/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_eke_common.c | 303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 319 temp, sess->prf_len); in eap_eke_derive_key() 329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret() [all …]
|
D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_eke_common.c | 303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 319 temp, sess->prf_len); in eap_eke_derive_key() 329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret() [all …]
|
D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 427 void srv_log(struct radius_session *sess, const char *fmt, ...) 430 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 447 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 450 if (sess->server->db) { in srv_log() 457 sess->sess_id, sess->nas_ip, in srv_log() 458 sess->username, buf); in srv_log() 460 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 463 sqlite3_errmsg(sess->server->db)); in srv_log() 516 struct radius_session *sess = client->sessions; in radius_server_get_session() local 518 while (sess) { in radius_server_get_session() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 284 void srv_log(struct radius_session *sess, const char *fmt, ...) 287 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 307 if (sess->server->db) { in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 315 sess->username, buf); in srv_log() 317 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 320 sqlite3_errmsg(sess->server->db)); in srv_log() 373 struct radius_session *sess = client->sessions; in radius_server_get_session() local 375 while (sess) { in radius_server_get_session() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/modes/ |
D | ocb128.c | 233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 255 ocb_block_lshift(stretch + (bottom / 8), shift, ctx->sess.offset.c); in CRYPTO_ocb128_setiv() 258 ctx->sess.offset.c[15] |= in CRYPTO_ocb128_setiv() 277 all_num_blocks = num_blocks + ctx->sess.blocks_hashed; in CRYPTO_ocb128_aad() 280 for (i = ctx->sess.blocks_hashed + 1; i <= all_num_blocks; i++) { in CRYPTO_ocb128_aad() 287 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() 293 ocb_block16_xor(&ctx->sess.offset_aad, &tmp, &tmp); in CRYPTO_ocb128_aad() 295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 306 ocb_block16_xor(&ctx->sess.offset_aad, &ctx->l_star, in CRYPTO_ocb128_aad() 307 &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() [all …]
|
/third_party/openssl/crypto/modes/ |
D | ocb128.c | 233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 255 ocb_block_lshift(stretch + (bottom / 8), shift, ctx->sess.offset.c); in CRYPTO_ocb128_setiv() 258 ctx->sess.offset.c[15] |= in CRYPTO_ocb128_setiv() 277 all_num_blocks = num_blocks + ctx->sess.blocks_hashed; in CRYPTO_ocb128_aad() 280 for (i = ctx->sess.blocks_hashed + 1; i <= all_num_blocks; i++) { in CRYPTO_ocb128_aad() 287 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() 293 ocb_block16_xor(&ctx->sess.offset_aad, &tmp, &tmp); in CRYPTO_ocb128_aad() 295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 306 ocb_block16_xor(&ctx->sess.offset_aad, &ctx->l_star, in CRYPTO_ocb128_aad() 307 &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_eke.c | 27 struct eap_eke_session sess; member 136 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 394 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 396 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_eke.c | 27 struct eap_eke_session sess; member 136 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 394 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 396 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
/third_party/node/deps/openssl/openssl/engines/ |
