OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:psession
(Results
1 - 10
of
10
) sorted by null
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/
FwdLockConv.c
238
* @param[in,out]
pSession
A reference to a converter session.
242
static int FwdLockConv_DeriveKeys(FwdLockConv_Session_t *
pSession
) {
254
if (AES_set_encrypt_key(
pSession
->sessionKey, KEY_SIZE_IN_BITS,
262
&
pSession
->encryptionRoundKeys) != 0) {
268
HMAC_CTX_init(&
pSession
->signingContext);
269
HMAC_Init_ex(&
pSession
->signingContext, pData->key, KEY_SIZE, EVP_sha1(), NULL);
309
* @param[in,out]
pSession
A reference to a converter session.
313
static FwdLockConv_Status_t FwdLockConv_RightTrimDelimiter(FwdLockConv_Session_t *
pSession
) {
314
while (
pSession
->delimiterLength > 4 &&
315
pSession
->delimiter[pSession->delimiterLength - 1] == ' ')
[
all
...]
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/
FwdLockFile.c
167
* @param[in,out]
pSession
A reference to a file session.
171
static int FwdLockFile_DeriveKeys(FwdLockFile_Session_t *
pSession
) {
184
result = FwdLockGlue_DecryptKey(
pSession
->pEncryptedSessionKey,
185
pSession
->encryptedSessionKeyLength, pData->key, KEY_SIZE);
194
&
pSession
->encryptionRoundKeys) != 0) {
200
HMAC_CTX_init(&
pSession
->signingContext);
201
HMAC_Init_ex(&
pSession
->signingContext, pData->key, KEY_SIZE, EVP_sha1(), NULL);
242
* @param[in,out]
pSession
A reference to a file session.
245
void FwdLockFile_DecryptByte(FwdLockFile_Session_t *
pSession
, unsigned char *pByte) {
246
uint64_t blockIndex =
pSession
->filePos / AES_BLOCK_SIZE
[
all
...]
/hardware/ti/omap4xxx/security/tf_crypto_sst/
pkcs11_session.c
56
PPKCS11_PRIMARY_SESSION_CONTEXT
pSession
= NULL;
88
pSession
= (PPKCS11_PRIMARY_SESSION_CONTEXT)malloc(sizeof(PKCS11_PRIMARY_SESSION_CONTEXT));
89
if (
pSession
== NULL)
94
pSession
->sHeader.nMagicWord = PKCS11_SESSION_MAGIC;
95
pSession
->sHeader.nSessionTag = PKCS11_PRIMARY_SESSION_TAG;
96
memset(&
pSession
->sSession, 0, sizeof(TEEC_Session));
97
pSession
->sSecondarySessionTable.pRoot = NULL_PTR;
101
memset(&
pSession
->sSecondarySessionTableMutex, 0,
102
sizeof(
pSession
->sSecondarySessionTableMutex));
103
libMutexInit(&
pSession
->sSecondarySessionTableMutex)
[
all
...]
mtc.c
82
MTC_SESSION_CONTEXT*
pSession
= NULL;
90
pSession
= (MTC_SESSION_CONTEXT *)hCounter;
91
if ((
pSession
== NULL) || (
pSession
->nMagicWord != MTC_SESSION_MAGIC))
106
sOperation.params[0].value.a =
pSession
->nCounterIdentifier;
108
nError = TEEC_InvokeCommand(&
pSession
->sSession,
109
(
pSession
->hCryptoSession << 16 ) |
163
MTC_SESSION_CONTEXT*
pSession
= NULL;
183
pSession
= (MTC_SESSION_CONTEXT*)malloc(sizeof(MTC_SESSION_CONTEXT));
184
if (
pSession
== NULL
[
all
...]
sst_stub.c
257
TEEC_Session*
pSession
;
276
pSession
= static_SSTGetSession();
277
if (
pSession
== NULL)
287
nError = TEEC_InvokeCommand(
pSession
,
302
TEEC_Session*
pSession
;
312
pSession
= static_SSTGetSession();
313
if (
pSession
== NULL)
320
nError = TEEC_InvokeCommand(
pSession
,
333
TEEC_Session*
pSession
;
348
pSession
= static_SSTGetSession()
[
all
...]
pkcs11_object.c
76
PPKCS11_PRIMARY_SESSION_CONTEXT
pSession
=
79
*phSession =
pSession
->hCryptoSession;
80
*phCommandIDAndSession = (
pSession
->hCryptoSession<<16)|(*phCommandIDAndSession&0x00007FFF);
81
*ppSession =
pSession
;
266
PPKCS11_PRIMARY_SESSION_CONTEXT
pSession
;
268
nErrorCode = static_checkPreConditionsAndUpdateHandles(&hSession, &nCommandIDAndSession, &
pSession
);
300
teeErr = TEEC_InvokeCommand( &
pSession
->sSession,
336
PPKCS11_PRIMARY_SESSION_CONTEXT
pSession
;
338
nErrorCode = static_checkPreConditionsAndUpdateHandles(&hSession, &nCommandIDAndSession, &
pSession
);
379
teeErr = TEEC_InvokeCommand(&
pSession
->sSession
[
all
...]
pkcs11_global.c
129
PPKCS11_PRIMARY_SESSION_CONTEXT
pSession
= NULL;
137
pSession
= (PPKCS11_PRIMARY_SESSION_CONTEXT)pHeader;
142
return (
pSession
->hCryptoSession != CK_INVALID_HANDLE);
151
pSession
= pSecSession->pPrimarySession;
152
if ( (
pSession
== NULL) ||
153
(
pSession
->sHeader.nMagicWord != PKCS11_SESSION_MAGIC) ||
154
(
pSession
->sHeader.nSessionTag != PKCS11_PRIMARY_SESSION_TAG))
159
if (
pSession
->hCryptoSession == CK_INVALID_HANDLE)
/external/linux-tools-perf/
builtin-record.c
387
struct perf_session *
psession
= data;
local
401
psession
, machine);
411
psession
, machine, "_text");
414
psession
, machine,
/external/chromium/net/ocsp/
nss_ocsp.cc
98
SEC_HTTP_SERVER_SESSION*
pSession
);
575
SEC_HTTP_SERVER_SESSION*
pSession
) {
588
*
pSession
= new OCSPServerSession(host, portnum);
/hardware/ti/omap4xxx/security/tf_daemon/
delegation_client.c
875
static int runSession(TEEC_Context* pContext, TEEC_Session*
pSession
, TEEC_Operation* pOperation)
903
nTeeError = TEEC_InvokeCommand(
pSession
,
[
all
...]
Completed in 307 milliseconds