/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, 342 os_memset(zeros, 0, sess->prf_len); 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, 347 temp, sess->prf_len); 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 377 dh_len = eap_eke_dh_len(sess->dhgroup); 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC [all...] |
eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all...] |
/external/chromium-trace/trace-viewer/third_party/Paste/tests/ |
test_session.py | 11 sess = environ['paste.session.factory']() 14 sess = environ['paste.session.factory']() 15 if 'info' in sess: 16 body = str(sess['info']) 24 sess = environ['paste.session.factory']() 25 sess['info'] = info[0] 28 sess = environ['paste.session.factory']() 29 sess['info'] = info[0]
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 360 void srv_log(struct radius_session *sess, const char *fmt, ...) 363 void srv_log(struct radius_session *sess, const char *fmt, ...) 380 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); 383 if (sess->server->db) { 390 sess->sess_id, sess->nas_ip, 391 sess->username, buf); 393 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, 396 sqlite3_errmsg(sess->server->db)) 449 struct radius_session *sess = client->sessions; local 508 struct radius_session *sess = timeout_ctx; local 517 struct radius_session *sess = timeout_ctx; local 528 struct radius_session *sess; local 625 struct radius_session *sess; local 996 struct radius_session *sess; local 2029 struct radius_session *sess = ctx; local 2052 struct radius_session *sess = ctx; local 2061 struct radius_session *sess = ctx; local 2070 struct radius_session *sess = ctx; local 2080 struct radius_session *sess = ctx; local 2096 struct radius_session *sess = ctx; local 2131 struct radius_session *s, *sess = NULL; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 29 struct eap_eke_session sess; member in struct:eap_eke_data 104 eap_eke_session_clean(&data->sess); 253 if (eap_eke_derive_key(&data->sess, sm->user->password, 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, 284 wpabuf_put(msg, data->sess.dhcomp_len)) 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 27 struct eap_eke_session sess; member in struct:eap_eke_data 137 eap_eke_session_clean(&data->sess); 210 eap_eke_session_clean(&data->sess); 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], 389 if (pos + data->sess.dhcomp_len > end) { 396 pos, data->sess.dhcomp_len); 398 pos += data->sess.dhcomp_len; 405 if (eap_eke_derive_key(&data->sess, password, password_len, 417 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { 424 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0 [all...] |
/external/boringssl/src/ssl/ |
ssl_sess.c | 729 static void timeout_doall_arg(SSL_SESSION *sess, void *void_param) { 733 param->time > (sess->time + sess->timeout)) { 737 (void) lh_SSL_SESSION_delete(param->cache, sess); 738 SSL_SESSION_list_remove(param->ctx, sess); 739 sess->not_resumable = 1; 741 param->ctx->remove_session_cb(param->ctx, sess); 743 SSL_SESSION_free(sess); 819 int (*cb)(struct ssl_st *ssl, SSL_SESSION *sess)) { 823 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess) { [all...] |
t1_lib.c | 2102 SSL_SESSION *sess; local [all...] |
ssl_lib.c | [all...] |
/external/libvncserver/x11vnc/misc/ |
desktop.cgi | 565 foreach my $sess (split(' ', $session_types)) { 566 next if $sess =~ /^\s*$/; 567 next if $sess !~ /^\w+$/; # alphanumeric 568 $sessions{$sess} = 1; 569 $str .= "<option value=$sess>$sess</option>"; [all...] |
/external/libvncserver/x11vnc/ |
solid.c | 887 char *out, *p, *ds, *dsn = NULL, *sess = NULL, *sess2 = NULL; 955 sess = strdup(q); 968 sess = strdup(q); 977 if (!sess && sess2) { 978 sess = sess2; 980 if (!sess || strchr(sess, '\'')) { 981 if (sess) free(sess); 982 sess = strdup("--all-sessions") [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
SSLSessionTest.java | 126 SSLSession sess = clientSslContext.getClientSessionContext().getSession(id); local 127 assertNotNull("Could not find session for id " + id, sess); 128 assertEquals(clientSession, sess);
|
/external/boringssl/src/include/openssl/ |
ssl.h | [all...] |
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ |
ssvnc.tcl | [all...] |