/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 326 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 337 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 338 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 342 temp, sess->prf_len); in eap_eke_derive_key() 352 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 365 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 372 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 382 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 400 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 409 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret() [all …]
|
D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.c | 362 void srv_log(struct radius_session *sess, const char *fmt, ...) 365 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 382 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 385 if (sess->server->db) { in srv_log() 392 sess->sess_id, sess->nas_ip, in srv_log() 393 sess->username, buf); in srv_log() 395 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 398 sqlite3_errmsg(sess->server->db)); in srv_log() 451 struct radius_session *sess = client->sessions; in radius_server_get_session() local 453 while (sess) { in radius_server_get_session() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_eke.c | 27 struct eap_eke_session sess; member 137 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 210 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 389 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 396 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 398 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 405 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 417 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 424 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
/external/chromium-trace/catapult/third_party/Paste/tests/ |
D | test_session.py | 11 sess = environ['paste.session.factory']() 14 sess = environ['paste.session.factory']() 15 if 'info' in sess: 16 body = str(sess['info']) 24 sess = environ['paste.session.factory']() 25 sess['info'] = info[0] 28 sess = environ['paste.session.factory']() 29 sess['info'] = info[0]
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 846 static void remove_session_cb(SSL_CTX *ctx, SSL_SESSION *sess) in remove_session_cb() argument 852 buf = SSL_SESSION_get_ex_data(sess, tls_ex_idx_session); in remove_session_cb() 857 buf, sess); in remove_session_cb() 860 SSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); in remove_session_cb() 3154 SSL_SESSION *sess; in openssl_tls_prf() 3178 sess = SSL_get_session(ssl); in openssl_tls_prf() 3179 if (!ver || !sess) in openssl_tls_prf() 3200 master_key_len = SSL_SESSION_get_master_key(sess, master_key, in openssl_tls_prf() 4272 SSL_SESSION *sess; in tls_connection_set_success_data() local 4277 sess = SSL_get_session(conn->ssl); in tls_connection_set_success_data() [all …]
|
/external/selinux/policycoreutils/po/ |
D | pt_BR.po | 227 "Não foi possível verificar se o mapeamento de início de sessão para %s está " 243 msgstr "Não foi possível criar um mapeamento de início de sessão para %s" 263 msgstr "Não foi possível adicionar o mapeamento de início de sessão para %s" 272 msgstr "O mapeamento de início de sessão para %s não está definido" 282 msgstr "Não foi possível modificar o mapeamento de início de sessão para %s" 288 "O mapeamento de início de sessão para %s está definido na política, e não " 294 msgstr "Não foi possível excluir o mapeamento de início de sessão para %s" 299 msgstr "Não foi possível listar os mapeamentos de início de sessão" 2612 "Determinar se é que o daemon de sessão Git pode efetuar o bind nos soquetes " 3053 "Determinar se é que o daemon de sessão Polipo pode efetuar bind nos soquetes " [all …]
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 3529 int (*new_session_cb)(SSL *ssl, SSL_SESSION *sess); 3530 void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *sess);
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | tightvnc-1.3dev7_javasrc-vncviewer-ssl.patch | 918 + SSLSession sess = socket.getSession(); 919 + currentTrustedCerts = sess.getPeerCertificates(); 1027 + SSLSession sess = socket.getSession(); 1028 + trustallCerts = sess.getPeerCertificates();
|
D | ultravnc-102-JavaViewer-ssl-etc.patch | 3490 + SSLSession sess = socket.getSession(); 3491 + currentTrustedCerts = sess.getPeerCertificates(); 3599 + SSLSession sess = socket.getSession(); 3600 + trustallCerts = sess.getPeerCertificates();
|
/external/curl/ |
D | CHANGES.0 | 6300 - Olaf St�ben fixed a bug that caused Digest authentication with md5-sess to 6301 fail. When using the md5-sess, the result was not Md5 encoded and Base64
|