Searched refs:session_ctx (Results 1 - 25 of 33) sorted by relevance

12

/external/boringssl/src/ssl/
H A Dssl_session.c538 session->timeout = ssl->session_ctx->session_psk_dhe_timeout;
543 session->timeout = ssl->session_ctx->session_timeout;
544 session->auth_timeout = ssl->session_ctx->session_timeout;
609 SSL_CTX *tctx = ssl->session_ctx;
673 const SSL_TICKET_AEAD_METHOD *method = ssl->session_ctx->ticket_aead_method;
708 if (ssl->session_ctx->ticket_aead_method) {
782 if (!(ssl->session_ctx->session_cache_mode &
789 CRYPTO_MUTEX_lock_read(&ssl->session_ctx->lock);
790 session = lh_SSL_SESSION_retrieve(ssl->session_ctx->sessions, &data);
795 CRYPTO_MUTEX_unlock_read(&ssl->session_ctx
[all...]
H A Dt1_lib.c3056 } else if (ssl->session_ctx->tlsext_servername_callback != 0) {
3057 ret = ssl->session_ctx->tlsext_servername_callback(
3058 ssl, &al, ssl->session_ctx->tlsext_servername_arg);
3091 const SSL_CTX *const ssl_ctx = ssl->session_ctx;
3205 ssl->session_ctx->ticket_aead_method->open(
3233 if (ssl->session_ctx->ticket_aead_method != NULL) {
H A Dssl_lib.c400 ssl->session_ctx = ctx;
483 SSL_CTX_free(ssl->session_ctx);
1826 SSL_CTX *ctx = ssl->session_ctx;
2011 ctx = ssl->session_ctx;
H A Dtls13_client.c265 ssl->session_ctx->session_psk_dhe_timeout);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.h35 void (*get_complete_cb)(void *ctx, void *session_ctx),
H A Deap_server_tls_common.c49 u8 session_ctx[8]; local
76 os_memcpy(session_ctx, "hostapd", 7);
77 session_ctx[7] = (u8) eap_type;
79 flags, session_ctx,
80 sizeof(session_ctx))) {
H A Deap_sim_db.c64 void (*get_complete_cb)(void *ctx, void *session_ctx);
756 void (*get_complete_cb)(void *ctx, void *session_ctx),
755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.h35 void (*get_complete_cb)(void *ctx, void *session_ctx),
H A Deap_server_tls_common.c49 u8 session_ctx[8]; local
76 os_memcpy(session_ctx, "hostapd", 7);
77 session_ctx[7] = (u8) eap_type;
79 flags, session_ctx,
80 sizeof(session_ctx))) {
H A Deap_sim_db.c64 void (*get_complete_cb)(void *ctx, void *session_ctx);
756 void (*get_complete_cb)(void *ctx, void *session_ctx),
755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h35 void (*get_complete_cb)(void *ctx, void *session_ctx),
H A Deap_server_tls_common.c49 u8 session_ctx[8]; local
76 os_memcpy(session_ctx, "hostapd", 7);
77 session_ctx[7] = (u8) eap_type;
79 flags, session_ctx,
80 sizeof(session_ctx))) {
H A Deap_sim_db.c64 void (*get_complete_cb)(void *ctx, void *session_ctx);
756 void (*get_complete_cb)(void *ctx, void *session_ctx),
755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dauthsrv.c38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument
41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) {
43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
/external/wpa_supplicant_8/src/ap/
H A Dauthsrv.c38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument
41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) {
43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dauthsrv.c38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument
41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) {
43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_none.c76 const u8 *session_ctx, size_t session_ctx_len)
74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
H A Dtls.h316 * @session_ctx: Session caching context or %NULL to use default
317 * @session_ctx_len: Length of @session_ctx in bytes.
324 const u8 *session_ctx,
H A Dtls_internal.c358 const u8 *session_ctx, size_t session_ctx_len)
356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
/external/wpa_supplicant_8/src/crypto/
H A Dtls_none.c76 const u8 *session_ctx, size_t session_ctx_len)
74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
H A Dtls.h316 * @session_ctx: Session caching context or %NULL to use default
317 * @session_ctx_len: Length of @session_ctx in bytes.
324 const u8 *session_ctx,
H A Dtls_internal.c358 const u8 *session_ctx, size_t session_ctx_len)
356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_none.c76 const u8 *session_ctx, size_t session_ctx_len)
74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
H A Dtls.h316 * @session_ctx: Session caching context or %NULL to use default
317 * @session_ctx_len: Length of @session_ctx in bytes.
324 const u8 *session_ctx,
H A Dtls_internal.c358 const u8 *session_ctx, size_t session_ctx_len)
356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument

Completed in 343 milliseconds

12