HomeSort by relevance Sort by last modified time
    Searched refs:session_id (Results 1 - 25 of 48) sorted by null

1 2

  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ServerHello.java 44 byte[] session_id; field in class:ServerHello
60 * @param session_id
65 byte[] session_id, CipherSuite cipher_suite, byte compression_method) {
72 this.session_id = session_id;
76 length = 38 + session_id.length;
91 session_id = new byte[size];
92 in.read(session_id, 0, size);
97 this.length = 38 + session_id.length;
112 out.writeUint8(session_id.length)
    [all...]
ClientHello.java 45 final byte[] session_id; field in class:ClientHello
73 session_id = ses_id;
76 length = 38 + session_id.length + (this.cipher_suites.length << 1)
92 session_id = new byte[size];
93 in.read(session_id, 0, size);
109 this.length = 38 + session_id.length + (cipher_suites.length << 1)
144 session_id = new byte[0];
165 this.length = 38 + session_id.length + (cipher_suites.length << 1)
177 out.writeUint8(session_id.length);
178 out.write(session_id);
    [all...]
ServerHandshakeImpl.java 363 FIND: if (clientHello.session_id.length != 0) {
371 && Arrays.equals(session.id, clientHello.session_id)) {
380 sessionToResume = findSessionToResume(clientHello.session_id);
672 private SSLSessionImpl findSessionToResume(byte[] session_id) {
673 return (SSLSessionImpl)parameters.getServerSessionContext().getSession(session_id);
ClientHandshakeImpl.java 237 if (serverHello.session_id.length == 0) {
241 } else if (!Arrays.equals(serverHello.session_id, clientHello.session_id)) {
260 session.id = serverHello.session_id.clone();
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 33 u8 session_id; member in struct:eap_sake_data
139 sake->session_id = data->session_id;
375 u8 subtype, session_id; local
386 session_id = req->session_id;
390 "session_id %d", subtype, session_id);
394 if (data->session_id_set && data->session_id != session_id) {
    [all...]
  /external/wpa_supplicant/
eap_sake.c 34 u8 session_id; member in struct:eap_sake_data
146 req->session_id = data->session_id;
387 u8 subtype, session_id; local
398 session_id = req->session_id;
403 "session_id %d", subtype, session_id);
407 if (data->session_id_set && data->session_id != session_id) {
    [all...]
eap_sake_common.h 59 u8 session_id; member in struct:eap_sake_hdr
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 32 u8 session_id; member in struct:eap_sake_data
77 if (os_get_random(&data->session_id, 1)) {
83 data->session_id);
122 sake->session_id = data->session_id;
261 u8 version, session_id, subtype; local
272 session_id = resp->session_id;
280 if (session_id != data->session_id) {
    [all...]
  /external/openssl/ssl/
ssl_asn1.c 99 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st
190 a.session_id.length=in->session_id_length;
191 a.session_id.type=V_ASN1_OCTET_STRING;
192 a.session_id.data=in->session_id;
274 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING);
316 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING);
425 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */
426 os.length = sizeof(ret->session_id);
429 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id));
    [all...]
ssl_sess.c 228 return s->session_id;
252 /* else - woops a session_id match */
343 if(!cb(s, ss->session_id, &tmp))
363 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp);
367 if(SSL_has_matching_session_id(s, ss->session_id,
433 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len,
447 r = tls1_process_ticket(s, session_id, len, limit, &ret);
467 memcpy(data.session_id,session_id,len);
483 && (ret=s->session_ctx->get_session_cb(s,session_id,len,&copy)
    [all...]
ssl_txt.c 149 if (BIO_printf(bp,"%02X",x->session_id[i]) <= 0) goto err;
s2_clnt.c 420 memset(s->session->session_id,0,
587 memcpy(d,s->session->session_id,(unsigned int)i);
1004 memcpy(s->session->session_id,p+1,SSL2_SSL_SESSION_ID_LENGTH);
1010 if ((s->session->session_id_length > sizeof s->session->session_id)
1011 || (0 != memcmp(buf + 1, s->session->session_id,
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_server_i.h 30 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
tlsv1_client_i.h 29 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
tlsv1_server_write.c 70 if (os_get_random(conn->session_id, conn->session_id_len)) {
72 "session_id");
75 wpa_hexdump(MSG_MSGDUMP, "TLSv1: session_id",
76 conn->session_id, conn->session_id_len);
94 /* SessionID session_id */
96 os_memcpy(pos, conn->session_id, conn->session_id_len);
  /external/chromium/net/third_party/nss/ssl/
ssl3prot.h 180 SSL3SessionID session_id; member in struct:__anon2750
189 SSL3SessionID session_id; member in struct:__anon2751
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sake_common.h 55 u8 session_id; member in struct:eap_sake_hdr
  /external/dropbear/
session.h 133 unsigned char *session_id; /* this is the hash from the first kex */ member in struct:sshsession
common-session.c 107 ses.session_id = NULL;
222 m_free(ses.session_id);
cli-authpubkey.c 162 buf_putstring(sigbuf, ses.session_id, SHA1_HASH_SIZE);
common-kex.c 232 sha1_process(&hs2, ses.session_id, SHA1_HASH_SIZE);
572 /* first time around, we set the session_id to H */
573 if (ses.session_id == NULL) {
574 /* create the session_id, this never needs freeing */
575 ses.session_id = (unsigned char*)m_malloc(SHA1_HASH_SIZE);
576 memcpy(ses.session_id, ses.hash, SHA1_HASH_SIZE);
svr-authpubkey.c 96 * session_id, concatenated with the payload packet up to the signature */
98 buf_putstring(signbuf, ses.session_id, SHA1_HASH_SIZE);
  /external/libnfc-nxp/inc/
phNfcHalTypes.h 130 uint8_t session_id[SESSIONID_SIZE]; member in struct:phHal_sHwReference
164 uint8_t session_id[SESSIONID_SIZE]; /**< Session Identifier for member in struct:phHal_sHwConfig
    [all...]
  /external/libnfc-nxp/src/
phHciNfc_AdminMgmt.c 96 uint8_t session_id[SESSIONID_LEN]; member in struct:phHciNfc_AdminGate_Info
322 cmp_val = phOsalNfc_MemCompare(p_hw_config->session_id ,
323 p_hw_ref->session_id ,
324 sizeof(p_hw_ref->session_id));
495 SESSION_INDEX, (uint8_t *)(p_hw_config->session_id),
496 sizeof(p_hw_config->session_id));
    [all...]
  /external/ppp/pppd/plugins/radius/
radius.c 117 char session_id[MAXSESSIONID + 1]; member in struct:radius_state
864 strncpy(rstate.session_id, rc_mksid(), sizeof(rstate.session_id));
867 rstate.session_id, 0, VENDOR_NONE);
954 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
1094 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
    [all...]

Completed in 149 milliseconds

1 2