Home
last modified time | relevance | path

Searched refs:sess_id (Results 1 – 21 of 21) sorted by relevance

/third_party/openssl/doc/man1/
Dsess_id.pod5 openssl-sess_id,
6 sess_id - SSL/TLS session handling utility
10 B<openssl> B<sess_id>
22 The B<sess_id> process the encoded version of the SSL session structure
Dopenssl.pod249 =item B<sess_id>
547 L<s_server(1)>, L<s_time(1)>, L<sess_id(1)>,
Ds_server.pod817 The session parameters can printed out using the B<sess_id> program.
834 L<SSL_CONF_cmd(3)>, L<sess_id(1)>, L<s_client(1)>, L<ciphers(1)>
Ds_client.pod820 L<SSL_CONF_cmd(3)>, L<sess_id(1)>, L<s_server(1)>, L<ciphers(1)>,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
Dradius_server.c73 unsigned int sess_id; member
304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log()
314 sess->sess_id, sess->nas_ip, in srv_log()
371 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument
376 if (sess->sess_id == sess_id) { in radius_server_get_session()
433 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout()
443 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout()
466 sess->sess_id = data->next_sess_id++; in radius_server_new_session()
658 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session()
902 unsigned int sess_id; in radius_server_encapsulate_eap() local
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
Dradius_server.c78 unsigned int sess_id; member
447 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log()
457 sess->sess_id, sess->nas_ip, in srv_log()
514 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument
519 if (sess->sess_id == sess_id) { in radius_server_get_session()
576 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout()
586 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout()
609 sess->sess_id = data->next_sess_id++; in radius_server_new_session()
825 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session()
1069 unsigned int sess_id; in radius_server_encapsulate_eap() local
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Deapol_test.c365 const u8 *sess_id; in eapol_test_compare_pmk() local
395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk()
396 if (!sess_id) in eapol_test_compare_pmk()
404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk()
408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
Dctrl_iface.c2043 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local
2301 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status()
2302 if (sess_id) { in wpa_supplicant_ctrl_iface_status()
2309 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Deapol_test.c365 const u8 *sess_id; in eapol_test_compare_pmk() local
395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk()
396 if (!sess_id) in eapol_test_compare_pmk()
404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk()
408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
Dctrl_iface.c2213 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local
2475 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status()
2476 if (sess_id) { in wpa_supplicant_ctrl_iface_status()
2483 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
/third_party/openssl/apps/
Dbuild.info7 s_client.c s_server.c s_time.c sess_id.c smime.c speed.c spkac.c
/third_party/gstreamer/gstplugins_base/gst-libs/gst/sdp/
Dgstsdpmessage.c204 FREE_STRING (origin->sess_id); in gst_sdp_origin_init()
357 gst_sdp_message_set_origin (cp, msg->origin.username, msg->origin.sess_id, in gst_sdp_message_copy()
508 if (msg->origin.sess_id && msg->origin.sess_version && msg->origin.nettype && in gst_sdp_message_as_text()
511 msg->origin.username ? msg->origin.username : "-", msg->origin.sess_id, in gst_sdp_message_as_text()
825 const gchar * sess_id, const gchar * sess_version, const gchar * nettype, in gst_sdp_message_set_origin() argument
831 REPLACE_STRING (msg->origin.sess_id, sess_id); in gst_sdp_message_set_origin()
3003 READ_STRING (c->msg->origin.sess_id); in gst_sdp_parse_line()
3293 g_print (" sess_id: '%s'\n", GST_STR_NULL (msg->origin.sess_id)); in gst_sdp_message_dump()
Dgstsdpmessage.h74 gchar *sess_id; member
374 … const gchar *sess_id, const gchar *sess_version,
/third_party/openssl/ssl/
Dssl_sess.c419 SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, in lookup_sess_in_cache() argument
432 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache()
449 ret = s->session_ctx->get_session_cb(s, sess_id, sess_id_len, &copy); in lookup_sess_in_cache()
Dssl_local.h2261 __owur SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id,
2537 const unsigned char *sess_id,
Dt1_lib.c1357 size_t eticklen, const unsigned char *sess_id, in tls_decrypt_ticket() argument
1506 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
/third_party/openssl/test/
Dhandshake_helper.c1437 const unsigned char* sess_id = NULL; in do_handshake_internal() local
1655 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal()
1664 if (sess_id == NULL || sess_id_len == 0) in do_handshake_internal()
/third_party/gstreamer/gstplugins_bad/ext/webrtc/
Dgstwebrtcbin.c3343 gchar *v, *sess_id; in _create_offer_task() local
3347 sess_id = g_strdup (origin->sess_id); in _create_offer_task()
3349 sess_id = g_strdup_printf ("%" G_GUINT64_FORMAT, RANDOM_SESSION_ID); in _create_offer_task()
3351 gst_sdp_message_set_origin (ret, "-", sess_id, v, "IN", "IP4", "0.0.0.0"); in _create_offer_task()
3352 g_free (sess_id); in _create_offer_task()
3841 gst_sdp_message_set_origin (ret, "-", offer_origin->sess_id, in _create_answer_task()
/third_party/gstreamer/gstplugins_bad/tests/check/elements/
Dwebrtcbin.c2881 fail_unless_equals_string (previous_origin->sess_id, our_origin->sess_id); in sdp_equal_session_id()
3442 origin->username, origin->sess_id, origin->sess_version, in offer_remove_last_media()
/third_party/gstreamer/gstplugins_good/gst/rtsp/
Dgstrtspsrc.c9971 GST_STR_NULL (msg->origin.sess_id)); in gst_rtspsrc_print_sdp_message()
/third_party/openssl/
DCHANGES2373 *) New output format NSS in the sess_id command line tool. This allows