/dflybsd-src/contrib/wpa_supplicant/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() 297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() 320 static int session_respond(const char *session_id, char *buf, size_t buflen) in session_respond() 363 static int session_transfer(const char *session_id, char *buf, size_t buflen) in session_transfer() 387 static int session_teardown(const char *session_id, char *buf, size_t buflen) in session_teardown() 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; in fst_ctrl_iface_on_event() local
|
/dflybsd-src/crypto/libressl/ssl/ |
H A D | ssl_asn1.c | 50 CBB cbb, session, cipher_suite, session_id, master_key, time, timeout; in SSL_SESSION_encode() local 245 CBS cbs, session, cipher_suite, session_id, master_key, peer_cert; in d2i_SSL_SESSION() local
|
H A D | ssl_sess.c | 428 ssl_session_from_cache(SSL *s, CBS *session_id) in ssl_session_from_cache() 458 ssl_session_from_callback(SSL *s, CBS *session_id) in ssl_session_from_callback() 495 ssl_session_by_id(SSL *s, CBS *session_id) in ssl_session_by_id() 530 ssl_get_prev_session(SSL *s, CBS *session_id, CBS *ext_block, int *alert) in ssl_get_prev_session()
|
H A D | ssl_packet.c | 73 CBB cbb, handshake, client_hello, cipher_suites, compression, session_id; in ssl_convert_sslv2_client_hello() local
|
H A D | tls13_server.c | 147 CBS cipher_suites, client_random, compression_methods, session_id; in tls13_client_hello_process() local 334 CBB session_id; in tls13_server_hello_build() local
|
H A D | tls13_client.c | 90 CBB cipher_suites, compression_methods, session_id; in tls13_client_hello_build() local 211 CBS server_random, session_id; in tls13_server_hello_process() local
|
H A D | ssl_srvr.c | 780 CBS cbs, client_random, session_id, cookie, cipher_suites; in ssl3_get_client_hello() local 1217 CBB cbb, server_hello, session_id; in ssl3_send_server_hello() local
|
H A D | ssl_clnt.c | 646 CBB cbb, client_hello, session_id, cookie, cipher_suites; in ssl3_send_client_hello() local 819 CBS cbs, server_random, session_id; in ssl3_get_server_hello() local
|
/dflybsd-src/contrib/tcpdump/ |
H A D | print-someip.c | 89 uint16_t session_id; in someip_print() local
|
H A D | print-lwapp.c | 69 nd_uint32_t session_id; member
|
H A D | print-rpki-rtr.c | 44 nd_uint16_t session_id; /* Session id */ member
|
/dflybsd-src/contrib/wpa_supplicant/src/p2p/ |
H A D | p2p_pd.c | 406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 1201 u32 session_id; in p2p_validate_p2ps_pd_resp() local
|
/dflybsd-src/sys/dev/drm/amd/amdgpu/ |
H A D | psp_gfx_if.h | 116 uint32_t session_id; /* Session ID of the loaded TA to be unloaded */ member 149 uint32_t session_id; /* Session ID of the TA to be executed */ member 234 uint32_t session_id; /* +4 session ID in response to LoadTa command */ member
|
/dflybsd-src/sys/netgraph7/l2tp/ |
H A D | ng_l2tp.c | 407 u_int16_t session_id; in ng_l2tp_newhook() local 542 u_int16_t session_id; in ng_l2tp_rcvmsg() local 596 uint16_t session_id; in ng_l2tp_rcvmsg() local 1520 u_int16_t session_id = 0; in ng_l2tp_xmit_ctrl() local
|
H A D | ng_l2tp.h | 98 u_int16_t session_id; /* local session id */ member
|
/dflybsd-src/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 28 u8 session_id; member 379 u8 subtype, session_id, id; in eap_sake_process() local
|
/dflybsd-src/sys/netgraph/l2tp/ |
H A D | ng_l2tp.c | 359 u_int16_t session_id; in ng_l2tp_newhook() local 504 u_int16_t session_id; in ng_l2tp_rcvmsg() local 1370 u_int16_t session_id = 0; in ng_l2tp_xmit_ctrl() local
|
H A D | ng_l2tp.h | 84 u_int16_t session_id; /* local session id */ member
|
/dflybsd-src/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member 241 u8 version, session_id, subtype; in eap_sake_check() local
|
/dflybsd-src/crypto/openssh/ |
H A D | gss-genr.c | 260 const char *context, const struct sshbuf *session_id) in ssh_gssapi_buildmic()
|
/dflybsd-src/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.h | 49 u8 session_id; member
|
H A D | eap_pwd_common.c | 308 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys()
|
/dflybsd-src/usr.sbin/ppp/ |
H A D | radius.h | 71 char session_id[256]; /* Unique session ID */ member
|
/dflybsd-src/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
|
H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
|