/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 210 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 389 if (pos + data->sess.dhcomp_len > end) { 396 pos, data->sess.dhcomp_len); 398 pos += data->sess.dhcomp_len; 405 if (eap_eke_derive_key(&data->sess, password, password_len, 417 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 424 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 210 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 389 if (pos + data->sess.dhcomp_len > end) { 396 pos, data->sess.dhcomp_len); 398 pos += data->sess.dhcomp_len; 405 if (eap_eke_derive_key(&data->sess, password, password_len, 417 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 424 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 210 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 389 if (pos + data->sess.dhcomp_len > end) { 396 pos, data->sess.dhcomp_len); 398 pos += data->sess.dhcomp_len; 405 if (eap_eke_derive_key(&data->sess, password, password_len, 417 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 424 if (eap_eke_shared_secret(&data->sess, ke [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 326 int eap_eke_derive_key(struct eap_eke_session *sess, argument 337 os_memset(zeros, 0, sess->prf_len); 338 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 342 temp, sess->prf_len); 352 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 365 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 372 dh_len = eap_eke_dh_len(sess->dhgroup); 382 if (sess 400 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 444 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 605 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 659 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 708 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 721 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 744 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 326 int eap_eke_derive_key(struct eap_eke_session *sess, argument 337 os_memset(zeros, 0, sess->prf_len); 338 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 342 temp, sess->prf_len); 352 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 365 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 372 dh_len = eap_eke_dh_len(sess->dhgroup); 382 if (sess 400 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 444 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 605 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 659 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 708 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 721 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 744 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 326 int eap_eke_derive_key(struct eap_eke_session *sess, argument 337 os_memset(zeros, 0, sess->prf_len); 338 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 342 temp, sess->prf_len); 352 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 365 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, argument 372 dh_len = eap_eke_dh_len(sess->dhgroup); 382 if (sess 400 eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, const u8 *dhpriv, const u8 *peer_dhcomp) argument 444 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument 605 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 659 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument 708 eap_eke_auth(struct eap_eke_session *sess, const char *label, const struct wpabuf *msgs, u8 *auth) argument 721 eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, u8 prf, u8 mac) argument 744 eap_eke_session_clean(struct eap_eke_session *sess) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 362 void srv_log(struct radius_session *sess, const char *fmt, ...) 365 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 382 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 385 if (sess->server->db) { 392 sess->sess_id, sess->nas_ip, 393 sess->username, buf); 395 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 398 sqlite3_errmsg(sess 451 struct radius_session *sess = client->sessions; local 464 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 480 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 510 struct radius_session *sess = timeout_ctx; local 519 struct radius_session *sess = timeout_ctx; local 530 struct radius_session *sess; local 555 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 601 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 627 struct radius_session *sess; local 714 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 847 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 999 struct radius_session *sess; local 2033 struct radius_session *sess = ctx; local 2056 struct radius_session *sess = ctx; local 2065 struct radius_session *sess = ctx; local 2074 struct radius_session *sess = ctx; local 2084 struct radius_session *sess = ctx; local 2100 struct radius_session *sess = ctx; local 2135 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 362 void srv_log(struct radius_session *sess, const char *fmt, ...) 365 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 382 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 385 if (sess->server->db) { 392 sess->sess_id, sess->nas_ip, 393 sess->username, buf); 395 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 398 sqlite3_errmsg(sess 451 struct radius_session *sess = client->sessions; local 464 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 480 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 510 struct radius_session *sess = timeout_ctx; local 519 struct radius_session *sess = timeout_ctx; local 530 struct radius_session *sess; local 555 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 601 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 627 struct radius_session *sess; local 714 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 847 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 999 struct radius_session *sess; local 2033 struct radius_session *sess = ctx; local 2056 struct radius_session *sess = ctx; local 2065 struct radius_session *sess = ctx; local 2074 struct radius_session *sess = ctx; local 2084 struct radius_session *sess = ctx; local 2100 struct radius_session *sess = ctx; local 2135 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 362 void srv_log(struct radius_session *sess, const char *fmt, ...) 365 void srv_log(struct radius_session *sess, const char *fmt, ...) argument 382 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 385 if (sess->server->db) { 392 sess->sess_id, sess->nas_ip, 393 sess->username, buf); 395 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 398 sqlite3_errmsg(sess 451 struct radius_session *sess = client->sessions; local 464 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 480 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 510 struct radius_session *sess = timeout_ctx; local 519 struct radius_session *sess = timeout_ctx; local 530 struct radius_session *sess; local 555 radius_server_testing_options_tls(struct radius_session *sess, const char *tls, struct eap_config *eap_conf) argument 601 radius_server_testing_options(struct radius_session *sess, struct eap_config *eap_conf) argument 627 struct radius_session *sess; local 714 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 847 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 999 struct radius_session *sess; local 2033 struct radius_session *sess = ctx; local 2056 struct radius_session *sess = ctx; local 2065 struct radius_session *sess = ctx; local 2074 struct radius_session *sess = ctx; local 2084 struct radius_session *sess = ctx; local 2100 struct radius_session *sess = ctx; local 2135 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 846 static void remove_session_cb(SSL_CTX *ctx, SSL_SESSION *sess) argument 852 buf = SSL_SESSION_get_ex_data(sess, tls_ex_idx_session); 856 "OpenSSL: Free application session data %p (sess %p)", 857 buf, sess); 860 SSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); 3154 SSL_SESSION *sess; 3178 sess = SSL_get_session(ssl); 3179 if (!ver || !sess) 3200 master_key_len = SSL_SESSION_get_master_key(sess, master_key, 4272 SSL_SESSION *sess; local 4310 SSL_SESSION *sess; local 4321 SSL_SESSION *sess; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 846 static void remove_session_cb(SSL_CTX *ctx, SSL_SESSION *sess) argument 852 buf = SSL_SESSION_get_ex_data(sess, tls_ex_idx_session); 856 "OpenSSL: Free application session data %p (sess %p)", 857 buf, sess); 860 SSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); 3154 SSL_SESSION *sess; 3178 sess = SSL_get_session(ssl); 3179 if (!ver || !sess) 3200 master_key_len = SSL_SESSION_get_master_key(sess, master_key, 4272 SSL_SESSION *sess; local 4310 SSL_SESSION *sess; local 4321 SSL_SESSION *sess; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 846 static void remove_session_cb(SSL_CTX *ctx, SSL_SESSION *sess) argument 852 buf = SSL_SESSION_get_ex_data(sess, tls_ex_idx_session); 856 "OpenSSL: Free application session data %p (sess %p)", 857 buf, sess); 860 SSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); 3154 SSL_SESSION *sess; 3178 sess = SSL_get_session(ssl); 3179 if (!ver || !sess) 3200 master_key_len = SSL_SESSION_get_master_key(sess, master_key, 4272 SSL_SESSION *sess; local 4310 SSL_SESSION *sess; local 4321 SSL_SESSION *sess; local [all...] |
/external/guice/extensions/persist/lib/ |
H A D | hibernate-search.jar | META-INF/ META-INF/MANIFEST.MF org/ org/hibernate/ org/hibernate/search/ org/hibernate/search/annotations/ ... |
H A D | hibernate3.jar | META-INF/ META-INF/MANIFEST.MF org/ org/hibernate/ org/hibernate/AssertionFailure.class AssertionFailure. ... |