Home
last modified time | relevance | path

Searched refs:sess (Results 1 – 12 of 12) sorted by relevance

/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c326 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument
337 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key()
338 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key()
342 temp, sess->prf_len); in eap_eke_derive_key()
352 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key()
365 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument
372 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp()
382 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp()
400 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument
409 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret()
[all …]
Deap_eke_common.h81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
83 void eap_eke_session_clean(struct eap_eke_session *sess);
85 int eap_eke_derive_key(struct eap_eke_session *sess,
89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub,
91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key,
93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess,
96 int eap_eke_derive_ka(struct eap_eke_session *sess,
100 int eap_eke_derive_msk(struct eap_eke_session *sess,
105 int eap_eke_prot(struct eap_eke_session *sess,
108 int eap_eke_decrypt_prot(struct eap_eke_session *sess,
[all …]
/external/wpa_supplicant_8/src/radius/
Dradius_server.c362 void srv_log(struct radius_session *sess, const char *fmt, ...)
365 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument
382 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log()
385 if (sess->server->db) { in srv_log()
392 sess->sess_id, sess->nas_ip, in srv_log()
393 sess->username, buf); in srv_log()
395 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log()
398 sqlite3_errmsg(sess->server->db)); in srv_log()
451 struct radius_session *sess = client->sessions; in radius_server_get_session() local
453 while (sess) { in radius_server_get_session()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_eke.c29 struct eap_eke_session sess; member
104 eap_eke_session_clean(&data->sess); in eap_eke_reset()
253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit()
262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit()
277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit()
283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit()
284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit()
313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm()
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm()
326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_eke.c27 struct eap_eke_session sess; member
137 eap_eke_session_clean(&data->sess); in eap_eke_deinit()
210 eap_eke_session_clean(&data->sess); in eap_eke_build_fail()
284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id()
389 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit()
396 pos, data->sess.dhcomp_len); in eap_eke_process_commit()
398 pos += data->sess.dhcomp_len; in eap_eke_process_commit()
405 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit()
417 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit()
424 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit()
[all …]
/external/chromium-trace/catapult/third_party/Paste/tests/
Dtest_session.py11 sess = environ['paste.session.factory']()
14 sess = environ['paste.session.factory']()
15 if 'info' in sess:
16 body = str(sess['info'])
24 sess = environ['paste.session.factory']()
25 sess['info'] = info[0]
28 sess = environ['paste.session.factory']()
29 sess['info'] = info[0]
/external/wpa_supplicant_8/src/crypto/
Dtls_openssl.c846 static void remove_session_cb(SSL_CTX *ctx, SSL_SESSION *sess) in remove_session_cb() argument
852 buf = SSL_SESSION_get_ex_data(sess, tls_ex_idx_session); in remove_session_cb()
857 buf, sess); in remove_session_cb()
860 SSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); in remove_session_cb()
3154 SSL_SESSION *sess; in openssl_tls_prf()
3178 sess = SSL_get_session(ssl); in openssl_tls_prf()
3179 if (!ver || !sess) in openssl_tls_prf()
3200 master_key_len = SSL_SESSION_get_master_key(sess, master_key, in openssl_tls_prf()
4272 SSL_SESSION *sess; in tls_connection_set_success_data() local
4277 sess = SSL_get_session(conn->ssl); in tls_connection_set_success_data()
[all …]
/external/selinux/policycoreutils/po/
Dpt_BR.po227 "Não foi possível verificar se o mapeamento de início de sessão para %s está "
243 msgstr "Não foi possível criar um mapeamento de início de sessão para %s"
263 msgstr "Não foi possível adicionar o mapeamento de início de sessão para %s"
272 msgstr "O mapeamento de início de sessão para %s não está definido"
282 msgstr "Não foi possível modificar o mapeamento de início de sessão para %s"
288 "O mapeamento de início de sessão para %s está definido na política, e não "
294 msgstr "Não foi possível excluir o mapeamento de início de sessão para %s"
299 msgstr "Não foi possível listar os mapeamentos de início de sessão"
2612 "Determinar se é que o daemon de sessão Git pode efetuar o bind nos soquetes "
3053 "Determinar se é que o daemon de sessão Polipo pode efetuar bind nos soquetes "
[all …]
/external/boringssl/src/include/openssl/
Dssl.h3529 int (*new_session_cb)(SSL *ssl, SSL_SESSION *sess);
3530 void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *sess);
/external/libvncserver/webclients/java-applet/ssl/
Dtightvnc-1.3dev7_javasrc-vncviewer-ssl.patch918 + SSLSession sess = socket.getSession();
919 + currentTrustedCerts = sess.getPeerCertificates();
1027 + SSLSession sess = socket.getSession();
1028 + trustallCerts = sess.getPeerCertificates();
Dultravnc-102-JavaViewer-ssl-etc.patch3490 + SSLSession sess = socket.getSession();
3491 + currentTrustedCerts = sess.getPeerCertificates();
3599 + SSLSession sess = socket.getSession();
3600 + trustallCerts = sess.getPeerCertificates();
/external/curl/
DCHANGES.06300 - Olaf St�ben fixed a bug that caused Digest authentication with md5-sess to
6301 fail. When using the md5-sess, the result was not Md5 encoded and Base64