Searched defs:session (Results 1 - 25 of 1715) sorted by relevance

1234567891011>>

/external/tpm2/
H A DPolicyAuthValue.c16 SESSION *session; local
22 // Get pointer to the session structure
23 session = SessionGet(in->policySession);
28 CryptStartHash(session->authHashAlg, &hashState);
31 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
37 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
39 // update isAuthValueNeeded bit in the session context
40 session->attributes.isAuthValueNeeded = SET;
41 session->attributes.isPasswordNeeded = CLEAR;
H A DPolicyCommandCode.c21 SESSION *session; local
27 // Get pointer to the session structure
28 session = SessionGet(in->policySession);
30 if(session->commandCode != 0 && session->commandCode != in->code)
39 CryptStartHash(session->authHashAlg, &hashState);
42 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
51 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
53 // update commandCode value in session context
54 session
[all...]
H A DPolicyCpHash.c23 SESSION *session; local
29 // Get pointer to the session structure
30 session = SessionGet(in->policySession);
32 // A new cpHash is given in input parameter, but cpHash in session context
35 && session->u1.cpHash.t.size != 0
36 && !Memory2BEqual(&in->cpHashA.b, &session->u1.cpHash.b)
40 // A valid cpHash must have the same size as session hash digest
41 if(in->cpHashA.t.size != CryptGetHashDigestSize(session->authHashAlg))
49 CryptStartHash(session->authHashAlg, &hashState);
52 CryptUpdateDigest2B(&hashState, &session
[all...]
H A DPolicyDuplicationSelect.c22 SESSION *session; local
28 // Get pointer to the session structure
29 session = SessionGet(in->policySession);
31 // cpHash in session context must be empty
32 if(session->u1.cpHash.t.size != 0)
35 // commandCode in session context must be empty
36 if(session->commandCode != 0)
42 session->u1.cpHash.t.size = CryptStartHash(session->authHashAlg, &hashState);
51 CryptCompleteHash2B(&hashState, &session
[all...]
H A DPolicyGetDigest.c16 SESSION *session; local
20 // Get pointer to the session structure
21 session = SessionGet(in->policySession);
23 out->policyDigest = session->u2.policyDigest;
H A DPolicyNameHash.c23 SESSION *session; local
29 // Get pointer to the session structure
30 session = SessionGet(in->policySession);
32 // A new nameHash is given in input parameter, but cpHash in session context
34 if(in->nameHash.t.size != 0 && session->u1.cpHash.t.size != 0)
37 // A valid nameHash must have the same size as session hash digest
38 if(in->nameHash.t.size != CryptGetHashDigestSize(session->authHashAlg))
46 CryptStartHash(session->authHashAlg, &hashState);
49 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
58 CryptCompleteHash2B(&hashState, &session
[all...]
H A DPolicyNvWritten.c22 SESSION *session; local
28 // Get pointer to the session structure
29 session = SessionGet(in->policySession);
33 if(session->attributes.checkNvWritten == SET)
35 if(( (session->attributes.nvWrittenState == SET)
42 // Set session attributes so that the NV Index needs to be checked
43 session->attributes.checkNvWritten = SET;
44 session->attributes.nvWrittenState = (in->writtenSet == YES);
50 CryptStartHash(session->authHashAlg, &hashState);
53 CryptUpdateDigest2B(&hashState, &session
[all...]
H A DPolicyPassword.c16 SESSION *session; local
22 // Get pointer to the session structure
23 session = SessionGet(in->policySession);
28 CryptStartHash(session->authHashAlg, &hashState);
31 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
37 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
40 session->attributes.isPasswordNeeded = SET;
41 session->attributes.isAuthValueNeeded = CLEAR;
H A DPolicyPhysicalPresence.c15 SESSION *session; local
21 // Get pointer to the session structure
22 session = SessionGet(in->policySession);
27 CryptStartHash(session->authHashAlg, &hashState);
30 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
36 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
38 // update session attribute
39 session->attributes.isPPRequired = SET;
H A DPolicyRestart.c15 SESSION *session; local
20 session = SessionGet(in->sessionHandle);
21 wasTrialSession = session->attributes.isTrialPolicy == SET;
23 // Initialize policy session
24 SessionResetPolicyData(session);
26 session->attributes.isTrialPolicy = wasTrialSession;
H A DGetSessionAuditDigest.c20 // TPM_RC_TYPE sessionHandle does not reference an audit session
32 SESSION *session; local
38 // Get session pointer
39 session = SessionGet(in->sessionHandle);
41 // session must be an audit session
42 if(session->attributes.isAudit == CLEAR)
66 auditInfo.attested.sessionAudit.sessionDigest = session->u2.auditDigest;
68 // Exclusive audit session
H A DPolicyOR.c23 SESSION *session; local
28 // Get pointer to the session structure
29 session = SessionGet(in->policySession);
34 if( session->attributes.isTrialPolicy == SET
35 || (Memory2BEqual(&session->u2.policyDigest.b,
44 session->u2.policyDigest.t.size = CryptStartHash(session->authHashAlg,
47 MemorySet(session->u2.policyDigest.t.buffer, 0,
48 session->u2.policyDigest.t.size);
49 CryptUpdateDigest2B(&hashState, &session
[all...]
H A DPolicyAuthorize.c25 SESSION *session; local
34 // Get pointer to the session structure
35 session = SessionGet(in->policySession);
