/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_i.h | 24 size_t session_id_len; member in struct:tlsv1_client
|
tlsv1_server_i.h | 25 size_t session_id_len; member in struct:tlsv1_server
|
tlsv1_client_read.c | 155 if (conn->session_id_len && conn->session_id_len == *pos && 156 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { 157 pos += 1 + conn->session_id_len; 161 conn->session_id_len = *pos; 163 os_memcpy(conn->session_id, pos, conn->session_id_len); 164 pos += conn->session_id_len; 167 conn->session_id, conn->session_id_len); [all...] |
tlsv1_server_write.c | 65 conn->session_id_len = TLS_SESSION_ID_MAX_LEN; 66 if (random_get_bytes(conn->session_id, conn->session_id_len)) { 72 conn->session_id, conn->session_id_len); 91 *pos++ = conn->session_id_len; 92 os_memcpy(pos, conn->session_id, conn->session_id_len); 93 pos += conn->session_id_len;
|
tlsv1_client_write.c | 110 *pos++ = conn->session_id_len; 111 os_memcpy(pos, conn->session_id, conn->session_id_len); 112 pos += conn->session_id_len;
|
/external/boringssl/src/ssl/ |
ssl_session.cc | 659 size_t session_id_len) { 662 if (session_id_len == 0 || session_id_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { 672 data.session_id_length = session_id_len; 673 OPENSSL_memcpy(data.session_id, session_id, session_id_len); 690 session_id_len, ©)); 693 ssl, const_cast<uint8_t *>(session_id), session_id_len, ©)); 751 client_hello->session_id_len)) { 765 ssl, &session, client_hello->session_id, client_hello->session_id_len); [all...] |
tls13_server.cc | 235 client_hello.session_id_len); 236 hs->session_id_len = client_hello.session_id_len; 499 !CBB_add_bytes(&session_id, hs->session_id, hs->session_id_len) || 569 !CBB_add_bytes(&session_id, hs->session_id, hs->session_id_len) || [all...] |
handshake_client.cc | 307 !CBB_add_bytes(&child, hs->session_id, hs->session_id_len)) { 464 hs->session_id_len = ssl->session->session_id_length; 466 hs->session_id_len); 468 hs->session_id_len = sizeof(hs->session_id); 469 if (!RAND_bytes(hs->session_id, hs->session_id_len)) { 660 if (hs->session_id_len != 0 && 661 CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len)) { [all...] |
tls13_client.cc | 79 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) || 229 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) ||
|
t1_lib.cc | 221 out->session_id_len = CBS_len(&session_id); [all...] |
internal.h | 1512 uint8_t session_id_len = 0; member in struct:bssl::SSL_HANDSHAKE [all...] |
/external/syslinux/gpxe/src/net/ |
tls.c | 621 uint8_t session_id_len; member in struct:__anon38446 802 uint8_t session_id_len; member in struct:__anon38450 806 uint8_t session_id[hello_a->session_id_len]; [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 679 size_t session_id_len = 0; local 726 session_id_len = ext_session_id_len; 729 session_id_len = sm->eapSessionIdLen; 732 if (!session_id || session_id_len == 0) { 739 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 497 size_t session_id_len, emsk_len; local 504 sm->eap_proxy, &session_id_len); 508 session_id_len, emsk, [all...] |
/external/boringssl/src/include/openssl/ |
ssl.h | 3370 size_t session_id_len; member in struct:ssl_early_callback_ctx [all...] |