/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_fast_common.c | 102 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn, 109 block_size = tls_connection_get_keyblock_size(ssl_ctx, conn); 117 if (tls_connection_prf(ssl_ctx, conn, label, 1, out, block_size + len) 123 if (tls_connection_get_keys(ssl_ctx, conn, &keys))
|
eap_fast_common.h | 106 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 102 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn, 109 block_size = tls_connection_get_keyblock_size(ssl_ctx, conn); 117 if (tls_connection_prf(ssl_ctx, conn, label, 1, out, block_size + len) 123 if (tls_connection_get_keys(ssl_ctx, conn, &keys))
|
eap_fast_common.h | 106 u8 * eap_fast_derive_key(void *ssl_ctx, struct tls_connection *conn,
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 28 void *ssl_ctx; member in struct:eapol_auth_config
|
/external/chromium/third_party/libjingle/source/talk/base/ |
opensslstreamadapter.h | 36 typedef struct ssl_ctx_st SSL_CTX; 133 SSL_CTX* SetupSSLContext(); 153 SSL_CTX* ssl_ctx_;
|
/external/wpa_supplicant/ |
eap_tls_common.c | 118 data->conn = tls_connection_init(sm->ssl_ctx); 125 res = tls_connection_set_params(sm->ssl_ctx, data->conn, params); 212 tls_connection_deinit(sm->ssl_ctx, data->conn); 243 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) == 252 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 390 data->tls_out = tls_connection_handshake(sm->ssl_ctx, data->conn, 401 tls_connection_established(sm->ssl_ctx, data->conn) && 402 !tls_connection_get_failed(sm->ssl_ctx, data->conn)) { 521 if (tls_connection_get_failed(sm->ssl_ctx, data->conn)) { 583 return tls_connection_shutdown(sm->ssl_ctx, data->conn) [all...] |
eap_tls.c | 174 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 189 return tls_connection_established(sm->ssl_ctx, data->ssl.conn);
|
tls_internal.c | 53 void tls_deinit(void *ssl_ctx) 55 struct tls_global *global = ssl_ctx;
|
eap_ttls.c | 192 if (!(tls_capabilities(sm->ssl_ctx) & TLS_CAPABILITY_IA) && 245 res = tls_connection_encrypt(sm->ssl_ctx, data->ssl.conn, 345 ret = tls_connection_ia_permute_inner_secret(sm->ssl_ctx, 383 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || 441 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || 1058 len = tls_connection_ia_send_phase_finished(sm->ssl_ctx, 1124 tls_connection_resumed(sm->ssl_ctx, data->ssl.conn)) { [all...] |
tls_none.c | 25 void tls_deinit(void *ssl_ctx)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.c | 146 data->conn = tls_connection_init(sm->ssl_ctx); 153 res = tls_connection_set_params(sm->ssl_ctx, data->conn, params); 240 tls_connection_deinit(sm->ssl_ctx, data->conn); 271 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) == 280 if (tls_connection_get_keys(sm->ssl_ctx, data->conn, &keys)) 454 data->tls_out = tls_connection_handshake(sm->ssl_ctx, data->conn, 462 tls_connection_established(sm->ssl_ctx, data->conn) && 463 !tls_connection_get_failed(sm->ssl_ctx, data->conn)) { 520 !tls_connection_established(data->eap->ssl_ctx, data->conn)) { 630 if (tls_connection_get_failed(sm->ssl_ctx, data->conn)) [all...] |
eap_tls.c | 174 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 189 return tls_connection_established(sm->ssl_ctx, data->ssl.conn);
|
eap_fast.c | 184 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 198 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { 270 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 296 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_none.c | 25 void tls_deinit(void *ssl_ctx)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap.h | 93 void *ssl_ctx; member in struct:eap_config
|
eap_ttls.c | 332 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || 391 if (!(tls_capabilities(sm->ssl_ctx) & TLS_CAPABILITY_IA) && 535 len = tls_connection_ia_send_phase_finished(sm->ssl_ctx, 567 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) { 638 ret = tls_connection_ia_permute_inner_secret(sm->ssl_ctx, 1169 len_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1182 tls_connection_ia_final_phase_finished(sm->ssl_ctx, [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_none.c | 26 void tls_deinit(void *ssl_ctx)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap.h | 93 void *ssl_ctx; member in struct:eap_config
|
eap_server_ttls.c | 332 if (tls_connection_get_keys(sm->ssl_ctx, data->ssl.conn, &keys) || 391 if (!(tls_capabilities(sm->ssl_ctx) & TLS_CAPABILITY_IA) && 522 return tls_connection_ia_send_phase_finished(sm->ssl_ctx, 545 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) { 616 ret = tls_connection_ia_permute_inner_secret(sm->ssl_ctx, 1124 in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn, 1135 tls_connection_ia_final_phase_finished(sm->ssl_ctx, [all...] |
/libcore/luni/src/main/native/ |
org_apache_harmony_xnet_provider_jsse_NativeCrypto.cpp | 136 void operator()(SSL_CTX* p) const { 140 typedef UniquePtr<SSL_CTX, SSL_CTX_Delete> Unique_SSL_CTX; 380 static SSL_CTX* to_SSL_CTX(JNIEnv* env, int ssl_ctx_address, bool throwIfNull) { 381 SSL_CTX* ssl_ctx = reinterpret_cast<SSL_CTX*>(static_cast<uintptr_t>(ssl_ctx_address)); local 382 if ((ssl_ctx == NULL) && throwIfNull) { 383 JNI_TRACE("ssl_ctx == null"); 384 jniThrowNullPointerException(env, "ssl_ctx == null"); 386 return ssl_ctx; 1666 SSL_CTX* ssl_ctx = to_SSL_CTX(env, ssl_ctx_address, true); local 1679 SSL_CTX* ssl_ctx = to_SSL_CTX(env, ssl_ctx_address, true); local 3040 SSL_CTX* ssl_ctx = to_SSL_CTX(env, ssl_ctx_address, true); local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls.c | 174 if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) 189 return tls_connection_established(sm->ssl_ctx, data->ssl.conn);
|
eap_fast.c | 184 if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn, 198 if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) { 270 sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion", 296 eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 59 * ssl_ctx - TLS context 64 void *ssl_ctx; member in struct:radius_server_conf
|
/external/openssl/patches/ |
jsse.patch | 59 int SSL_CTX_add_session(SSL_CTX *s, SSL_SESSION *c); 60 int SSL_CTX_remove_session(SSL_CTX *,SSL_SESSION *c); 61 int SSL_CTX_set_generate_session_id(SSL_CTX *, GEN_SESSION_CB); 258 @@ -326,6 +326,7 @@ SSL *SSL_new(SSL_CTX *ctx)
|