/external/openssl/ssl/ |
H A D | s2_clnt.c | 618 SSL_SESSION *sess; local 632 sess=s->session; 637 i=ssl_put_cipher_by_char(s,sess->cipher,p); 642 sess->key_arg_length=i; 650 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0) 655 sess->master_key_length=i; 658 if (i > (int)sizeof(sess->master_key)) 664 if (RAND_bytes(sess->master_key,i) <= 0) 671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 673 else if (SSL_C_IS_EXPORT(sess [all...] |
H A D | d1_clnt.c | 792 SSL_SESSION *sess = s->session; local 796 !sess->session_id_length || 798 (!sess->session_id_length && !sess->tlsext_tick) ||
|
H A D | s3_pkt.c | 296 SSL_SESSION *sess; local 305 sess=s->session; 429 if ((sess != NULL) && 703 SSL_SESSION *sess; local 728 sess=s->session; 730 if ( (sess == NULL) ||
|
H A D | d1_pkt.c | 383 SSL_SESSION *sess; local 389 sess = s->session; 437 if ((sess != NULL) && 1481 SSL_SESSION *sess; local 1506 sess=s->session; 1508 if ( (sess == NULL) ||
|
H A D | ssl_sess.c | 159 SSL_SESSION *sess; local 164 sess = ssl->session; 165 if(sess) 166 sess->references++; 168 return(sess); 1091 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) 1096 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess) 1102 void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) 1107 void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(SSL_CTX * ctx,SSL_SESSION *sess) 1090 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument 1101 SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) argument
|
H A D | s3_clnt.c | 737 SSL_SESSION *sess = s->session; local 738 if ((sess == NULL) || 739 (sess->ssl_version != s->version) || 741 !sess->session_id_length || 743 (!sess->session_id_length && !sess->tlsext_tick) || 745 (sess->not_resumable))
|
H A D | t1_lib.c | 2513 SSL_SESSION *sess; local 2589 sess = d2i_SSL_SESSION(NULL, &p, slen); 2591 if (sess) 2599 memcpy(sess->session_id, sess_id, sesslen); 2600 sess->session_id_length = sesslen; 2601 *psess = sess;
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | d1_pkt.c | 373 SSL_SESSION *sess; local 379 sess = s->session; 427 if ((sess != NULL) && 1353 SSL_SESSION *sess; local 1377 sess=s->session; 1379 if ( (sess == NULL) ||
|
H A D | s3_pkt.c | 297 SSL_SESSION *sess; local 306 sess=s->session; 432 if ((sess != NULL) && 649 SSL_SESSION *sess; local 673 sess=s->session; 675 if ( (sess == NULL) ||
|
H A D | s3_lib.c | 1388 SSL_SESSION *sess = s->session; local 1390 if (!sess || !sess->tlsext_ecpointformatlist) 1392 *pformat = sess->tlsext_ecpointformatlist; 1393 return (int)sess->tlsext_ecpointformatlist_length;
|
H A D | ssl_sess.c | 169 SSL_SESSION *sess; local 174 sess = ssl->session; 175 if(sess) 176 sess->references++; 178 return(sess); 899 static void timeout_doall_arg(SSL_SESSION *sess, void *void_param) argument 903 if ((param->time == 0) || (param->time > (sess->time+sess->timeout))) /* timeout */ 907 (void)lh_SSL_SESSION_delete(param->cache,sess); 908 SSL_SESSION_list_remove(param->ctx,sess); 997 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument 1008 SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) argument [all...] |
H A D | s3_clnt.c | 625 SSL_SESSION *sess = s->session; local 626 if (sess == NULL || 627 sess->ssl_version != s->version || 628 !sess->session_id_length || 629 sess->not_resumable)
|
H A D | s3_srvr.c | 2527 SSL_SESSION *sess; local 2550 sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); 2551 if (sess == NULL) 2556 sess->session_id_length = 0; /* ID is irrelevant for the ticket */ 2558 slen = i2d_SSL_SESSION(sess, NULL); 2565 i2d_SSL_SESSION(sess, &p); 2566 SSL_SESSION_free(sess);
|
H A D | t1_lib.c | 2346 SSL_SESSION *sess; local 2419 sess = d2i_SSL_SESSION(NULL, &p, slen); 2421 if (sess) 2429 memcpy(sess->session_id, sess_id, sesslen); 2430 sess->session_id_length = sesslen; 2431 *psess = sess;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 244 struct session_op sess; local 251 memset(&sess, 0, sizeof(sess)); 252 sess.key = (caddr_t)"123456789abcdefghijklmno"; 257 sess.cipher = ciphers[i].id; 258 sess.keylen = ciphers[i].keylen; 259 sess.mac = 0; 260 if (ioctl(fd, CIOCGSESSION, &sess) != -1 && 261 ioctl(fd, CIOCFSESSION, &sess.ses) != -1) 284 struct session_op sess; local 369 struct session_op *sess = &state->d_sess; local 422 struct session_op *sess = &state->d_sess; local 464 struct session_op *sess = &state->d_sess; local 678 struct session_op *sess = &state->d_sess; local 712 struct session_op *sess = &state->d_sess; local 758 struct session_op *sess = &state->d_sess; local 794 struct session_op *sess = &state->d_sess; local 826 struct session_op *sess; local [all...] |
/external/openssl/apps/ |
H A D | s_client.c | 1263 SSL_SESSION *sess; local 1272 sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL); 1274 if (!sess) 1281 SSL_set_session(con, sess); 1282 SSL_SESSION_free(sess);
|