HomeSort by relevance Sort by last modified time
    Searched refs:session_id (Results 1 - 25 of 42) sorted by null

1 2

  /dalvik/libcore/x-net/src/main/java/org/apache/harmony/xnet/provider/jsse/
ServerHello.java 46 byte[] session_id; field in class:ServerHello
62 * @param session_id
67 byte[] session_id, CipherSuite cipher_suite, byte compression_method) {
74 this.session_id = session_id;
78 length = 38 + session_id.length;
93 session_id = new byte[size];
94 in.read(session_id, 0, size);
99 this.length = 38 + session_id.length;
114 out.writeUint8(session_id.length)
    [all...]
ClientHello.java 45 final byte[] session_id; field in class:ClientHello
73 session_id = ses_id;
76 length = 38 + session_id.length + (this.cipher_suites.length << 1)
92 session_id = new byte[size];
93 in.read(session_id, 0, size);
109 this.length = 38 + session_id.length + (cipher_suites.length << 1)
144 session_id = new byte[0];
165 this.length = 38 + session_id.length + (cipher_suites.length << 1)
177 out.writeUint8(session_id.length);
178 out.write(session_id);
    [all...]
ClientHandshakeImpl.java 227 if (serverHello.session_id.length == 0) {
231 } else if (!Arrays.equals(serverHello.session_id, clientHello.session_id)) {
250 session.id = serverHello.session_id.clone();
ServerHandshakeImpl.java 373 FIND: if (clientHello.session_id.length != 0) {
381 && Arrays.equals(session.id, clientHello.session_id)) {
390 sessionToResume = findSessionToResume(clientHello.session_id);
676 private SSLSessionImpl findSessionToResume(byte[] session_id) {
677 return (SSLSessionImpl)parameters.getServerSessionContext().getSession(session_id);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 33 u8 session_id; member in struct:eap_sake_data
139 sake->session_id = data->session_id;
375 u8 subtype, session_id; local
386 session_id = req->session_id;
390 "session_id %d", subtype, session_id);
394 if (data->session_id_set && data->session_id != session_id) {
    [all...]
  /external/wpa_supplicant/
eap_sake.c 34 u8 session_id; member in struct:eap_sake_data
146 req->session_id = data->session_id;
387 u8 subtype, session_id; local
398 session_id = req->session_id;
403 "session_id %d", subtype, session_id);
407 if (data->session_id_set && data->session_id != session_id) {
    [all...]
eap_sake_common.h 59 u8 session_id; member in struct:eap_sake_hdr
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 32 u8 session_id; member in struct:eap_sake_data
77 if (os_get_random(&data->session_id, 1)) {
83 data->session_id);
122 sake->session_id = data->session_id;
261 u8 version, session_id, subtype; local
272 session_id = resp->session_id;
280 if (session_id != data->session_id) {
    [all...]
  /external/openssl/ssl/
ssl_asn1.c 73 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st
160 a.session_id.length=in->session_id_length;
161 a.session_id.type=V_ASN1_OCTET_STRING;
162 a.session_id.data=in->session_id;
229 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING);
264 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING);
365 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */
366 os.length = sizeof(ret->session_id);
369 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id));
    [all...]
ssl_sess.c 139 return s->session_id;
163 /* else - woops a session_id match */
247 if(!cb(s, ss->session_id, &tmp))
267 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp);
271 if(SSL_has_matching_session_id(s, ss->session_id,
311 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,
325 r = tls1_process_ticket(s, session_id, len, limit, &ret);
345 memcpy(data.session_id,session_id,len);
361 && (ret=s->ctx->get_session_cb(s,session_id,len,&copy)
    [all...]
ssl_txt.c 123 if (BIO_printf(bp,"%02X",x->session_id[i]) <= 0) goto err;
t1_lib.c 840 int tls1_process_ticket(SSL *s, unsigned char *session_id, int len,
844 const unsigned char *p = session_id + len;
896 return tls_decrypt_ticket(s, p, size, session_id, len,
982 memcpy(sess->session_id, sess_id, sesslen);
s2_clnt.c 420 memset(s->session->session_id,0,
587 memcpy(d,s->session->session_id,(unsigned int)i);
1002 memcpy(s->session->session_id,p+1,SSL2_SSL_SESSION_ID_LENGTH);
1008 if ((s->session->session_id_length > sizeof s->session->session_id)
1009 || (0 != memcmp(buf + 1, s->session->session_id,
ssl_lib.c 409 if(id_len > sizeof r.session_id)
414 memcpy(r.session_id, id, id_len);
422 memset(r.session_id + id_len, 0,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_server_i.h 30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
tlsv1_client_i.h 29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
tlsv1_server_write.c 70 if (os_get_random(conn->session_id, conn->session_id_len)) {
72 "session_id");
75 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
76 conn->session_id, conn->session_id_len);
94 /* SessionID session_id */
96 os_memcpy(pos, conn->session_id, conn->session_id_len);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sake_common.h 55 u8 session_id; member in struct:eap_sake_hdr
  /external/dropbear/
session.h 133 unsigned char *session_id; /* this is the hash from the first kex */ member in struct:sshsession
common-session.c 107 ses.session_id = NULL;
222 m_free(ses.session_id);
cli-authpubkey.c 162 buf_putstring(sigbuf, ses.session_id, SHA1_HASH_SIZE);
common-kex.c 232 sha1_process(&hs2, ses.session_id, SHA1_HASH_SIZE);
572 /* first time around, we set the session_id to H */
573 if (ses.session_id == NULL) {
574 /* create the session_id, this never needs freeing */
575 ses.session_id = (unsigned char*)m_malloc(SHA1_HASH_SIZE);
576 memcpy(ses.session_id, ses.hash, SHA1_HASH_SIZE);
svr-authpubkey.c 96 * session_id, concatenated with the payload packet up to the signature */
98 buf_putstring(signbuf, ses.session_id, SHA1_HASH_SIZE);
  /external/ppp/pppd/plugins/radius/
radius.c 117 char session_id[MAXSESSIONID + 1]; member in struct:radius_state
864 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id));
867 rstate.session_id, 0, VENDOR_NONE);
954 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
1094 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
    [all...]
  /external/opencore/pvmi/pvmf/include/
pvmf_node_interface.h 502 * @param session_id Created when the user who should receive this
506 OSCL_IMPORT_REF virtual void ReportCmdCompleteEvent(PVMFSessionId session_id,

Completed in 445 milliseconds

1 2