/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 346 void srv_log(struct radius_session *sess, const char *fmt, ...) 349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 369 if (sess->server->db) { 376 sess->sess_id, sess->nas_ip, 377 sess->username, buf); 379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 382 sqlite3_errmsg(sess 435 struct radius_session *sess = client->sessions; local 448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 494 struct radius_session *sess = timeout_ctx; local 503 struct radius_session *sess = timeout_ctx; local 514 struct radius_session *sess; local 539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 611 struct radius_session *sess; local 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 981 struct radius_session *sess; local 1989 struct radius_session *sess = ctx; local 2006 struct radius_session *sess = ctx; local 2015 struct radius_session *sess = ctx; local 2039 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 346 void srv_log(struct radius_session *sess, const char *fmt, ...) 349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 369 if (sess->server->db) { 376 sess->sess_id, sess->nas_ip, 377 sess->username, buf); 379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 382 sqlite3_errmsg(sess 435 struct radius_session *sess = client->sessions; local 448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 494 struct radius_session *sess = timeout_ctx; local 503 struct radius_session *sess = timeout_ctx; local 514 struct radius_session *sess; local 539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 611 struct radius_session *sess; local 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 981 struct radius_session *sess; local 1989 struct radius_session *sess = ctx; local 2006 struct radius_session *sess = ctx; local 2015 struct radius_session *sess = ctx; local 2039 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, argument 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess 405 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 718 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 731 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 762 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 211 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 388 if (pos + data->sess.dhcomp_len > end) { 395 pos, data->sess.dhcomp_len); 397 pos += data->sess.dhcomp_len; 404 if (eap_eke_derive_key(&data->sess, password, password_len, 416 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 423 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 346 void srv_log(struct radius_session *sess, const char *fmt, ...) 349 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 366 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 369 if (sess->server->db) { 376 sess->sess_id, sess->nas_ip, 377 sess->username, buf); 379 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 382 sqlite3_errmsg(sess 435 struct radius_session *sess = client->sessions; local 448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 494 struct radius_session *sess = timeout_ctx; local 503 struct radius_session *sess = timeout_ctx; local 514 struct radius_session *sess; local 539 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 585 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 611 struct radius_session *sess; local 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 981 struct radius_session *sess; local 1989 struct radius_session *sess = ctx; local 2006 struct radius_session *sess = ctx; local 2015 struct radius_session *sess = ctx; local 2039 struct radius_session *s, *sess = NULL; local [all...] |
/external/openssl/apps/ |
H A D | s_client.c | 1263 SSL_SESSION *sess; local 1272 sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL); 1274 if (!sess) 1281 SSL_set_session(con, sess); 1282 SSL_SESSION_free(sess);
|
/external/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 244 struct session_op sess; local 251 memset(&sess, 0, sizeof(sess)); 252 sess.key = (caddr_t)"123456789abcdefghijklmno"; 257 sess.cipher = ciphers[i].id; 258 sess.keylen = ciphers[i].keylen; 259 sess.mac = 0; 260 if (ioctl(fd, CIOCGSESSION, &sess) != -1 && 261 ioctl(fd, CIOCFSESSION, &sess.ses) != -1) 284 struct session_op sess; local 369 struct session_op *sess = &state->d_sess; local 422 struct session_op *sess = &state->d_sess; local 464 struct session_op *sess = &state->d_sess; local 678 struct session_op *sess = &state->d_sess; local 712 struct session_op *sess = &state->d_sess; local 758 struct session_op *sess = &state->d_sess; local 794 struct session_op *sess = &state->d_sess; local 826 struct session_op *sess; local [all...] |
/external/openssl/ssl/ |
H A D | d1_clnt.c | 792 SSL_SESSION *sess = s->session; local 796 !sess->session_id_length || 798 (!sess->session_id_length && !sess->tlsext_tick) ||
|
H A D | d1_pkt.c | 383 SSL_SESSION *sess; local 389 sess = s->session; 437 if ((sess != NULL) && 1481 SSL_SESSION *sess; local 1506 sess=s->session; 1508 if ( (sess == NULL) ||
|
H A D | s2_clnt.c | 618 SSL_SESSION *sess; local 632 sess=s->session; 637 i=ssl_put_cipher_by_char(s,sess->cipher,p); 642 sess->key_arg_length=i; 650 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0) 655 sess->master_key_length=i; 658 if (i > (int)sizeof(sess->master_key)) 664 if (RAND_bytes(sess->master_key,i) <= 0) 671 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 673 else if (SSL_C_IS_EXPORT(sess [all...] |
H A D | s3_clnt.c | 737 SSL_SESSION *sess = s->session; local 738 if ((sess == NULL) || 739 (sess->ssl_version != s->version) || 741 !sess->session_id_length || 743 (!sess->session_id_length && !sess->tlsext_tick) || 745 (sess->not_resumable))
|
H A D | s3_pkt.c | 296 SSL_SESSION *sess; local 305 sess=s->session; 429 if ((sess != NULL) && 703 SSL_SESSION *sess; local 728 sess=s->session; 730 if ( (sess == NULL) ||
|
H A D | s3_srvr.c | 3467 SSL_SESSION *sess; local 3490 sess = d2i_SSL_SESSION(NULL, &const_p, slen_full); 3491 if (sess == NULL) 3496 sess->session_id_length = 0; /* ID is irrelevant for the ticket */ 3498 slen = i2d_SSL_SESSION(sess, NULL); 3505 i2d_SSL_SESSION(sess, &p); 3506 SSL_SESSION_free(sess);
|
H A D | ssl_sess.c | 159 SSL_SESSION *sess; local 164 sess = ssl->session; 165 if(sess) 166 sess->references++; 168 return(sess); 1091 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) 1096 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess) 1102 void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) 1107 void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(SSL_CTX * ctx,SSL_SESSION *sess) 1090 SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) argument 1101 SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) argument
|
H A D | t1_lib.c | 2513 SSL_SESSION *sess; local 2589 sess = d2i_SSL_SESSION(NULL, &p, slen); 2591 if (sess) 2599 memcpy(sess->session_id, sess_id, sesslen); 2600 sess->session_id_length = sesslen; 2601 *psess = sess;
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | d1_pkt.c | 373 SSL_SESSION *sess; local 379 sess = s->session; 427 if ((sess != NULL) && 1353 SSL_SESSION *sess; local 1377 sess=s->session; 1379 if ( (sess == NULL) ||
|
H A D | s3_clnt.c | 625 SSL_SESSION *sess = s->session; local 626 if (sess == NULL || 627 sess->ssl_version != s->version || 628 !sess->session_id_length || 629 sess->not_resumable)
|
H A D | s3_lib.c | 1388 SSL_SESSION *sess = s->session; local 1390 if (!sess || !sess->tlsext_ecpointformatlist) 1392 *pformat = sess->tlsext_ecpointformatlist; 1393 return (int)sess->tlsext_ecpointformatlist_length;
|