/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_server.c | 166 struct radius_session *sess = client->sessions; local 168 while (sess) { 169 if (sess->sess_id == sess_id) { 172 sess = sess->next; 175 return sess; 180 struct radius_session *sess) 182 eloop_cancel_timeout(radius_server_session_timeout, data, sess); 183 eloop_cancel_timeout(radius_server_session_remove_timeout, data, sess); 184 eap_server_sm_deinit(sess->eap) 229 struct radius_session *sess = timeout_ctx; local 238 struct radius_session *sess = timeout_ctx; local 249 struct radius_session *sess; local 281 struct radius_session *sess; local 493 struct radius_session *sess; local 1248 struct radius_session *sess = ctx; local 1258 struct radius_session *sess = ctx; local 1275 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 357 struct radius_session *sess = client->sessions; local 359 while (sess) { 360 if (sess->sess_id == sess_id) { 363 sess = sess->next; 366 return sess; 371 struct radius_session *sess) 373 eloop_cancel_timeout(radius_server_session_timeout, data, sess); 374 eloop_cancel_timeout(radius_server_session_remove_timeout, data, sess); 375 eap_server_sm_deinit(sess->eap) 414 struct radius_session *sess = timeout_ctx; local 423 struct radius_session *sess = timeout_ctx; local 434 struct radius_session *sess; local 466 struct radius_session *sess; local 681 struct radius_session *sess; local 1457 struct radius_session *sess = ctx; local 1467 struct radius_session *sess = ctx; local 1492 struct radius_session *s, *sess = NULL; local [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 235 struct session_op sess; local 242 memset(&sess, 0, sizeof(sess)); 243 sess.key = (caddr_t)"123456789abcdefghijklmno"; 248 sess.cipher = ciphers[i].id; 249 sess.keylen = ciphers[i].keylen; 250 sess.mac = 0; 251 if (ioctl(fd, CIOCGSESSION, &sess) != -1 && 252 ioctl(fd, CIOCFSESSION, &sess.ses) != -1) 275 struct session_op sess; local 360 struct session_op *sess = &state->d_sess; local 413 struct session_op *sess = &state->d_sess; local 455 struct session_op *sess = &state->d_sess; local 669 struct session_op *sess = &state->d_sess; local 703 struct session_op *sess = &state->d_sess; local 749 struct session_op *sess = &state->d_sess; local 787 struct session_op *sess = &state->d_sess; local [all...] |
/external/openssl/crypto/evp/ |
openbsd_hw.c | 276 session_op sess; 284 if(!dev_crypto_init(&md_data->sess)) 290 md_data->sess.mac=mac; 292 if (ioctl(fd,CIOCGSESSION,&md_data->sess) == -1) 302 if (ioctl(fd,CIOCFSESSION,&md_data->sess.ses) == -1) 377 return do_digest(md_data->sess.ses,md_data->md,data,len); 398 ret=do_digest(md_data->sess.ses,md,md_data->data,md_data->len);
|
/external/openssl/ssl/ |
s2_clnt.c | 616 SSL_SESSION *sess; local 630 sess=s->session; 635 i=ssl_put_cipher_by_char(s,sess->cipher,p); 640 sess->key_arg_length=i; 648 if (RAND_pseudo_bytes(sess->key_arg,i) <= 0) 653 sess->master_key_length=i; 656 if (i > (int)sizeof(sess->master_key)) 662 if (RAND_bytes(sess->master_key,i) <= 0) 669 if (sess->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 671 else if (SSL_C_IS_EXPORT(sess->cipher) [all...] |
ssl_sess.c | 159 SSL_SESSION *sess; local 164 sess = ssl->session; 165 if(sess) 166 sess->references++; 168 return(sess); 1015 int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess)) 1020 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess) 1026 void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess)) 1031 void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(SSL_CTX * ctx,SSL_SESSION *sess) [all...] |
s3_pkt.c | 288 SSL_SESSION *sess; local 304 sess=s->session; 446 if ( (sess == NULL) || 663 SSL_SESSION *sess; local 687 sess=s->session; 689 if ( (sess == NULL) || [all...] |
d1_pkt.c | 374 SSL_SESSION *sess; local 381 sess = s->session; 428 if ( (sess == NULL) || 1359 SSL_SESSION *sess; local [all...] |
t1_lib.c | 1766 SSL_SESSION *sess; local [all...] |
ssl.h | 728 int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess); 729 void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess); [all...] |
d1_clnt.c | 608 SSL_SESSION *sess = s->session; local 612 !sess->session_id_length || 614 (!sess->session_id_length && !sess->tlsext_tick) || [all...] |
s3_clnt.c | 679 SSL_SESSION *sess = s->session; local 680 if ((sess == NULL) || 681 (sess->ssl_version != s->version) || 683 !sess->session_id_length || 685 (!sess->session_id_length && !sess->tlsext_tick) || 687 (sess->not_resumable)) [all...] |
/external/bluetooth/bluez/tools/ |
sdptool.c | 755 static int set_attrib(sdp_session_t *sess, uint32_t handle, uint16_t attrib, char *value) 764 rec = sdp_service_attr_req(sess, handle, SDP_ATTR_REQ_RANGE, attrid_list); 801 ret = sdp_device_record_update(sess, &interface, rec); 825 sdp_session_t *sess; local 848 sess = sdp_connect(BDADDR_ANY, BDADDR_LOCAL, 0); 849 if (!sess) 852 status = set_attrib(sess, handle, attrib, argv[2]); 853 sdp_close(sess); 964 sdp_session_t *sess; local 990 sess = sdp_connect(BDADDR_ANY, BDADDR_LOCAL, 0) 3567 sdp_session_t *sess; local 3664 sdp_session_t *sess; local 3765 sdp_session_t *sess; local [all...] |
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
SSLSessionTest.java | 116 SSLSession sess = clientSslContext.getClientSessionContext().getSession(id); local 117 assertNotNull("Could not find session for id " + id, sess); 118 assertEquals(clientSession, sess);
|
/external/openssl/apps/ |
s_client.c | 1002 SSL_SESSION *sess; local 1011 sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL); 1013 if (!sess) 1020 SSL_set_session(con, sess); 1021 SSL_SESSION_free(sess); [all...] |
/external/openssl/include/openssl/ |
ssl.h | 728 int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess); 729 void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess); [all...] |
/external/bluetooth/bluez/lib/bluetooth/ |
sdp_lib.h | 464 int sdp_record_update(sdp_session_t *sess, const sdp_record_t *rec);
|