/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ClientHello.java | 45 final byte[] session_id; field in class:ClientHello 73 session_id = ses_id; 76 length = 38 + session_id.length + (this.cipher_suites.length << 1) 92 session_id = new byte[size]; 93 in.read(session_id, 0, size); 109 this.length = 38 + session_id.length + (cipher_suites.length << 1) 144 session_id = new byte[0]; 165 this.length = 38 + session_id.length + (cipher_suites.length << 1) 177 out.writeUint8(session_id.length); 178 out.write(session_id); [all...] |
ServerHello.java | 44 byte[] session_id; field in class:ServerHello 60 * @param session_id 65 byte[] session_id, CipherSuite cipher_suite, byte compression_method) { 72 this.session_id = session_id; 76 length = 38 + session_id.length; 91 session_id = new byte[size]; 92 in.read(session_id, 0, size); 97 this.length = 38 + session_id.length; 112 out.writeUint8(session_id.length) [all...] |
/external/libnfc-nxp/src/ |
phHciNfc_AdminMgmt.c | 96 uint8_t session_id[SESSIONID_LEN]; member in struct:phHciNfc_AdminGate_Info 322 cmp_val = phOsalNfc_MemCompare(p_hw_config->session_id , 323 p_hw_ref->session_id , 324 sizeof(p_hw_ref->session_id)); 495 SESSION_INDEX, (uint8_t *)(p_hw_config->session_id), 496 sizeof(p_hw_config->session_id)); [all...] |
/external/openssl/ssl/ |
ssl_asn1.c | 99 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st 190 a.session_id.length=in->session_id_length; 191 a.session_id.type=V_ASN1_OCTET_STRING; 192 a.session_id.data=in->session_id; 274 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); 316 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); 425 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */ 426 os.length = sizeof(ret->session_id); 429 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id)); [all...] |
ssl.h | 426 * Session_ID OCTET STRING, -- the Session ID 453 /* session_id - valid? */ 455 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st [all...] |
/external/wpa_supplicant/ |
eap_sake.c | 34 u8 session_id; member in struct:eap_sake_data 146 req->session_id = data->session_id; 387 u8 subtype, session_id; local 398 session_id = req->session_id; 403 "session_id %d", subtype, session_id); 407 if (data->session_id_set && data->session_id != session_id) { [all...] |
eap_sake_common.h | 59 u8 session_id; member in struct:eap_sake_hdr
|
eap_gpsk.c | 32 u8 session_id; member in struct:eap_gpsk_data
|
tlsv1_client.c | 42 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client 210 /* SessionID session_id */ 212 os_memcpy(pos, conn->session_id, conn->session_id_len); 314 /* SessionID session_id */ 320 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { 327 os_memcpy(conn->session_id, pos, conn->session_id_len); 330 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 331 conn->session_id, conn->session_id_len); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sake_common.h | 55 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 33 u8 session_id; member in struct:eap_sake_data 139 sake->session_id = data->session_id; 375 u8 subtype, session_id; local 386 session_id = req->session_id; 390 "session_id %d", subtype, session_id); 394 if (data->session_id_set && data->session_id != session_id) { [all...] |
eap_gpsk.c | 31 u8 session_id; member in struct:eap_gpsk_data
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 32 u8 session_id; member in struct:eap_sake_data 77 if (os_get_random(&data->session_id, 1)) { 83 data->session_id); 122 sake->session_id = data->session_id; 261 u8 version, session_id, subtype; local 272 session_id = resp->session_id; 280 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_i.h | 29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
tlsv1_server_i.h | 30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/ppp/pppd/plugins/radius/ |
radius.c | 117 char session_id[MAXSESSIONID + 1]; member in struct:radius_state 864 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id)); 867 rstate.session_id, 0, VENDOR_NONE); 954 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id, 1094 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id, [all...] |
/external/dropbear/ |
session.h | 133 unsigned char *session_id; /* this is the hash from the first kex */ member in struct:sshsession
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
if_ppp.h | 115 __u16 session_id; /* if zero, get tunnel stats */ member in struct:pppol2tp_ioc_stats 116 __u32 using_ipsec:1; /* valid only for session_id == 0 */
|
/external/chromium/net/third_party/nss/ssl/ |
ssl3prot.h | 180 SSL3SessionID session_id; member in struct:__anon2583 189 SSL3SessionID session_id; member in struct:__anon2584
|
/external/libnfc-nxp/inc/ |
phNfcHalTypes.h | 152 uint8_t session_id[SESSIONID_SIZE]; member in struct:phHal_sHwReference 186 uint8_t session_id[SESSIONID_SIZE]; /**< Session Identifier for member in struct:phHal_sHwConfig [all...] |
/hardware/qcom/gps/loc_api/libloc_api-rpc/inc-1240/ |
loc_api_common.h | 359 char session_id[4]; member in struct:rpc_loc_ni_supl_slp_session_id_s_type [all...] |
/hardware/qcom/gps/loc_api/libloc_api-rpc/inc-3200/ |
loc_api_common.h | 349 char session_id[4]; member in struct:rpc_loc_ni_supl_slp_session_id_s_type [all...] |
/external/openssl/include/openssl/ |
ssl.h | 426 * Session_ID OCTET STRING, -- the Session ID 453 /* session_id - valid? */ 455 unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; member in struct:ssl_session_st [all...] |