/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ServerHello.java | 44 byte[] session_id; field in class:ServerHello 60 * @param session_id 65 byte[] session_id, CipherSuite cipher_suite, byte compression_method) { 72 this.session_id = session_id; 76 length = 38 + session_id.length; 91 session_id = new byte[size]; 92 in.read(session_id, 0, size); 97 this.length = 38 + session_id.length; 112 out.writeUint8(session_id.length) [all...] |
ClientHello.java | 45 final byte[] session_id; field in class:ClientHello 73 session_id = ses_id; 76 length = 38 + session_id.length + (this.cipher_suites.length << 1) 92 session_id = new byte[size]; 93 in.read(session_id, 0, size); 109 this.length = 38 + session_id.length + (cipher_suites.length << 1) 144 session_id = new byte[0]; 165 this.length = 38 + session_id.length + (cipher_suites.length << 1) 177 out.writeUint8(session_id.length); 178 out.write(session_id); [all...] |
ServerHandshakeImpl.java | 363 FIND: if (clientHello.session_id.length != 0) { 371 && Arrays.equals(session.id, clientHello.session_id)) { 380 sessionToResume = findSessionToResume(clientHello.session_id); 672 private SSLSessionImpl findSessionToResume(byte[] session_id) { 673 return (SSLSessionImpl)parameters.getServerSessionContext().getSession(session_id);
|
ClientHandshakeImpl.java | 237 if (serverHello.session_id.length == 0) { 241 } else if (!Arrays.equals(serverHello.session_id, clientHello.session_id)) { 260 session.id = serverHello.session_id.clone();
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 33 u8 session_id; member in struct:eap_sake_data 139 sake->session_id = data->session_id; 375 u8 subtype, session_id; local 386 session_id = req->session_id; 390 "session_id %d", subtype, session_id); 394 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant/ |
eap_sake.c | 34 u8 session_id; member in struct:eap_sake_data 146 req->session_id = data->session_id; 387 u8 subtype, session_id; local 398 session_id = req->session_id; 403 "session_id %d", subtype, session_id); 407 if (data->session_id_set && data->session_id != session_id) { [all...] |
eap_sake_common.h | 59 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 32 u8 session_id; member in struct:eap_sake_data 77 if (os_get_random(&data->session_id, 1)) { 83 data->session_id); 122 sake->session_id = data->session_id; 261 u8 version, session_id, subtype; local 272 session_id = resp->session_id; 280 if (session_id != data->session_id) { [all...] |
/external/openssl/ssl/ |
ssl_asn1.c | 99 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st 190 a.session_id.length=in->session_id_length; 191 a.session_id.type=V_ASN1_OCTET_STRING; 192 a.session_id.data=in->session_id; 274 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); 316 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); 425 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */ 426 os.length = sizeof(ret->session_id); 429 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id)); [all...] |
ssl_sess.c | 228 return s->session_id; 252 /* else - woops a session_id match */ 343 if(!cb(s, ss->session_id, &tmp)) 363 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp); 367 if(SSL_has_matching_session_id(s, ss->session_id, 433 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len, 447 r = tls1_process_ticket(s, session_id, len, limit, &ret); 467 memcpy(data.session_id,session_id,len); 483 && (ret=s->session_ctx->get_session_cb(s,session_id,len,©) [all...] |
ssl_txt.c | 149 if (BIO_printf(bp,"%02X",x->session_id[i]) <= 0) goto err;
|
s2_clnt.c | 420 memset(s->session->session_id,0, 587 memcpy(d,s->session->session_id,(unsigned int)i); 1004 memcpy(s->session->session_id,p+1,SSL2_SSL_SESSION_ID_LENGTH); 1010 if ((s->session->session_id_length > sizeof s->session->session_id) 1011 || (0 != memcmp(buf + 1, s->session->session_id,
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_i.h | 30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
tlsv1_client_i.h | 29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
tlsv1_server_write.c | 70 if (os_get_random(conn->session_id, conn->session_id_len)) { 72 "session_id"); 75 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id", 76 conn->session_id, conn->session_id_len); 94 /* SessionID session_id */ 96 os_memcpy(pos, conn->session_id, conn->session_id_len);
|
/external/chromium/net/third_party/nss/ssl/ |
ssl3prot.h | 180 SSL3SessionID session_id; member in struct:__anon2750 189 SSL3SessionID session_id; member in struct:__anon2751
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sake_common.h | 55 u8 session_id; member in struct:eap_sake_hdr
|
/external/dropbear/ |
session.h | 133 unsigned char *session_id; /* this is the hash from the first kex */ member in struct:sshsession
|
common-session.c | 107 ses.session_id = NULL; 222 m_free(ses.session_id);
|
cli-authpubkey.c | 162 buf_putstring(sigbuf, ses.session_id, SHA1_HASH_SIZE);
|
common-kex.c | 232 sha1_process(&hs2, ses.session_id, SHA1_HASH_SIZE); 572 /* first time around, we set the session_id to H */ 573 if (ses.session_id == NULL) { 574 /* create the session_id, this never needs freeing */ 575 ses.session_id = (unsigned char*)m_malloc(SHA1_HASH_SIZE); 576 memcpy(ses.session_id, ses.hash, SHA1_HASH_SIZE);
|
svr-authpubkey.c | 96 * session_id, concatenated with the payload packet up to the signature */ 98 buf_putstring(signbuf, ses.session_id, SHA1_HASH_SIZE);
|
/external/libnfc-nxp/inc/ |
phNfcHalTypes.h | 130 uint8_t session_id[SESSIONID_SIZE]; member in struct:phHal_sHwReference 164 uint8_t session_id[SESSIONID_SIZE]; /**< Session Identifier for member in struct:phHal_sHwConfig [all...] |
/external/libnfc-nxp/src/ |
phHciNfc_AdminMgmt.c | 96 uint8_t session_id[SESSIONID_LEN]; member in struct:phHciNfc_AdminGate_Info 322 cmp_val = phOsalNfc_MemCompare(p_hw_config->session_id , 323 p_hw_ref->session_id , 324 sizeof(p_hw_ref->session_id)); 495 SESSION_INDEX, (uint8_t *)(p_hw_config->session_id), 496 sizeof(p_hw_config->session_id)); [all...] |
/external/ppp/pppd/plugins/radius/ |
radius.c | 117 char session_id[MAXSESSIONID + 1]; member in struct:radius_state 864 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id)); 867 rstate.session_id, 0, VENDOR_NONE); 954 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id, 1094 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id, [all...] |