/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
H A D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
H A D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
H A D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 346 void srv_log(struct radius_session *sess, const char *fmt, ...) 349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 369 if (sess->server->db) { 376 sess->sess_id, sess->nas_ip, 377 sess->username, buf); 379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 382 sqlite3_errmsg(sess 435 struct radius_session *sess = client->sessions; local 448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 494 struct radius_session *sess = timeout_ctx; local 503 struct radius_session *sess = timeout_ctx; local 514 struct radius_session *sess; local 539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 611 struct radius_session *sess; local 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 981 struct radius_session *sess; local 1989 struct radius_session *sess = ctx; local 2006 struct radius_session *sess = ctx; local 2015 struct radius_session *sess = ctx; local 2039 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 346 void srv_log(struct radius_session *sess, const char *fmt, ...) 349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 369 if (sess->server->db) { 376 sess->sess_id, sess->nas_ip, 377 sess->username, buf); 379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 382 sqlite3_errmsg(sess 435 struct radius_session *sess = client->sessions; local 448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 494 struct radius_session *sess = timeout_ctx; local 503 struct radius_session *sess = timeout_ctx; local 514 struct radius_session *sess; local 539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 611 struct radius_session *sess; local 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 981 struct radius_session *sess; local 1989 struct radius_session *sess = ctx; local 2006 struct radius_session *sess = ctx; local 2015 struct radius_session *sess = ctx; local 2039 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 346 void srv_log(struct radius_session *sess, const char *fmt, ...) 349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 369 if (sess->server->db) { 376 sess->sess_id, sess->nas_ip, 377 sess->username, buf); 379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 382 sqlite3_errmsg(sess 435 struct radius_session *sess = client->sessions; local 448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 494 struct radius_session *sess = timeout_ctx; local 503 struct radius_session *sess = timeout_ctx; local 514 struct radius_session *sess; local 539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 611 struct radius_session *sess; local 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 981 struct radius_session *sess; local 1989 struct radius_session *sess = ctx; local 2006 struct radius_session *sess = ctx; local 2015 struct radius_session *sess = ctx; local 2039 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 244 struct session_op sess; local 251 memset(&sess, 0, sizeof(sess)); 252 sess.key = (caddr_t)"123456789abcdefghijklmno"; 257 sess.cipher = ciphers[i].id; 258 sess.keylen = ciphers[i].keylen; 259 sess.mac = 0; 260 if (ioctl(fd, CIOCGSESSION, &sess) != -1 && 261 ioctl(fd, CIOCFSESSION, &sess.ses) != -1) 284 struct session_op sess; local 369 struct session_op *sess = &state->d_sess; local 422 struct session_op *sess = &state->d_sess; local 464 struct session_op *sess = &state->d_sess; local 678 struct session_op *sess = &state->d_sess; local 712 struct session_op *sess = &state->d_sess; local 758 struct session_op *sess = &state->d_sess; local 794 struct session_op *sess = &state->d_sess; local 826 struct session_op *sess; local [all...] |
/external/openssl/crypto/evp/ |
H A D | openbsd_hw.c | 276 session_op sess; 284 if(!dev_crypto_init(&md_data->sess)) 290 md_data->sess.mac=mac; 292 if (ioctl(fd,CIOCGSESSION,&md_data->sess) == -1) 302 if (ioctl(fd,CIOCFSESSION,&md_data->sess.ses) == -1) 377 return do_digest(md_data->sess.ses,md_data->md,data,len); 398 ret=do_digest(md_data->sess.ses,md,md_data->data,md_data->len);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_sess.c | 169 SSL_SESSION *sess; local 174 sess = ssl->session; 175 if(sess) 176 sess->references++; 178 return(sess); 899 static void timeout_doall_arg(SSL_SESSION *sess, void *void_param) argument 903 if ((param->time == 0) || (param->time > (sess->time+sess->timeout))) /* timeout */ 907 (void)lh_SSL_SESSION_delete(param->cache,sess); 908 SSL_SESSION_list_remove(param->ctx,sess); 997 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument 1008 SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) argument [all...] |
H A D | s3_pkt.c | 297 SSL_SESSION *sess; local 306 sess=s->session; 432 if ((sess != NULL) && 649 SSL_SESSION *sess; local 673 sess=s->session; 675 if ( (sess == NULL) ||
|
H A D | d1_pkt.c | 373 SSL_SESSION *sess; local 379 sess = s->session; 427 if ((sess != NULL) && 1353 SSL_SESSION *sess; local 1377 sess=s->session; 1379 if ( (sess == NULL) ||
|
H A D | s3_lib.c | 1388 SSL_SESSION *sess = s->session; local 1390 if (!sess || !sess->tlsext_ecpointformatlist) 1392 *pformat = sess->tlsext_ecpointformatlist; 1393 return (int)sess->tlsext_ecpointformatlist_length;
|
/external/openssl/ssl/ |
H A D | s2_clnt.c | 618 SSL_SESSION *sess; local 632 sess=s->session; 637 i=ssl_put_cipher_by_char(s,sess->cipher,p); 642 sess->key_arg_length=i; 650 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0) 655 sess->master_key_length=i; 658 if (i > (int)sizeof(sess->master_key)) 664 if (RAND_bytes(sess->master_key,i) <= 0) 671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 673 else if (SSL_C_IS_EXPORT(sess [all...] |
H A D | ssl_sess.c | 159 SSL_SESSION *sess; local 164 sess = ssl->session; 165 if(sess) 166 sess->references++; 168 return(sess); 1091 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) 1096 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess) 1102 void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) 1107 void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(SSL_CTX * ctx,SSL_SESSION *sess) 1090 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument 1101 SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) argument
|
H A D | s3_pkt.c | 296 SSL_SESSION *sess; local 305 sess=s->session; 429 if ((sess != NULL) && 703 SSL_SESSION *sess; local 728 sess=s->session; 730 if ( (sess == NULL) ||
|
H A D | d1_pkt.c | 383 SSL_SESSION *sess; local 389 sess = s->session; 437 if ((sess != NULL) && 1481 SSL_SESSION *sess; local 1506 sess=s->session; 1508 if ( (sess == NULL) ||
|