Home
last modified time | relevance | path

Searched refs:sess (Results 1 – 16 of 16) sorted by relevance

/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c331 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument
342 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key()
343 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key()
347 temp, sess->prf_len); in eap_eke_derive_key()
357 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key()
370 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument
377 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp()
387 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp()
405 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument
414 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_shared_secret()
[all …]
Deap_eke_common.h81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
83 void eap_eke_session_clean(struct eap_eke_session *sess);
85 int eap_eke_derive_key(struct eap_eke_session *sess,
89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub,
91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key,
93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess,
96 int eap_eke_derive_ka(struct eap_eke_session *sess,
100 int eap_eke_derive_msk(struct eap_eke_session *sess,
105 int eap_eke_prot(struct eap_eke_session *sess,
108 int eap_eke_decrypt_prot(struct eap_eke_session *sess,
[all …]
/external/wpa_supplicant_8/src/radius/
Dradius_server.c360 void srv_log(struct radius_session *sess, const char *fmt, ...)
363 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument
380 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log()
383 if (sess->server->db) { in srv_log()
390 sess->sess_id, sess->nas_ip, in srv_log()
391 sess->username, buf); in srv_log()
393 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log()
396 sqlite3_errmsg(sess->server->db)); in srv_log()
449 struct radius_session *sess = client->sessions; in radius_server_get_session() local
451 while (sess) { in radius_server_get_session()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_eke.c29 struct eap_eke_session sess; member
104 eap_eke_session_clean(&data->sess); in eap_eke_reset()
253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit()
262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit()
277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit()
283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit()
284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit()
313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm()
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm()
326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_eke.c27 struct eap_eke_session sess; member
137 eap_eke_session_clean(&data->sess); in eap_eke_deinit()
210 eap_eke_session_clean(&data->sess); in eap_eke_build_fail()
284 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id()
389 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit()
396 pos, data->sess.dhcomp_len); in eap_eke_process_commit()
398 pos += data->sess.dhcomp_len; in eap_eke_process_commit()
405 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit()
417 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit()
424 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit()
[all …]
/external/chromium-trace/trace-viewer/third_party/Paste/tests/
Dtest_session.py11 sess = environ['paste.session.factory']()
14 sess = environ['paste.session.factory']()
15 if 'info' in sess:
16 body = str(sess['info'])
24 sess = environ['paste.session.factory']()
25 sess['info'] = info[0]
28 sess = environ['paste.session.factory']()
29 sess['info'] = info[0]
/external/libvncserver/x11vnc/
Dsolid.c887 char *out, *p, *ds, *dsn = NULL, *sess = NULL, *sess2 = NULL; in dcop_session() local
955 sess = strdup(q); in dcop_session()
968 sess = strdup(q); in dcop_session()
977 if (!sess && sess2) { in dcop_session()
978 sess = sess2; in dcop_session()
980 if (!sess || strchr(sess, '\'')) { in dcop_session()
981 if (sess) free(sess); in dcop_session()
982 sess = strdup("--all-sessions"); in dcop_session()
984 len = strlen("--session ") + 2 + strlen(sess) + 1; in dcop_session()
986 sprintf(cmd, "--session '%s'", sess); in dcop_session()
[all …]
/external/boringssl/src/ssl/
Dssl_sess.c729 static void timeout_doall_arg(SSL_SESSION *sess, void *void_param) { in timeout_doall_arg() argument
733 param->time > (sess->time + sess->timeout)) { in timeout_doall_arg()
737 (void) lh_SSL_SESSION_delete(param->cache, sess); in timeout_doall_arg()
738 SSL_SESSION_list_remove(param->ctx, sess); in timeout_doall_arg()
739 sess->not_resumable = 1; in timeout_doall_arg()
741 param->ctx->remove_session_cb(param->ctx, sess); in timeout_doall_arg()
743 SSL_SESSION_free(sess); in timeout_doall_arg()
819 int (*cb)(struct ssl_st *ssl, SSL_SESSION *sess)) { in SSL_CTX_sess_set_new_cb() argument
823 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess) { in SSL_CTX_sess_get_new_cb()
828 void (*cb)(SSL_CTX *ctx, SSL_SESSION *sess)) { in SSL_CTX_sess_set_remove_cb() argument
[all …]
Dt1_lib.c2102 SSL_SESSION *sess; in tls_decrypt_ticket() local
2187 sess = d2i_SSL_SESSION(NULL, &p, slen); in tls_decrypt_ticket()
2189 if (sess) { in tls_decrypt_ticket()
2194 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
2196 sess->session_id_length = sesslen; in tls_decrypt_ticket()
2197 *psess = sess; in tls_decrypt_ticket()
Dssl_lib.c2175 const char *SSL_SESSION_get_version(const SSL_SESSION *sess) { in SSL_SESSION_get_version() argument
2176 return ssl_get_version(sess->ssl_version); in SSL_SESSION_get_version()
/external/libvncserver/x11vnc/misc/
Ddesktop.cgi565 foreach my $sess (split(' ', $session_types)) {
566 next if $sess =~ /^\s*$/;
567 next if $sess !~ /^\w+$/; # alphanumeric
568 $sessions{$sess} = 1;
569 $str .= "<option value=$sess>$sess</option>";
/external/boringssl/src/include/openssl/
Dssl.h916 int (*new_session_cb)(SSL *ssl, SSL_SESSION *sess);
917 void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *sess);
1104 SSL_CTX *ctx, int (*new_session_cb)(SSL *ssl, SSL_SESSION *sess));
1106 SSL_SESSION *sess);
1109 void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *sess));
1111 SSL_CTX *ctx, SSL_SESSION *sess);
2061 OPENSSL_EXPORT const char *SSL_SESSION_get_version(const SSL_SESSION *sess);
/external/selinux/policycoreutils/po/
Dpt_BR.po227 "Não foi possível verificar se o mapeamento de início de sessão para %s está "
243 msgstr "Não foi possível criar um mapeamento de início de sessão para %s"
263 msgstr "Não foi possível adicionar o mapeamento de início de sessão para %s"
272 msgstr "O mapeamento de início de sessão para %s não está definido"
282 msgstr "Não foi possível modificar o mapeamento de início de sessão para %s"
288 "O mapeamento de início de sessão para %s está definido na política, e não "
294 msgstr "Não foi possível excluir o mapeamento de início de sessão para %s"
299 msgstr "Não foi possível listar os mapeamentos de início de sessão"
2612 "Determinar se é que o daemon de sessão Git pode efetuar o bind nos soquetes "
3053 "Determinar se é que o daemon de sessão Polipo pode efetuar bind nos soquetes "
[all …]
/external/libvncserver/webclients/java-applet/ssl/
Dtightvnc-1.3dev7_javasrc-vncviewer-ssl.patch918 + SSLSession sess = socket.getSession();
919 + currentTrustedCerts = sess.getPeerCertificates();
1027 + SSLSession sess = socket.getSession();
1028 + trustallCerts = sess.getPeerCertificates();
Dultravnc-102-JavaViewer-ssl-etc.patch3490 + SSLSession sess = socket.getSession();
3491 + currentTrustedCerts = sess.getPeerCertificates();
3599 + SSLSession sess = socket.getSession();
3600 + trustallCerts = sess.getPeerCertificates();
/external/libvncserver/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/
Dssvnc.tcl3223 set sess "kde"
3226 set sess $ts_desktop_type_def
3229 set sess $ts_desktop_type
3231 set cmd "$cmd -env FD_SESS=$sess";