/external/tpm2/ |
H A D | PolicyAuthValue.c | 16 SESSION *session; local 22 // Get pointer to the session structure 23 session = SessionGet(in->policySession); 28 CryptStartHash(session->authHashAlg, &hashState); 31 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); 37 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); 39 // update isAuthValueNeeded bit in the session context 40 session->attributes.isAuthValueNeeded = SET; 41 session->attributes.isPasswordNeeded = CLEAR;
|
H A D | PolicyCommandCode.c | 21 SESSION *session; local 27 // Get pointer to the session structure 28 session = SessionGet(in->policySession); 30 if(session->commandCode != 0 && session->commandCode != in->code) 39 CryptStartHash(session->authHashAlg, &hashState); 42 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); 51 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); 53 // update commandCode value in session context 54 session [all...] |
H A D | PolicyCpHash.c | 23 SESSION *session; local 29 // Get pointer to the session structure 30 session = SessionGet(in->policySession); 32 // A new cpHash is given in input parameter, but cpHash in session context 35 && session->u1.cpHash.t.size != 0 36 && !Memory2BEqual(&in->cpHashA.b, &session->u1.cpHash.b) 40 // A valid cpHash must have the same size as session hash digest 41 if(in->cpHashA.t.size != CryptGetHashDigestSize(session->authHashAlg)) 49 CryptStartHash(session->authHashAlg, &hashState); 52 CryptUpdateDigest2B(&hashState, &session [all...] |
H A D | PolicyDuplicationSelect.c | 22 SESSION *session; local 28 // Get pointer to the session structure 29 session = SessionGet(in->policySession); 31 // cpHash in session context must be empty 32 if(session->u1.cpHash.t.size != 0) 35 // commandCode in session context must be empty 36 if(session->commandCode != 0) 42 session->u1.cpHash.t.size = CryptStartHash(session->authHashAlg, &hashState); 51 CryptCompleteHash2B(&hashState, &session [all...] |
H A D | PolicyGetDigest.c | 16 SESSION *session; local 20 // Get pointer to the session structure 21 session = SessionGet(in->policySession); 23 out->policyDigest = session->u2.policyDigest;
|
H A D | PolicyNameHash.c | 23 SESSION *session; local 29 // Get pointer to the session structure 30 session = SessionGet(in->policySession); 32 // A new nameHash is given in input parameter, but cpHash in session context 34 if(in->nameHash.t.size != 0 && session->u1.cpHash.t.size != 0) 37 // A valid nameHash must have the same size as session hash digest 38 if(in->nameHash.t.size != CryptGetHashDigestSize(session->authHashAlg)) 46 CryptStartHash(session->authHashAlg, &hashState); 49 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); 58 CryptCompleteHash2B(&hashState, &session [all...] |
H A D | PolicyNvWritten.c | 22 SESSION *session; local 28 // Get pointer to the session structure 29 session = SessionGet(in->policySession); 33 if(session->attributes.checkNvWritten == SET) 35 if(( (session->attributes.nvWrittenState == SET) 42 // Set session attributes so that the NV Index needs to be checked 43 session->attributes.checkNvWritten = SET; 44 session->attributes.nvWrittenState = (in->writtenSet == YES); 50 CryptStartHash(session->authHashAlg, &hashState); 53 CryptUpdateDigest2B(&hashState, &session [all...] |
H A D | PolicyPassword.c | 16 SESSION *session; local 22 // Get pointer to the session structure 23 session = SessionGet(in->policySession); 28 CryptStartHash(session->authHashAlg, &hashState); 31 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); 37 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); 40 session->attributes.isPasswordNeeded = SET; 41 session->attributes.isAuthValueNeeded = CLEAR;
|
H A D | PolicyPhysicalPresence.c | 15 SESSION *session; local 21 // Get pointer to the session structure 22 session = SessionGet(in->policySession); 27 CryptStartHash(session->authHashAlg, &hashState); 30 CryptUpdateDigest2B(&hashState, &session->u2.policyDigest.b); 36 CryptCompleteHash2B(&hashState, &session->u2.policyDigest.b); 38 // update session attribute 39 session->attributes.isPPRequired = SET;
|
H A D | PolicyRestart.c | 15 SESSION *session; local 20 session = SessionGet(in->sessionHandle); 21 wasTrialSession = session->attributes.isTrialPolicy == SET; 23 // Initialize policy session 24 SessionResetPolicyData(session); 26 session->attributes.isTrialPolicy = wasTrialSession;
|
H A D | GetSessionAuditDigest.c | 20 // TPM_RC_TYPE sessionHandle does not reference an audit session 32 SESSION *session; local 38 // Get session pointer 39 session = SessionGet(in->sessionHandle); 41 // session must be an audit session 42 if(session->attributes.isAudit == CLEAR) 66 auditInfo.attested.sessionAudit.sessionDigest = session->u2.auditDigest; 68 // Exclusive audit session
|
H A D | PolicyOR.c | 23 SESSION *session; local 28 // Get pointer to the session structure 29 session = SessionGet(in->policySession); 34 if( session->attributes.isTrialPolicy == SET 35 || (Memory2BEqual(&session->u2.policyDigest.b, 44 session->u2.policyDigest.t.size = CryptStartHash(session->authHashAlg, 47 MemorySet(session->u2.policyDigest.t.buffer, 0, 48 session->u2.policyDigest.t.size); 49 CryptUpdateDigest2B(&hashState, &session [all...] |
