Searched refs:sess_id_len (Results 1 – 8 of 8) sorted by relevance
/third_party/openssl/test/helpers/ |
D | handshake.c | 1410 unsigned int sess_id_len = 0; in do_handshake_internal() local 1461 SSL_SESSION_get_id(serv_sess_in, &sess_id_len); in do_handshake_internal() 1463 if ((sess_id_len > 0 in do_handshake_internal() 1468 sess_id_len = 0; in do_handshake_internal() 1628 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal() 1637 if (sess_id == NULL || sess_id_len == 0) in do_handshake_internal()
|
/third_party/openssl/ssl/ |
D | ssl_sess.c | 481 size_t sess_id_len) in lookup_sess_in_cache() argument 490 if (!ossl_assert(sess_id_len <= SSL_MAX_SSL_SESSION_ID_LENGTH)) in lookup_sess_in_cache() 493 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 494 data.session_id_length = sess_id_len; in lookup_sess_in_cache() 511 ret = s->session_ctx->get_session_cb(s, sess_id, sess_id_len, ©); in lookup_sess_in_cache()
|
D | ssl_local.h | 2389 size_t sess_id_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | eapol_test.c | 366 size_t sess_id_len; in eapol_test_compare_pmk() local 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 403 if (e->authenticator_eap_key_name_len != sess_id_len || in eapol_test_compare_pmk() 404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
D | ctrl_iface.c | 2044 size_t sess_id_len; in wpa_supplicant_ctrl_iface_status() local 2301 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2309 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | eapol_test.c | 366 size_t sess_id_len; in eapol_test_compare_pmk() local 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 403 if (e->authenticator_eap_key_name_len != sess_id_len || in eapol_test_compare_pmk() 404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
D | ctrl_iface.c | 2214 size_t sess_id_len; in wpa_supplicant_ctrl_iface_status() local 2475 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2483 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/third_party/openssl/ssl/statem/ |
D | statem_clnt.c | 1096 size_t sess_id_len; in tls_construct_client_hello() local 1191 sess_id_len = sizeof(s->tmp_session_id); in tls_construct_client_hello() 1192 s->tmp_session_id_len = sess_id_len; in tls_construct_client_hello() 1196 sess_id_len, 0) <= 0) { in tls_construct_client_hello() 1201 sess_id_len = 0; in tls_construct_client_hello() 1205 sess_id_len = s->session->session_id_length; in tls_construct_client_hello() 1207 s->tmp_session_id_len = sess_id_len; in tls_construct_client_hello() 1208 memcpy(s->tmp_session_id, s->session->session_id, sess_id_len); in tls_construct_client_hello() 1212 || (sess_id_len != 0 && !WPACKET_memcpy(pkt, session_id, in tls_construct_client_hello() 1213 sess_id_len)) in tls_construct_client_hello()
|