/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 289 u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 303 session_id[0] = EAP_TYPE_PWD; 318 eap_pwd_h_final(hash, &session_id[1]); 337 session_id, SHA256_MAC_LEN + 1, 286 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *confirm_peer, u8 *confirm_server, u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 56 u8 *session_id; member in struct:eap_fast_data 255 os_free(data->session_id); 804 os_free(data->session_id); 805 data->session_id = eap_peer_tls_derive_session_id( 807 if (data->session_id) { 809 data->session_id, data->id_len); 1643 os_free(data->session_id); 1644 data->session_id = NULL; 1716 os_memcpy(id, data->session_id, data->id_len);
|
H A D | eap_gpsk.c | 26 u8 session_id[128]; member in struct:eap_gpsk_data 387 data->session_id, &data->id_len) < 0) { 394 data->session_id, data->id_len); 761 os_memcpy(sid, data->session_id, data->id_len);
|
H A D | eap_peap.c | 58 u8 *session_id; member in struct:eap_peap_data 192 os_free(data->session_id); 1044 os_free(data->session_id); 1045 data->session_id = 1049 if (data->session_id) { 1052 data->session_id, data->id_len); 1128 os_free(data->session_id); 1129 data->session_id = NULL; 1217 if (data->session_id == NULL || !data->phase2_success) 1225 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_pwd.c | 46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data 205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN); 674 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 370 u8 subtype, session_id; local 381 session_id = req->session_id; 385 "session_id %d", subtype, session_id); 389 if (data->session_id_set && data->session_id != session_id) { [all...] |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 144 os_free(data->session_id); 208 os_free(data->session_id); 209 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 212 if (data->session_id) { 214 data->session_id, data->id_len); 280 os_free(data->session_id); 281 data->session_id = NULL; 348 if (data->session_id == NULL) 356 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_ttls.c | 57 u8 *session_id; member in struct:eap_ttls_data 154 os_free(data->session_id); 237 os_free(data->session_id); 238 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 241 if (data->session_id) { 243 data->session_id, data->id_len); 1543 os_free(data->session_id); 1544 data->session_id = NULL; 1634 if (data->session_id == NULL || !data->phase2_success) 1642 os_memcpy(id, data->session_id, dat [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pwd.c | 48 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data 852 data->session_id) < 0)
|
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/hs20/client/ |
H A D | spp_client.c | 25 const char *session_id, 102 const char *session_id, 119 if (session_id) 121 session_id); 321 const char *session_id, 346 node = build_spp_post_dev_data(ctx, &ns, session_id, 403 const char *session_id, 416 ctx, session_id, 422 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); 431 const char *session_id) 100 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) argument 319 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument 402 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) argument 430 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) argument 465 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument 504 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) argument 599 char *session_id = NULL; local 820 char *status, *session_id; local 856 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument 884 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument [all...] |
/external/wpa_supplicant_8/hs20/server/ |
H A D | spp_server.c | 48 const char *realm, const char *session_id, 419 const char *realm, const char *session_id, 427 "id=%Q", field, session_id); 431 field, user, realm, session_id); 441 session_id, sqlite3_errmsg(ctx->db)); 601 const char *session_id, 616 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id); 657 const char *session_id, 694 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status, 711 hs20_eventlog_node(ctx, user, realm, session_id, 418 db_get_session_val(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *field) argument 599 build_post_dev_data_response(struct hs20_svc *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *status, const char *error_code) argument 655 build_sub_rem_resp(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int machine_rem, int dmacc) argument 730 machine_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 739 policy_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 785 browser_remediation(struct hs20_svc *ctx, const char *session_id, const char *redirect_uri, const char *uri) argument 812 user_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument 833 free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument 855 no_sub_rem(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument 870 hs20_subscription_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc, const char *redirect_uri) argument 984 hs20_policy_update(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 1104 spp_exec_upload_mo(struct hs20_svc *ctx, const char *session_id, const char *urn) argument 1124 hs20_subscription_registration(struct hs20_svc *ctx, const char *realm, const char *session_id, const char *redirect_uri) argument 1155 hs20_user_input_remediation(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1255 spp_exec_get_certificate(struct hs20_svc *ctx, const char *session_id, const char *user, const char *realm) argument 1300 hs20_user_input_registration(struct hs20_svc *ctx, const char *session_id, int enrollment_done) argument 1415 hs20_user_input_free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument 1467 hs20_user_input_complete(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1504 hs20_cert_enroll_completed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1530 hs20_cert_enroll_failed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1570 hs20_spp_post_dev_data(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument 1840 build_spp_exchange_complete(struct hs20_svc *ctx, const char *session_id, const char *status, const char *error_code) argument 1866 add_subscription(struct hs20_svc *ctx, const char *session_id) argument 1991 hs20_spp_update_response(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument 2144 char *session_id; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 289 u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 303 session_id[0] = EAP_TYPE_PWD; 318 eap_pwd_h_final(hash, &session_id[1]); 337 session_id, SHA256_MAC_LEN + 1, 286 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *confirm_peer, u8 *confirm_server, u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 56 u8 *session_id; member in struct:eap_fast_data 255 os_free(data->session_id); 804 os_free(data->session_id); 805 data->session_id = eap_peer_tls_derive_session_id( 807 if (data->session_id) { 809 data->session_id, data->id_len); 1643 os_free(data->session_id); 1644 data->session_id = NULL; 1716 os_memcpy(id, data->session_id, data->id_len);
|
H A D | eap_gpsk.c | 26 u8 session_id[128]; member in struct:eap_gpsk_data 387 data->session_id, &data->id_len) < 0) { 394 data->session_id, data->id_len); 761 os_memcpy(sid, data->session_id, data->id_len);
|
H A D | eap_peap.c | 58 u8 *session_id; member in struct:eap_peap_data 192 os_free(data->session_id); 1044 os_free(data->session_id); 1045 data->session_id = 1049 if (data->session_id) { 1052 data->session_id, data->id_len); 1128 os_free(data->session_id); 1129 data->session_id = NULL; 1217 if (data->session_id == NULL || !data->phase2_success) 1225 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_pwd.c | 46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data 205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN); 674 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 370 u8 subtype, session_id; local 381 session_id = req->session_id; 385 "session_id %d", subtype, session_id); 389 if (data->session_id_set && data->session_id != session_id) { [all...] |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 144 os_free(data->session_id); 208 os_free(data->session_id); 209 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 212 if (data->session_id) { 214 data->session_id, data->id_len); 280 os_free(data->session_id); 281 data->session_id = NULL; 348 if (data->session_id == NULL) 356 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_ttls.c | 57 u8 *session_id; member in struct:eap_ttls_data 154 os_free(data->session_id); 237 os_free(data->session_id); 238 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 241 if (data->session_id) { 243 data->session_id, data->id_len); 1543 os_free(data->session_id); 1544 data->session_id = NULL; 1634 if (data->session_id == NULL || !data->phase2_success) 1642 os_memcpy(id, data->session_id, dat [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 48 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data 852 data->session_id) < 0)
|