Searched defs:session (Results 1 - 25 of 1950) sorted by relevance

1234567891011>>

/external/tpm2/
H A DPolicyAuthValue.c16 SESSION *session; local
22 // Get pointer to the session structure
23 session = SessionGet(in->policySession);
28 CryptStartHash(session->authHashAlg, &hashState);
31 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
37 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
39 // update isAuthValueNeeded bit in the session context
40 session->attributes.isAuthValueNeeded = SET;
41 session->attributes.isPasswordNeeded = CLEAR;
H A DPolicyCommandCode.c21 SESSION *session; local
27 // Get pointer to the session structure
28 session = SessionGet(in->policySession);
30 if(session->commandCode != 0 && session->commandCode != in->code)
39 CryptStartHash(session->authHashAlg, &hashState);
42 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
51 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
53 // update commandCode value in session context
54 session
[all...]
H A DPolicyCpHash.c23 SESSION *session; local
29 // Get pointer to the session structure
30 session = SessionGet(in->policySession);
32 // A new cpHash is given in input parameter, but cpHash in session context
35 && session->u1.cpHash.t.size != 0
36 && !Memory2BEqual(&in->cpHashA.b, &session->u1.cpHash.b)
40 // A valid cpHash must have the same size as session hash digest
41 if(in->cpHashA.t.size != CryptGetHashDigestSize(session->authHashAlg))
49 CryptStartHash(session->authHashAlg, &hashState);
52 CryptUpdateDigest2B(&hashState, &session
[all...]
H A DPolicyDuplicationSelect.c22 SESSION *session; local
28 // Get pointer to the session structure
29 session = SessionGet(in->policySession);
31 // cpHash in session context must be empty
32 if(session->u1.cpHash.t.size != 0)
35 // commandCode in session context must be empty
36 if(session->commandCode != 0)
42 session->u1.cpHash.t.size = CryptStartHash(session->authHashAlg, &hashState);
51 CryptCompleteHash2B(&hashState, &session
[all...]
H A DPolicyGetDigest.c16 SESSION *session; local
20 // Get pointer to the session structure
21 session = SessionGet(in->policySession);
23 out->policyDigest = session->u2.policyDigest;
H A DPolicyNameHash.c23 SESSION *session; local
29 // Get pointer to the session structure
30 session = SessionGet(in->policySession);
32 // A new nameHash is given in input parameter, but cpHash in session context
34 if(in->nameHash.t.size != 0 && session->u1.cpHash.t.size != 0)
37 // A valid nameHash must have the same size as session hash digest
38 if(in->nameHash.t.size != CryptGetHashDigestSize(session->authHashAlg))
46 CryptStartHash(session->authHashAlg, &hashState);
49 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
58 CryptCompleteHash2B(&hashState, &session
[all...]
H A DPolicyNvWritten.c22 SESSION *session; local
28 // Get pointer to the session structure
29 session = SessionGet(in->policySession);
33 if(session->attributes.checkNvWritten == SET)
35 if(( (session->attributes.nvWrittenState == SET)
42 // Set session attributes so that the NV Index needs to be checked
43 session->attributes.checkNvWritten = SET;
44 session->attributes.nvWrittenState = (in->writtenSet == YES);
50 CryptStartHash(session->authHashAlg, &hashState);
53 CryptUpdateDigest2B(&hashState, &session
[all...]
H A DPolicyPassword.c16 SESSION *session; local
22 // Get pointer to the session structure
23 session = SessionGet(in->policySession);
28 CryptStartHash(session->authHashAlg, &hashState);
31 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
37 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
40 session->attributes.isPasswordNeeded = SET;
41 session->attributes.isAuthValueNeeded = CLEAR;
H A DPolicyPhysicalPresence.c15 SESSION *session; local
21 // Get pointer to the session structure
22 session = SessionGet(in->policySession);
27 CryptStartHash(session->authHashAlg, &hashState);
30 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b);
36 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b);
38 // update session attribute
39 session->attributes.isPPRequired = SET;
H A DPolicyRestart.c15 SESSION *session; local
20 session = SessionGet(in->sessionHandle);
21 wasTrialSession = session->attributes.isTrialPolicy == SET;
23 // Initialize policy session
24 SessionResetPolicyData(session);
26 session->attributes.isTrialPolicy = wasTrialSession;
H A DGetSessionAuditDigest.c20 // TPM_RC_TYPE sessionHandle does not reference an audit session
32 SESSION *session; local
38 // Get session pointer
39 session = SessionGet(in->sessionHandle);
41 // session must be an audit session
42 if(session->attributes.isAudit == CLEAR)
66 auditInfo.attested.sessionAudit.sessionDigest = session->u2.auditDigest;
68 // Exclusive audit session
H A DPolicyOR.c23 SESSION *session; local
28 // Get pointer to the session structure
29 session = SessionGet(in->policySession);
34 if( session->attributes.isTrialPolicy == SET
35 || (Memory2BEqual(&session->u2.policyDigest.b,
44 session->u2.policyDigest.t.size = CryptStartHash(session->authHashAlg,
47 MemorySet(session->u2.policyDigest.t.buffer, 0,
48 session->u2.policyDigest.t.size);
49 CryptUpdateDigest2B(&hashState, &session
[all...]
H A DPolicyAuthorize.c25 SESSION *session; local
34 // Get pointer to the session structure
35 session = SessionGet(in->policySession);
