
|
D | gstsdpmessage.h | 74 gchar *sess_id; member 374 … const gchar *sess_id, const gchar *sess_version,
|
/third_party/openssl/ssl/ |
D | ssl_sess.c | 419 SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, in lookup_sess_in_cache() argument 432 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 449 ret = s->session_ctx->get_session_cb(s, sess_id, sess_id_len, ©); in lookup_sess_in_cache()
|
D | ssl_local.h | 2261 __owur SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, 2537 const unsigned char *sess_id,
|
D | t1_lib.c | 1357 size_t eticklen, const unsigned char *sess_id, in tls_decrypt_ticket() argument 1506 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
|
/third_party/openssl/test/ |
D | handshake_helper.c | 1437 const unsigned char* sess_id = NULL; in do_handshake_internal() local 1655 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal() 1664 if (sess_id == NULL || sess_id_len == 0) in do_handshake_internal()
|
/third_party/gstreamer/gstplugins_bad/ext/webrtc/ |
D | gstwebrtcbin.c | 3343 gchar *v, *sess_id; in _create_offer_task() local 3347 sess_id = g_strdup (origin->sess_id); in _create_offer_task() 3349 sess_id = g_strdup_printf ("%" G_GUINT64_FORMAT, RANDOM_SESSION_ID); in _create_offer_task() 3351 gst_sdp_message_set_origin (ret, "-", sess_id, v, "IN", "IP4", "0.0.0.0"); in _create_offer_task() 3352 g_free (sess_id); in _create_offer_task() 3841 gst_sdp_message_set_origin (ret, "-", offer_origin->sess_id, in _create_answer_task()
|
/third_party/gstreamer/gstplugins_bad/tests/check/elements/ |
D | webrtcbin.c | 2881 fail_unless_equals_string (previous_origin->sess_id, our_origin->sess_id); in sdp_equal_session_id() 3442 origin->username, origin->sess_id, origin->sess_version, in offer_remove_last_media()
|
/third_party/gstreamer/gstplugins_good/gst/rtsp/ |
D | gstrtspsrc.c | 9971 GST_STR_NULL (msg->origin.sess_id)); in gst_rtspsrc_print_sdp_message()
|
/third_party/openssl/ |
D | CHANGES | 2373 *) New output format NSS in the sess_id command line tool. This allows
|