/external/boringssl/src/ssl/ |
H A D | ssl_session.c | 538 session->timeout = ssl->session_ctx->session_psk_dhe_timeout; 543 session->timeout = ssl->session_ctx->session_timeout; 544 session->auth_timeout = ssl->session_ctx->session_timeout; 609 SSL_CTX *tctx = ssl->session_ctx; 673 const SSL_TICKET_AEAD_METHOD *method = ssl->session_ctx->ticket_aead_method; 708 if (ssl->session_ctx->ticket_aead_method) { 782 if (!(ssl->session_ctx->session_cache_mode & 789 CRYPTO_MUTEX_lock_read(&ssl->session_ctx->lock); 790 session = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &data); 795 CRYPTO_MUTEX_unlock_read(&ssl->session_ctx [all...] |
H A D | t1_lib.c | 3056 } else if (ssl->session_ctx->tlsext_servername_callback != 0) { 3057 ret = ssl->session_ctx->tlsext_servername_callback( 3058 ssl, &al, ssl->session_ctx->tlsext_servername_arg); 3091 const SSL_CTX *const ssl_ctx = ssl->session_ctx; 3205 ssl->session_ctx->ticket_aead_method->open( 3233 if (ssl->session_ctx->ticket_aead_method != NULL) {
|
H A D | ssl_lib.c | 400 ssl->session_ctx = ctx; 483 SSL_CTX_free(ssl->session_ctx); 1826 SSL_CTX *ctx = ssl->session_ctx; 2011 ctx = ssl->session_ctx;
|
H A D | tls13_client.c | 265 ssl->session_ctx->session_psk_dhe_timeout);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 35 void (*get_complete_cb)(void *ctx, void *session_ctx),
|
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; local 76 os_memcpy(session_ctx, "hostapd", 7); 77 session_ctx[7] = (u8) eap_type; 79 flags, session_ctx, 80 sizeof(session_ctx))) {
|
H A D | eap_sim_db.c | 64 void (*get_complete_cb)(void *ctx, void *session_ctx); 756 void (*get_complete_cb)(void *ctx, void *session_ctx), 755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 35 void (*get_complete_cb)(void *ctx, void *session_ctx),
|
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; local 76 os_memcpy(session_ctx, "hostapd", 7); 77 session_ctx[7] = (u8) eap_type; 79 flags, session_ctx, 80 sizeof(session_ctx))) {
|
H A D | eap_sim_db.c | 64 void (*get_complete_cb)(void *ctx, void *session_ctx); 756 void (*get_complete_cb)(void *ctx, void *session_ctx), 755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 35 void (*get_complete_cb)(void *ctx, void *session_ctx),
|
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; local 76 os_memcpy(session_ctx, "hostapd", 7); 77 session_ctx[7] = (u8) eap_type; 79 flags, session_ctx, 80 sizeof(session_ctx))) {
|
H A D | eap_sim_db.c | 64 void (*get_complete_cb)(void *ctx, void *session_ctx); 756 void (*get_complete_cb)(void *ctx, void *session_ctx), 755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 76 const u8 *session_ctx, size_t session_ctx_len) 74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls.h | 316 * @session_ctx: Session caching context or %NULL to use default 317 * @session_ctx_len: Length of @session_ctx in bytes. 324 const u8 *session_ctx,
|
H A D | tls_internal.c | 358 const u8 *session_ctx, size_t session_ctx_len) 356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_none.c | 76 const u8 *session_ctx, size_t session_ctx_len) 74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls.h | 316 * @session_ctx: Session caching context or %NULL to use default 317 * @session_ctx_len: Length of @session_ctx in bytes. 324 const u8 *session_ctx,
|
H A D | tls_internal.c | 358 const u8 *session_ctx, size_t session_ctx_len) 356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 76 const u8 *session_ctx, size_t session_ctx_len) 74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls.h | 316 * @session_ctx: Session caching context or %NULL to use default 317 * @session_ctx_len: Length of @session_ctx in bytes. 324 const u8 *session_ctx,
|
H A D | tls_internal.c | 358 const u8 *session_ctx, size_t session_ctx_len) 356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|