50 if(session->attributes.isTrialPolicy == CLEAR)
53 // policyDigest in policy session
54 if(!Memory2BEqual(&session->u2.policyDigest.b,
85 MemorySet(session->u2.policyDigest.t.buffer, 0,
86 session->u2.policyDigest.t.size);
90 NULL, 0, session);
H A DPolicySecret.c22 // session
31 SESSION *session; local
39 // Get pointer to the session structure
40 session = SessionGet(in->policySession);
42 //Only do input validation if this is not a trial policy session
43 if(session->attributes.isTrialPolicy == CLEAR)
47 authTimeout = expiration * 1000 + session->startTime;
49 result = PolicyParameterChecks(session, authTimeout,
65 &in->cpHashA, authTimeout, session);
70 // a trial session
[all...]
H A DPolicyTicket.c26 SESSION *session; local
33 // Get pointer to the session structure
34 session = SessionGet(in->policySession);
36 // NOTE: A trial policy session is not allowed to use this command.
42 if(session->attributes.isTrialPolicy)
53 result = PolicyParameterChecks(session, timeout,
85 &in->cpHashA, timeout, session);
H A DStartAuthSession.c20 // TPM_RC_SESSION_HANDLES no session handle is available
21 // TPM_RC_SESSION_MEMORY no more slots for loading a session
37 SESSION *session; // session internal data local
43 // than the digest size of session hash.
63 // HMAC session input handle check.
98 // Create internal session structure. TPM_RC_CONTEXT_GAP, TPM_RC_NO_HANDLES
101 // The detailed actions for creating the session context are not shown here
113 // Get session pointer
114 session
[all...]
/external/google-breakpad/src/common/windows/
H A Ddia_util.h39 // Find the debug stream of the given |name| in the given |session|. Returns
43 IDiaSession* session,
47 // given |session|. Returns true on success, false on error or if no such
49 bool FindTable(REFIID iid, IDiaSession* session, void** table);
52 // |InterfaceType| in the given |session|. Returns true on success, false on
56 bool FindTable(IDiaSession* session, InterfaceType** table) { argument
58 session,
/external/libmicrohttpd/src/microspdy/
H A Dio.c58 SPDYF_io_set_session(struct SPDY_Session *session, argument
64 session->fio_new_session = &SPDYF_openssl_new_session;
65 session->fio_close_session = &SPDYF_openssl_close_session;
66 session->fio_is_pending = &SPDYF_openssl_is_pending;
67 session->fio_recv = &SPDYF_openssl_recv;
68 session->fio_send = &SPDYF_openssl_send;
69 session->fio_before_write = &SPDYF_openssl_before_write;
70 session->fio_after_write = &SPDYF_openssl_after_write;
74 session->fio_new_session = &SPDYF_raw_new_session;
75 session
[all...]
/external/mockito/src/main/java/org/mockito/session/
H A DMockitoSessionLogger.java5 package org.mockito.session;
/external/tensorflow/tensorflow/cc/saved_model/
H A Dloader.h26 #include "tensorflow/core/public/session.h"
32 std::unique_ptr<Session> session; member in struct:tensorflow::SavedModelBundle
38 if (session) {
39 session->Close().IgnoreError();
49 /// with a session and the requested meta graph def, if found.
/external/tensorflow/tensorflow/core/common_runtime/
H A Dstats_publisher_interface.cc45 const string& session, const BuildGraphOptions& bopts,
44 CreateNoOpStatsPublisher( const string& session, const BuildGraphOptions& bopts, const SessionOptions& sopts) argument
/external/conscrypt/common/src/main/java/org/conscrypt/
H A DSSLClientSessionCache.java29 * session data is dependent upon the caller's implementation and is opaque to
37 * Gets data from a pre-existing session for a given server host and port.
41 * @return the session data or null if none is cached
47 * Stores session data for the given session.
49 * @param session to cache data for
51 * @throws NullPointerException if session, result of
52 * {@code session.getPeerHost()} or data is null
54 void putSessionData(SSLSession session, byte[] sessionData); argument
H A DSSLServerSessionCache.java25 * a session started by a different server based on a session ID provided
30 * session data is dependent upon the caller's implementation and is opaque to
35 * Gets the session data for given session ID.
38 * @return the session data or null if none is cached
44 * Stores session data for the given session.
46 * @param session to cache data for
48 * @throws NullPointerException if session o
50 putSessionData(SSLSession session, byte[] sessionData) argument
[all...]
H A DServerSessionContext.java22 * Caches server sessions. Indexes by session ID. Users typically look up
37 // TODO remove SSL_CTX session cache limit so we can manage it
43 // Set a trivial session id context. OpenSSL uses this to make
63 NativeSslSession session = NativeSslSession.newInstance(this, data, null, -1);
64 if (session != null && session.isValid()) {
65 cacheSession(session);
66 return session;
75 void onBeforeAddSession(NativeSslSession session) { argument
78 byte[] data = session
86 onBeforeRemoveSession(NativeSslSession session) argument
[all...]
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/core/command/
H A DCommandHandler.java18 import org.mockftpserver.core.session.Session;
30 * Handle the specified command for the session. This method is declared to throw
36 * @param session - the session on which the Command was submitted
40 public void handleCommand(Command command, Session session) throws Exception; argument

Completed in 363 milliseconds

1234567891011>>