/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 331 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 342 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 347 temp, sess->prf_len); in eap_eke_derive_key() 357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 377 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 405 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_shared_secret() [all …]
|
D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.c | 360 void srv_log(struct radius_session *sess, const char *fmt, ...) 363 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 380 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 383 if (sess->server->db) { in srv_log() 390 sess->sess_id, sess->nas_ip, in srv_log() 391 sess->username, buf); in srv_log() 393 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 396 sqlite3_errmsg(sess->server->db)); in srv_log() 449 struct radius_session *sess = client->sessions; in radius_server_get_session() local 451 while (sess) { in radius_server_get_session() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_eke.c | 27 struct eap_eke_session sess; member 137 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 210 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 389 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 396 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 398 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 405 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 417 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 424 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
/external/chromium-trace/trace-viewer/third_party/Paste/tests/ |
D | test_session.py | 11 sess = environ['paste.session.factory']() 14 sess = environ['paste.session.factory']() 15 if 'info' in sess: 16 body = str(sess['info']) 24 sess = environ['paste.session.factory']() 25 sess['info'] = info[0] 28 sess = environ['paste.session.factory']() 29 sess['info'] = info[0]
|
/external/libvncserver/x11vnc/ |
D | solid.c | 887 char *out, *p, *ds, *dsn = NULL, *sess = NULL, *sess2 = NULL; in dcop_session() local 955 sess = strdup(q); in dcop_session() 968 sess = strdup(q); in dcop_session() 977 if (!sess && sess2) { in dcop_session() 978 sess = sess2; in dcop_session() 980 if (!sess || strchr(sess, '\'')) { in dcop_session() 981 if (sess) free(sess); in dcop_session() 982 sess = strdup("--all-sessions"); in dcop_session() 984 len = strlen("--session ") + 2 + strlen(sess) + 1; in dcop_session() 986 sprintf(cmd, "--session '%s'", sess); in dcop_session() [all …]
|
/external/boringssl/src/ssl/ |
D | ssl_sess.c | 729 static void timeout_doall_arg(SSL_SESSION *sess, void *void_param) { in timeout_doall_arg() argument 733 param->time > (sess->time + sess->timeout)) { in timeout_doall_arg() 737 (void) lh_SSL_SESSION_delete(param->cache, sess); in timeout_doall_arg() 738 SSL_SESSION_list_remove(param->ctx, sess); in timeout_doall_arg() 739 sess->not_resumable = 1; in timeout_doall_arg() 741 param->ctx->remove_session_cb(param->ctx, sess); in timeout_doall_arg() 743 SSL_SESSION_free(sess); in timeout_doall_arg() 819 int (*cb)(struct ssl_st *ssl, SSL_SESSION *sess)) { in SSL_CTX_sess_set_new_cb() argument 823 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess) { in SSL_CTX_sess_get_new_cb() 828 void (*cb)(SSL_CTX *ctx, SSL_SESSION *sess)) { in SSL_CTX_sess_set_remove_cb() argument [all …]
|
D | t1_lib.c | 2102 SSL_SESSION *sess; in tls_decrypt_ticket() local 2187 sess = d2i_SSL_SESSION(NULL, &p, slen); in tls_decrypt_ticket() 2189 if (sess) { in tls_decrypt_ticket() 2194 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket() 2196 sess->session_id_length = sesslen; in tls_decrypt_ticket() 2197 *psess = sess; in tls_decrypt_ticket()
|
D | ssl_lib.c | 2175 const char *SSL_SESSION_get_version(const SSL_SESSION *sess) { in SSL_SESSION_get_version() argument 2176 return ssl_get_version(sess->ssl_version); in SSL_SESSION_get_version()
|
/external/libvncserver/x11vnc/misc/ |
D | desktop.cgi | 565 foreach my $sess (split(' ', $session_types)) { 566 next if $sess =~ /^\s*$/; 567 next if $sess !~ /^\w+$/; # alphanumeric 568 $sessions{$sess} = 1; 569 $str .= "<option value=$sess>$sess</option>";
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 916 int (*new_session_cb)(SSL *ssl, SSL_SESSION *sess); 917 void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *sess); 1104 SSL_CTX *ctx, int (*new_session_cb)(SSL *ssl, SSL_SESSION *sess)); 1106 SSL_SESSION *sess); 1109 void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *sess)); 1111 SSL_CTX *ctx, SSL_SESSION *sess); 2061 OPENSSL_EXPORT const char *SSL_SESSION_get_version(const SSL_SESSION *sess);
|
/external/selinux/policycoreutils/po/ |
D | pt_BR.po | 227 "Não foi possível verificar se o mapeamento de início de sessão para %s está " 243 msgstr "Não foi possível criar um mapeamento de início de sessão para %s" 263 msgstr "Não foi possível adicionar o mapeamento de início de sessão para %s" 272 msgstr "O mapeamento de início de sessão para %s não está definido" 282 msgstr "Não foi possível modificar o mapeamento de início de sessão para %s" 288 "O mapeamento de início de sessão para %s está definido na política, e não " 294 msgstr "Não foi possível excluir o mapeamento de início de sessão para %s" 299 msgstr "Não foi possível listar os mapeamentos de início de sessão" 2612 "Determinar se é que o daemon de sessão Git pode efetuar o bind nos soquetes " 3053 "Determinar se é que o daemon de sessão Polipo pode efetuar bind nos soquetes " [all …]
|
/external/libvncserver/webclients/java-applet/ssl/ |
D | tightvnc-1.3dev7_javasrc-vncviewer-ssl.patch | 918 + SSLSession sess = socket.getSession(); 919 + currentTrustedCerts = sess.getPeerCertificates(); 1027 + SSLSession sess = socket.getSession(); 1028 + trustallCerts = sess.getPeerCertificates();
|
D | ultravnc-102-JavaViewer-ssl-etc.patch | 3490 + SSLSession sess = socket.getSession(); 3491 + currentTrustedCerts = sess.getPeerCertificates(); 3599 + SSLSession sess = socket.getSession(); 3600 + trustallCerts = sess.getPeerCertificates();
|
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ |
D | ssvnc.tcl | 3223 set sess "kde" 3226 set sess $ts_desktop_type_def 3229 set sess $ts_desktop_type 3231 set cmd "$cmd -env FD_SESS=$sess";
|