D | e_devcrypto.c | 86 static int clean_devcrypto_session(session_op_t *sess) { in clean_devcrypto_session() argument 87 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { in clean_devcrypto_session() 91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 106 session_op_t sess; member 214 if (cipher_ctx->sess.ses != 0 && in cipher_init() 215 clean_devcrypto_session(&cipher_ctx->sess) == 0) in cipher_init() 218 cipher_ctx->sess.cipher = cipher_d->devcryptoid; in cipher_init() 219 cipher_ctx->sess.keylen = cipher_d->keylen; in cipher_init() 220 cipher_ctx->sess.key = (void *)key; in cipher_init() 225 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? in cipher_init() [all …]
|
/third_party/openssl/engines/ |
D | e_devcrypto.c | 86 static int clean_devcrypto_session(session_op_t *sess) { in clean_devcrypto_session() argument 87 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { in clean_devcrypto_session() 91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 106 session_op_t sess; member 214 if (cipher_ctx->sess.ses != 0 && in cipher_init() 215 clean_devcrypto_session(&cipher_ctx->sess) == 0) in cipher_init() 218 cipher_ctx->sess.cipher = cipher_d->devcryptoid; in cipher_init() 219 cipher_ctx->sess.keylen = cipher_d->keylen; in cipher_init() 220 cipher_ctx->sess.key = (void *)key; in cipher_init() 225 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? in cipher_init() [all …]
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | openssl-session.c | 211 lws_tls_session_new_cb(SSL *ssl, SSL_SESSION *sess) in lws_tls_session_new_cb() argument 238 ttl = SSL_SESSION_get_timeout(sess); in lws_tls_session_new_cb() 277 ts->session = sess; in lws_tls_session_new_cb() 283 sess, wsi->lc.gutag, disposition, tag, ttl, vh->name, in lws_tls_session_new_cb() 320 SSL_SESSION *sess; in lws_sess_cache_synth_cb() local 325 sess = SSL_get1_session(tls->ssl); in lws_sess_cache_synth_cb() 326 if (!sess) in lws_sess_cache_synth_cb() 329 if (!SSL_SESSION_is_resumable(sess) || /* not worth caching, or... */ in lws_sess_cache_synth_cb() 330 !lws_tls_session_new_cb(tls->ssl, sess)) { /* ...cb didn't keep it */ in lws_sess_cache_synth_cb() 336 SSL_SESSION_free(sess); in lws_sess_cache_synth_cb() [all …]
|
/third_party/openssl/test/ |
D | clienthellotest.c | 73 SSL_SESSION *sess = NULL; in test_client_hello() local 158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); in test_client_hello() 159 if (!TEST_ptr(sess)) { in test_client_hello() 167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) in test_client_hello() 168 || !TEST_true(SSL_set_session(con, sess))) in test_client_hello() 249 SSL_SESSION_free(sess); in test_client_hello()
|
D | sslapitest.c | 73 size_t *idlen, SSL_SESSION **sess); 75 size_t identity_len, SSL_SESSION **sess); 433 SSL_SESSION *sess = NULL; in test_keylog_no_master_key() local 494 sess = SSL_get1_session(clientssl); in test_keylog_no_master_key() 509 || !TEST_true(SSL_set_session(clientssl, sess)) in test_keylog_no_master_key() 535 SSL_SESSION_free(sess); in test_keylog_no_master_key() 849 SSL_SESSION *sess = NULL, *sesspre, *sesspost; in test_ccs_change_cipher() local 870 || !TEST_ptr(sess = SSL_get1_session(clientssl))) in test_ccs_change_cipher() 880 || !TEST_true(SSL_set_session(clientssl, sess)) in test_ccs_change_cipher() 945 SSL_SESSION_free(sess); in test_ccs_change_cipher() [all …]
|
/third_party/node/deps/openssl/openssl/apps/ |
D | s_server.c | 192 size_t identity_len, SSL_SESSION **sess) in psk_find_session_cb() argument 201 *sess = NULL; in psk_find_session_cb() 207 *sess = psksess; in psk_find_session_cb() 236 *sess = tmpsess; in psk_find_session_cb() 3699 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() local 3702 SSL_SESSION_get_id(session, &sess->idlen); in add_session() 3703 sess->derlen = i2d_SSL_SESSION(session, NULL); in add_session() 3704 if (sess->derlen < 0) { in add_session() 3706 OPENSSL_free(sess); in add_session() 3710 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session() [all …]
|
/third_party/openssl/apps/ |