50 if(session->attributes.isTrialPolicy == CLEAR)
53 // policyDigest in policy session
54 if(!Memory2BEqual(&session->u2.policyDigest.b,
85 MemorySet(session->u2.policyDigest.t.buffer, 0,
86 session->u2.policyDigest.t.size);
90 NULL, 0, session);
H A DPolicySecret.c22 // session
31 SESSION *session; local
39 // Get pointer to the session structure
40 session = SessionGet(in->policySession);
42 //Only do input validation if this is not a trial policy session
43 if(session->attributes.isTrialPolicy == CLEAR)
47 authTimeout = expiration * 1000 + session->startTime;
49 result = PolicyParameterChecks(session, authTimeout,
65 &in->cpHashA, authTimeout, session);
70 // a trial session
[all...]
H A DPolicyTicket.c26 SESSION *session; local
33 // Get pointer to the session structure
34 session = SessionGet(in->policySession);
36 // NOTE: A trial policy session is not allowed to use this command.
42 if(session->attributes.isTrialPolicy)
53 result = PolicyParameterChecks(session, timeout,
85 &in->cpHashA, timeout, session);
H A DStartAuthSession.c20 // TPM_RC_SESSION_HANDLES no session handle is available
21 // TPM_RC_SESSION_MEMORY no more slots for loading a session
37 SESSION *session; // session internal data local
43 // than the digest size of session hash.
63 // HMAC session input handle check.
98 // Create internal session structure. TPM_RC_CONTEXT_GAP, TPM_RC_NO_HANDLES
101 // The detailed actions for creating the session context are not shown here
113 // Get session pointer
114 session
[all...]
/external/google-breakpad/src/common/windows/
H A Ddia_util.h39 // Find the debug stream of the given |name| in the given |session|. Returns
43 IDiaSession* session,
47 // given |session|. Returns true on success, false on error or if no such
49 bool FindTable(REFIID iid, IDiaSession* session, void** table);
52 // |InterfaceType| in the given |session|. Returns true on success, false on
56 bool FindTable(IDiaSession* session, InterfaceType** table) { argument
58 session,
/external/libmicrohttpd/src/microspdy/
H A Dio.c58 SPDYF_io_set_session(struct SPDY_Session *session, argument
64 session->fio_new_session = &SPDYF_openssl_new_session;
65 session->fio_close_session = &SPDYF_openssl_close_session;
66 session->fio_is_pending = &SPDYF_openssl_is_pending;
67 session->fio_recv = &SPDYF_openssl_recv;
68 session->fio_send = &SPDYF_openssl_send;
69 session->fio_before_write = &SPDYF_openssl_before_write;
70 session->fio_after_write = &SPDYF_openssl_after_write;
74 session->fio_new_session = &SPDYF_raw_new_session;
75 session
[all...]
/external/conscrypt/src/main/java/org/conscrypt/
H A DSSLClientSessionCache.java29 * session data is dependent upon the caller's implementation and is opaque to
35 * Gets data from a pre-existing session for a given server host and port.
39 * @return the session data or null if none is cached
45 * Stores session data for the given session.
47 * @param session to cache data for
49 * @throws NullPointerException if session, result of
50 * {@code session.getPeerHost()} or data is null
52 public void putSessionData(SSLSession session, byte[] sessionData); argument
H A DSSLServerSessionCache.java25 * a session started by a different server based on a session ID provided
30 * session data is dependent upon the caller's implementation and is opaque to
36 * Gets the session data for given session ID.
39 * @return the session data or null if none is cached
45 * Stores session data for the given session.
47 * @param session to cache data for
49 * @throws NullPointerException if session o
51 putSessionData(SSLSession session, byte[] sessionData) argument
[all...]
H A DServerSessionContext.java22 * Caches server sessions. Indexes by session ID. Users typically look up
35 // TODO remove SSL_CTX session cache limit so we can manage it
41 // Set a trivial session id context. OpenSSL uses this to make
53 protected void sessionRemoved(SSLSession session) {} argument
68 OpenSSLSessionImpl session = toSession(data, null, -1);
69 if (session != null && session.isValid()) {
70 super.putSession(session);
71 return Platform.wrapSSLSession(session);
80 void putSession(SSLSession session) { argument
[all...]
/external/jetty/src/java/org/eclipse/jetty/server/session/jmx/
H A DAbstractSessionManagerMBean.java19 package org.eclipse.jetty.server.session.jmx;
24 import org.eclipse.jetty.server.session.AbstractSessionManager;
25 import org.eclipse.jetty.server.session.SessionHandler;
/external/kernel-headers/original/uapi/linux/
H A Dif_pppolac.h29 __u16 tunnel, session; member in struct:sockaddr_pppolac::__anon7951
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/core/command/
H A DCommandHandler.java18 import org.mockftpserver.core.session.Session;
30 * Handle the specified command for the session. This method is declared to throw
36 * @param session - the session on which the Command was submitted
40 public void handleCommand(Command command, Session session) throws Exception; argument
H A DConnectCommandHandler.java18 import org.mockftpserver.core.session.Session;
42 * @see AbstractTrackingCommandHandler#handleCommand(Command, org.mockftpserver.core.session.Session, InvocationRecord)
44 public void handleCommand(Command command, Session session, InvocationRecord invocationRecord) { argument
45 sendReply(session);

Completed in 341 milliseconds

1234567891011>>