Searched defs:sess (Results 1 - 25 of 31) sorted by last modified time

12

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c331 int eap_eke_derive_key(struct eap_eke_session *sess, argument
342 os_memset(zeros, 0, sess->prf_len);
343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len,
347 temp, sess->prf_len);
357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len,
370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument
377 dh_len = eap_eke_dh_len(sess->dhgroup);
387 if (sess
405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument
452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument
668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument
718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument
762 eap_eke_session_clean(struct eap_eke_session *sess) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_eke.c27 struct eap_eke_session sess; member in struct:eap_eke_data
137 eap_eke_session_clean(&data->sess);
211 eap_eke_session_clean(&data->sess);
284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2],
388 if (pos + data->sess.dhcomp_len > end) {
395 pos, data->sess.dhcomp_len);
397 pos += data->sess.dhcomp_len;
404 if (eap_eke_derive_key(&data->sess, password, password_len,
416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) {
423 if (eap_eke_shared_secret(&data->sess, ke
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_eke.c29 struct eap_eke_session sess; member in struct:eap_eke_data
104 eap_eke_session_clean(&data->sess);
253 if (eap_eke_derive_key(&data->sess, sm->user->password,
262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len,
277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) {
283 if (eap_eke_dhcomp(&data->sess, data->key, pub,
284 wpabuf_put(msg, data->sess.dhcomp_len))
313 plen = data->sess.pnonce_ps_len + data->sess.prf_len;
320 if (random_get_bytes(data->nonce_s, data->sess
[all...]
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.c346 void srv_log(struct radius_session *sess, const char *fmt, ...)
349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument
366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf);
369 if (sess->server->db) {
376 sess->sess_id, sess->nas_ip,
377 sess->username, buf);
379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL,
382 sqlite3_errmsg(sess
435 struct radius_session *sess = client->sessions; local
448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument
464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument
494 struct radius_session *sess = timeout_ctx; local
503 struct radius_session *sess = timeout_ctx; local
514 struct radius_session *sess; local
539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument
585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument
611 struct radius_session *sess; local
696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
981 struct radius_session *sess; local
1989 struct radius_session *sess = ctx; local
2006 struct radius_session *sess = ctx; local
2015 struct radius_session *sess = ctx; local
2039 struct radius_session *s, *sess = NULL; local
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.c331 int eap_eke_derive_key(struct eap_eke_session *sess, argument
342 os_memset(zeros, 0, sess->prf_len);
343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len,
347 temp, sess->prf_len);
357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len,
370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument
377 dh_len = eap_eke_dh_len(sess->dhgroup);
387 if (sess
405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument
452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument
668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument
718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument
762 eap_eke_session_clean(struct eap_eke_session *sess) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_eke.c27 struct eap_eke_session sess; member in struct:eap_eke_data
137 eap_eke_session_clean(&data->sess);
211 eap_eke_session_clean(&data->sess);
284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2],
388 if (pos + data->sess.dhcomp_len > end) {
395 pos, data->sess.dhcomp_len);
397 pos += data->sess.dhcomp_len;
404 if (eap_eke_derive_key(&data->sess, password, password_len,
416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) {
423 if (eap_eke_shared_secret(&data->sess, ke
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_eke.c29 struct eap_eke_session sess; member in struct:eap_eke_data
104 eap_eke_session_clean(&data->sess);
253 if (eap_eke_derive_key(&data->sess, sm->user->password,
262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len,
277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) {
283 if (eap_eke_dhcomp(&data->sess, data->key, pub,
284 wpabuf_put(msg, data->sess.dhcomp_len))
313 plen = data->sess.pnonce_ps_len + data->sess.prf_len;
320 if (random_get_bytes(data->nonce_s, data->sess
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius_server.c346 void srv_log(struct radius_session *sess, const char *fmt, ...)
349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument
366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf);
369 if (sess->server->db) {
376 sess->sess_id, sess->nas_ip,
377 sess->username, buf);
379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL,
382 sqlite3_errmsg(sess
435 struct radius_session *sess = client->sessions; local
448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument
464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument
494 struct radius_session *sess = timeout_ctx; local
503 struct radius_session *sess = timeout_ctx; local
514 struct radius_session *sess; local
539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument
585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument
611 struct radius_session *sess; local
696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
981 struct radius_session *sess; local
1989 struct radius_session *sess = ctx; local
2006 struct radius_session *sess = ctx; local
2015 struct radius_session *sess = ctx; local
2039 struct radius_session *s, *sess = NULL; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.c331 int eap_eke_derive_key(struct eap_eke_session *sess, argument
342 os_memset(zeros, 0, sess->prf_len);
343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len,
347 temp, sess->prf_len);
357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len,
370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument
377 dh_len = eap_eke_dh_len(sess->dhgroup);
387 if (sess