D | s_server.c | 192 size_t identity_len, SSL_SESSION **sess) in psk_find_session_cb() argument 201 *sess = NULL; in psk_find_session_cb() 207 *sess = psksess; in psk_find_session_cb() 236 *sess = tmpsess; in psk_find_session_cb() 3694 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() local 3697 SSL_SESSION_get_id(session, &sess->idlen); in add_session() 3698 sess->derlen = i2d_SSL_SESSION(session, NULL); in add_session() 3699 if (sess->derlen < 0) { in add_session() 3701 OPENSSL_free(sess); in add_session() 3705 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session() [all …]
|
/third_party/openssl/ssl/statem/ |
D | extensions_srvr.c | 957 SSL_SESSION **sess) in tls_get_stateful_ticket() argument 980 *sess = tmpsess; in tls_get_stateful_ticket() 989 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local 1021 &sess)) { in tls_parse_ctos_psk() 1027 if(sess == NULL in tls_parse_ctos_psk() 1059 sess = SSL_SESSION_new(); in tls_parse_ctos_psk() 1060 if (sess == NULL in tls_parse_ctos_psk() 1061 || !SSL_SESSION_set1_master_key(sess, pskdata, in tls_parse_ctos_psk() 1063 || !SSL_SESSION_set_cipher(sess, cipher) in tls_parse_ctos_psk() 1064 || !SSL_SESSION_set_protocol_version(sess, in tls_parse_ctos_psk() [all …]
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | extensions_srvr.c | 957 SSL_SESSION **sess) in tls_get_stateful_ticket() argument 980 *sess = tmpsess; in tls_get_stateful_ticket() 989 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local 1021 &sess)) { in tls_parse_ctos_psk() 1027 if(sess == NULL in tls_parse_ctos_psk() 1059 sess = SSL_SESSION_new(); in tls_parse_ctos_psk() 1060 if (sess == NULL in tls_parse_ctos_psk() 1061 || !SSL_SESSION_set1_master_key(sess, pskdata, in tls_parse_ctos_psk() 1063 || !SSL_SESSION_set_cipher(sess, cipher) in tls_parse_ctos_psk() 1064 || !SSL_SESSION_set_protocol_version(sess, in tls_parse_ctos_psk() [all …]
|
/third_party/node/test/parallel/ |
D | test-tls-ticket.js | 117 let sess = null; 122 session: sess, 138 sess = sess || session;
|
/third_party/rust/crates/syn/tests/ |
D | test_round_trip.rs | 94 let sess = ParseSess::new(locale_resources, file_path_mapping); in test() localVariable 95 let before = match librustc_parse(content, &sess) { in test() 107 let after = match librustc_parse(back, &sess) { in test() 152 fn librustc_parse(content: String, sess: &ParseSess) -> PResult<Crate> { in librustc_parse() 156 parse::parse_crate_from_source_str(name, content, sess) in librustc_parse()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | tls_wolfssl.c | 176 static void remove_session_cb(WOLFSSL_CTX *ctx, WOLFSSL_SESSION *sess) in remove_session_cb() argument 180 buf = wolfSSL_SESSION_get_ex_data(sess, tls_ex_idx_session); in remove_session_cb() 185 buf, sess); in remove_session_cb() 188 wolfSSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); in remove_session_cb() 2144 WOLFSSL_SESSION *sess; in tls_connection_remove_session() local 2146 sess = wolfSSL_get_session(conn->ssl); in tls_connection_remove_session() 2147 if (!sess) in tls_connection_remove_session() 2150 wolfSSL_SSL_SESSION_set_timeout(sess, 0); in tls_connection_remove_session() 2159 WOLFSSL_SESSION *sess; in tls_connection_set_success_data() local 2164 sess = wolfSSL_get_session(conn->ssl); in tls_connection_set_success_data() [all …]
|
/third_party/openssl/ssl/ |
D | ssl_sess.c | 97 SSL_SESSION *sess; in SSL_get1_session() local 105 sess = ssl->session; in SSL_get1_session() 106 if (sess) in SSL_get1_session() 107 SSL_SESSION_up_ref(sess); in SSL_get1_session() 109 return sess; in SSL_get1_session() 293 SSL_SESSION *sess = ssl_session_dup_intern(src, ticket); in ssl_session_dup() local 295 if (sess != NULL) in ssl_session_dup() 296 sess->not_resumable = 0; in ssl_session_dup() 298 return sess; in ssl_session_dup() 1302 int (*cb) (struct ssl_st *ssl, SSL_SESSION *sess)) in SSL_CTX_sess_set_new_cb() argument [all …]
|