H A D | PolicyAuthorize.c | 25 SESSION *session; local 34 // Get pointer to the session structure 35 session = SessionGet(in->policySession); 50 if(session->attributes.isTrialPolicy == CLEAR) 53 // policyDigest in policy session 54 if(!Memory2BEqual(&session->u2.policyDigest.b, 85 MemorySet(session->u2.policyDigest.t.buffer, 0, 86 session->u2.policyDigest.t.size); 90 NULL, 0, session);
|
H A D | PolicySecret.c | 22 // session 31 SESSION *session; local 39 // Get pointer to the session structure 40 session = SessionGet(in->policySession); 42 //Only do input validation if this is not a trial policy session 43 if(session->attributes.isTrialPolicy == CLEAR) 47 authTimeout = expiration * 1000 + session->startTime; 49 result = PolicyParameterChecks(session, authTimeout, 65 &in->cpHashA, authTimeout, session); 70 // a trial session [all...] |
H A D | PolicyTicket.c | 26 SESSION *session; local 33 // Get pointer to the session structure 34 session = SessionGet(in->policySession); 36 // NOTE: A trial policy session is not allowed to use this command. 42 if(session->attributes.isTrialPolicy) 53 result = PolicyParameterChecks(session, timeout, 85 &in->cpHashA, timeout, session);
|
H A D | StartAuthSession.c | 20 // TPM_RC_SESSION_HANDLES no session handle is available 21 // TPM_RC_SESSION_MEMORY no more slots for loading a session 37 SESSION *session; // session internal data local 43 // than the digest size of session hash. 63 // HMAC session input handle check. 98 // Create internal session structure. TPM_RC_CONTEXT_GAP, TPM_RC_NO_HANDLES 101 // The detailed actions for creating the session context are not shown here 113 // Get session pointer 114 session [all...] |
/external/google-breakpad/src/common/windows/ |
H A D | dia_util.h | 39 // Find the debug stream of the given |name| in the given |session|. Returns 43 IDiaSession* session, 47 // given |session|. Returns true on success, false on error or if no such 49 bool FindTable(REFIID iid, IDiaSession* session, void** table); 52 // |InterfaceType| in the given |session|. Returns true on success, false on 56 bool FindTable(IDiaSession* session, InterfaceType** table) { argument 58 session,
|
/external/libmicrohttpd/src/microspdy/ |
H A D | io.c | 58 SPDYF_io_set_session(struct SPDY_Session *session, argument 64 session->fio_new_session = &SPDYF_openssl_new_session; 65 session->fio_close_session = &SPDYF_openssl_close_session; 66 session->fio_is_pending = &SPDYF_openssl_is_pending; 67 session->fio_recv = &SPDYF_openssl_recv; 68 session->fio_send = &SPDYF_openssl_send; 69 session->fio_before_write = &SPDYF_openssl_before_write; 70 session->fio_after_write = &SPDYF_openssl_after_write; 74 session->fio_new_session = &SPDYF_raw_new_session; 75 session [all...] |
/external/mockito/src/main/java/org/mockito/session/ |
H A D | MockitoSessionLogger.java | 5 package org.mockito.session;
|
/external/tensorflow/tensorflow/cc/saved_model/ |
H A D | loader.h | 26 #include "tensorflow/core/public/session.h" 32 std::unique_ptr<Session> session; member in struct:tensorflow::SavedModelBundle 38 if (session) { 39 session->Close().IgnoreError(); 49 /// with a session and the requested meta graph def, if found.
|
/external/tensorflow/tensorflow/core/common_runtime/ |
H A D | stats_publisher_interface.cc | 45 const string& session, const BuildGraphOptions& bopts, 44 CreateNoOpStatsPublisher( const string& session, const BuildGraphOptions& bopts, const SessionOptions& sopts) argument
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
H A D | SSLClientSessionCache.java | 29 * session data is dependent upon the caller's implementation and is opaque to 37 * Gets data from a pre-existing session for a given server host and port. 41 * @return the session data or null if none is cached 47 * Stores session data for the given session. 49 * @param session to cache data for 51 * @throws NullPointerException if session, result of 52 * {@code session.getPeerHost()} or data is null 54 void putSessionData(SSLSession session, byte[] sessionData); argument
|
H A D | SSLServerSessionCache.java | 25 * a session started by a different server based on a session ID provided 30 * session data is dependent upon the caller's implementation and is opaque to 35 * Gets the session data for given session ID. 38 * @return the session data or null if none is cached 44 * Stores session data for the given session. 46 * @param session to cache data for 48 * @throws NullPointerException if session o 50 putSessionData(SSLSession session, byte[] sessionData) argument [all...] |
H A D | ServerSessionContext.java | 22 * Caches server sessions. Indexes by session ID. Users typically look up 37 // TODO remove SSL_CTX session cache limit so we can manage it 43 // Set a trivial session id context. OpenSSL uses this to make 63 NativeSslSession session = NativeSslSession.newInstance(this, data, null, -1); 64 if (session != null && session.isValid()) { 65 cacheSession(session); 66 return session; 75 void onBeforeAddSession(NativeSslSession session) { argument 78 byte[] data = session 86 onBeforeRemoveSession(NativeSslSession session) argument [all...] |
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/core/command/ |
H A D | CommandHandler.java | 18 import org.mockftpserver.core.session.Session;
30 * Handle the specified command for the session. This method is declared to throw
36 * @param session - the session on which the Command was submitted
40 public void handleCommand(Command command, Session session) throws Exception;
argument
|