/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 38 static void hostapd_sim_db_cb(void *ctx, void *session_ctx) argument 41 if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) { 43 radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 76 const u8 *session_ctx, size_t session_ctx_len) 74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_internal.c | 358 const u8 *session_ctx, size_t session_ctx_len) 356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_gnutls.c | 776 const u8 *session_ctx, size_t session_ctx_len) 774 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_openssl.c | 2546 const u8 *session_ctx, size_t session_ctx_len) 2580 } else if (session_ctx) { 2581 SSL_set_session_id_context(conn->ssl, session_ctx, 2544 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; local 76 os_memcpy(session_ctx, "hostapd", 7); 77 session_ctx[7] = (u8) eap_type; 79 flags, session_ctx, 80 sizeof(session_ctx))) {
|
H A D | eap_sim_db.c | 64 void (*get_complete_cb)(void *ctx, void *session_ctx); 756 void (*get_complete_cb)(void *ctx, void *session_ctx), 755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_none.c | 76 const u8 *session_ctx, size_t session_ctx_len) 74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_internal.c | 358 const u8 *session_ctx, size_t session_ctx_len) 356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_gnutls.c | 776 const u8 *session_ctx, size_t session_ctx_len) 774 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_openssl.c | 2546 const u8 *session_ctx, size_t session_ctx_len) 2580 } else if (session_ctx) { 2581 SSL_set_session_id_context(conn->ssl, session_ctx, 2544 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; local 76 os_memcpy(session_ctx, "hostapd", 7); 77 session_ctx[7] = (u8) eap_type; 79 flags, session_ctx, 80 sizeof(session_ctx))) {
|
H A D | eap_sim_db.c | 64 void (*get_complete_cb)(void *ctx, void *session_ctx); 756 void (*get_complete_cb)(void *ctx, void *session_ctx), 755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 76 const u8 *session_ctx, size_t session_ctx_len) 74 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_internal.c | 358 const u8 *session_ctx, size_t session_ctx_len) 356 tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_gnutls.c | 776 const u8 *session_ctx, size_t session_ctx_len) 774 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
H A D | tls_openssl.c | 2546 const u8 *session_ctx, size_t session_ctx_len) 2580 } else if (session_ctx) { 2581 SSL_set_session_id_context(conn->ssl, session_ctx, 2544 tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn, int verify_peer, unsigned int flags, const u8 *session_ctx, size_t session_ctx_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls_common.c | 49 u8 session_ctx[8]; local 76 os_memcpy(session_ctx, "hostapd", 7); 77 session_ctx[7] = (u8) eap_type; 79 flags, session_ctx, 80 sizeof(session_ctx))) {
|
H A D | eap_sim_db.c | 64 void (*get_complete_cb)(void *ctx, void *session_ctx); 756 void (*get_complete_cb)(void *ctx, void *session_ctx), 755 eap_sim_db_init(const char *config, unsigned int db_timeout, void (*get_complete_cb)(void *ctx, void *session_ctx), void *ctx) argument
|
/external/boringssl/src/ssl/ |
H A D | internal.h | 2601 // session_ctx is the |SSL_CTX| used for the session cache and related 2603 SSL_CTX *session_ctx; member in struct:bssl::SSLConnection
|