405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument
452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument
668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument
718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument
731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument
762 eap_eke_session_clean(struct eap_eke_session *sess) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_eke.c27 struct eap_eke_session sess; member in struct:eap_eke_data
137 eap_eke_session_clean(&data->sess);
211 eap_eke_session_clean(&data->sess);
284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2],
388 if (pos + data->sess.dhcomp_len > end) {
395 pos, data->sess.dhcomp_len);
397 pos += data->sess.dhcomp_len;
404 if (eap_eke_derive_key(&data->sess, password, password_len,
416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) {
423 if (eap_eke_shared_secret(&data->sess, ke
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_eke.c29 struct eap_eke_session sess; member in struct:eap_eke_data
104 eap_eke_session_clean(&data->sess);
253 if (eap_eke_derive_key(&data->sess, sm->user->password,
262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len,
277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) {
283 if (eap_eke_dhcomp(&data->sess, data->key, pub,
284 wpabuf_put(msg, data->sess.dhcomp_len))
313 plen = data->sess.pnonce_ps_len + data->sess.prf_len;
320 if (random_get_bytes(data->nonce_s, data->sess
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_server.c346 void srv_log(struct radius_session *sess, const char *fmt, ...)
349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument
366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf);
369 if (sess->server->db) {
376 sess->sess_id, sess->nas_ip,
377 sess->username, buf);
379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL,
382 sqlite3_errmsg(sess
435 struct radius_session *sess = client->sessions; local
448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument
464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument
494 struct radius_session *sess = timeout_ctx; local
503 struct radius_session *sess = timeout_ctx; local
514 struct radius_session *sess; local
539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument
585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument
611 struct radius_session *sess; local
696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
981 struct radius_session *sess; local
1989 struct radius_session *sess = ctx; local
2006 struct radius_session *sess = ctx; local
2015 struct radius_session *sess = ctx; local
2039 struct radius_session *s, *sess = NULL; local
[all...]
/external/openssl/apps/
H A Ds_client.c1263 SSL_SESSION *sess; local
1272 sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL);
1274 if (!sess)
1281 SSL_set_session(con, sess);
1282 SSL_SESSION_free(sess);
/external/openssl/crypto/engine/
H A Deng_cryptodev.c244 struct session_op sess; local
251 memset(&sess, 0, sizeof(sess));
252 sess.key = (caddr_t)"123456789abcdefghijklmno";
257 sess.cipher = ciphers[i].id;
258 sess.keylen = ciphers[i].keylen;
259 sess.mac = 0;
260 if (ioctl(fd, CIOCGSESSION, &sess) != -1 &&
261 ioctl(fd, CIOCFSESSION, &sess.ses) != -1)
284 struct session_op sess; local
369 struct session_op *sess = &state->d_sess; local
422 struct session_op *sess = &state->d_sess; local
464 struct session_op *sess = &state->d_sess; local
678 struct session_op *sess = &state->d_sess; local
712 struct session_op *sess = &state->d_sess; local
758 struct session_op *sess = &state->d_sess; local
794 struct session_op *sess = &state->d_sess; local
826 struct session_op *sess; local
[all...]
/external/openssl/ssl/
H A Dd1_clnt.c792 SSL_SESSION *sess = s->session; local
796 !sess->session_id_length ||
798 (!sess->session_id_length && !sess->tlsext_tick) ||
H A Dd1_pkt.c383 SSL_SESSION *sess; local
389 sess = s->session;
437 if ((sess != NULL) &&
1481 SSL_SESSION *sess; local
1506 sess=s->session;
1508 if ( (sess == NULL) ||
H A Ds2_clnt.c618 SSL_SESSION *sess; local
632 sess=s->session;
637 i=ssl_put_cipher_by_char(s,sess->cipher,p);
642 sess->key_arg_length=i;
650 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0)
655 sess->master_key_length=i;
658 if (i > (int)sizeof(sess->master_key))
664 if (RAND_bytes(sess->master_key,i) <= 0)
671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
673 else if (SSL_C_IS_EXPORT(sess
[all...]
H A Ds3_clnt.c737 SSL_SESSION *sess = s->session; local
738 if ((sess == NULL) ||
739 (sess->ssl_version != s->version) ||
741 !sess->session_id_length ||
743 (!sess->session_id_length && !sess->tlsext_tick) ||
745 (sess->not_resumable))
H A Ds3_pkt.c296 SSL_SESSION *sess; local
305 sess=s->session;
429 if ((sess != NULL) &&
703 SSL_SESSION *sess; local
728 sess=s->session;
730 if ( (sess == NULL) ||
H A Ds3_srvr.c3467 SSL_SESSION *sess; local
3490 sess = d2i_SSL_SESSION(NULL, &const_p, slen_full);
3491 if (sess == NULL)
3496 sess->session_id_length = 0; /* ID is irrelevant for the ticket */
3498 slen = i2d_SSL_SESSION(sess, NULL);
3505 i2d_SSL_SESSION(sess, &p);
3506 SSL_SESSION_free(sess);
H A Dssl_sess.c159 SSL_SESSION *sess; local
164 sess = ssl->session;
165 if(sess)
166 sess->references++;
168 return(sess);
1091 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess))
1096 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess)
1102 void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess))
1107 void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(SSL_CTX * ctx,SSL_SESSION *sess)
1090 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument
1101 SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) argument
H A Dt1_lib.c2513 SSL_SESSION *sess; local
2589 sess = d2i_SSL_SESSION(NULL, &p, slen);
2591 if (sess)
2599 memcpy(sess->session_id, sess_id, sesslen);
2600 sess->session_id_length = sesslen;
2601 *psess = sess;
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dd1_pkt.c373 SSL_SESSION *sess; local
379 sess = s->session;
427 if ((sess != NULL) &&
1353 SSL_SESSION *sess; local
1377 sess=s->session;
1379 if ( (sess == NULL) ||
H A Ds3_clnt.c625 SSL_SESSION *sess = s->session; local
626 if (sess == NULL ||
627 sess->ssl_version != s->version ||
628 !sess->session_id_length ||
629 sess->not_resumable)
H A Ds3_lib.c1388 SSL_SESSION *sess = s->session; local
1390 if (!sess || !sess->tlsext_ecpointformatlist)
1392 *pformat = sess->tlsext_ecpointformatlist;
1393 return (int)sess->tlsext_ecpointformatlist_length;

Completed in 2130 milliseconds

12