| /freebsd-src/contrib/wpa/src/eap_common/ |
| H A D | eap_eke_common.c | 303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 319 temp, sess->prf_len); in eap_eke_derive_key() 329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret() [all …]
|
| H A D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
| /freebsd-src/contrib/wpa/src/radius/ |
| H A D | radius_server.c | 284 void srv_log(struct radius_session *sess, const char *fmt, ...) 287 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 307 if (sess->server->db) { in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 315 sess->username, buf); in srv_log() 317 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 320 sqlite3_errmsg(sess in srv_log() 373 struct radius_session *sess = client->sessions; radius_server_get_session() local 387 radius_server_session_free(struct radius_server_data * data,struct radius_session * sess) radius_server_session_free() argument 403 radius_server_session_remove(struct radius_server_data * data,struct radius_session * sess) radius_server_session_remove() argument 432 struct radius_session *sess = timeout_ctx; radius_server_session_remove_timeout() local 441 struct radius_session *sess = timeout_ctx; radius_server_session_timeout() local 452 struct radius_session *sess; radius_server_new_session() local 477 radius_server_testing_options_tls(struct radius_session * sess,const char * tls,struct eap_session_data * eap_conf) radius_server_testing_options_tls() argument 523 radius_server_testing_options(struct radius_session * sess,struct eap_session_data * eap_conf) radius_server_testing_options() argument 566 struct radius_session *sess; radius_server_get_new_session() local 665 radius_srv_hs20_t_c_pending(struct radius_session * sess) radius_srv_hs20_t_c_pending() argument 705 radius_server_add_session(struct radius_session * sess) radius_server_add_session() argument 735 db_update_last_msk(struct radius_session * sess,const char * msk) db_update_last_msk() argument 785 radius_server_is_sim_method(struct radius_session * sess) radius_server_is_sim_method() argument 842 radius_server_sim_provisioning_session(struct radius_session * sess,const u8 * hash) radius_server_sim_provisioning_session() argument 897 radius_server_encapsulate_eap(struct radius_server_data * data,struct radius_client * client,struct radius_session * sess,struct radius_msg * request) radius_server_encapsulate_eap() argument 1158 radius_server_macacl(struct radius_server_data * data,struct radius_client * client,struct radius_session * sess,struct radius_msg * request) radius_server_macacl() argument 1297 radius_server_hs20_t_c_check(struct radius_session * sess,struct radius_msg * msg) radius_server_hs20_t_c_check() argument 1353 struct radius_session *sess; radius_server_request() local 2508 struct radius_session *sess = ctx; radius_server_get_eap_user() local 2532 struct radius_session *sess = ctx; radius_server_get_eap_req_id_text() local 2541 struct radius_session *sess = ctx; radius_server_log_msg() local 2550 struct radius_session *sess = ctx; radius_server_get_erp_domain() local 2560 struct radius_session *sess = ctx; radius_server_erp_get_key() local 2569 struct radius_session *sess = ctx; radius_server_erp_add_key() local 2604 struct radius_session *s, *sess = NULL; radius_server_eap_pending_cb() local [all...] |
| /freebsd-src/crypto/openssl/crypto/modes/ |
| H A D | ocb128.c | 233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 255 ocb_block_lshift(stretch + (bottom / 8), shift, ctx->sess.offset.c); in CRYPTO_ocb128_setiv() 258 ctx->sess.offset.c[15] |= in CRYPTO_ocb128_setiv() 277 all_num_blocks = num_blocks + ctx->sess.blocks_hashed; in CRYPTO_ocb128_aad() 280 for (i = ctx->sess.blocks_hashed + 1; i <= all_num_blocks; i++) { in CRYPTO_ocb128_aad() 287 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() 293 ocb_block16_xor(&ctx->sess.offset_aad, &tmp, &tmp); in CRYPTO_ocb128_aad() 295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 306 ocb_block16_xor(&ctx->sess.offset_aad, &ctx->l_star, in CRYPTO_ocb128_aad() 307 &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() [all …]
|
| /freebsd-src/contrib/wpa/src/eap_server/ |
| H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 284 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 285 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 314 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 321 if (random_get_bytes(data->nonce_s, data->sess in eap_eke_build_confirm() [all...] |
| /freebsd-src/contrib/wpa/src/eap_peer/ |
| H A D | eap_eke.c | 27 struct eap_eke_session sess; member 136 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 394 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 396 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
| /freebsd-src/crypto/openssl/engines/ |
| H A D | e_devcrypto.c | 86 static int clean_devcrypto_session(session_op_t *sess) { in clean_devcrypto_session() argument 87 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { in clean_devcrypto_session() 91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 106 session_op_t sess; member 214 if (cipher_ctx->sess.ses != 0 && in cipher_init() 215 clean_devcrypto_session(&cipher_ctx->sess) == 0) in cipher_init() 218 cipher_ctx->sess.cipher = cipher_d->devcryptoid; in cipher_init() 219 cipher_ctx->sess.keylen = cipher_d->keylen; in cipher_init() 220 cipher_ctx->sess.key = (void *)key; in cipher_init() 225 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? in cipher_init() [all …]
|
| /freebsd-src/sys/fs/procfs/ |
| H A D | procfs_status.c | 65 struct session *sess; in procfs_doprocstatus() 80 sess = p->p_pgrp->pg_session; in procfs_doprocstatus() 81 SESS_LOCK(sess); in procfs_doprocstatus() 82 sid = sess->s_leader ? sess->s_leader->p_pid : 0; in procfs_doprocstatus() 96 if ((p->p_flag & P_CONTROLT) && (tp = sess->s_ttyp)) in procfs_doprocstatus() 102 if (sess->s_ttyvp) { in procfs_doprocstatus() 110 SESS_UNLOCK(sess); in procfs_doprocstatus() 64 struct session *sess; procfs_doprocstatus() local
|
| /freebsd-src/sys/dev/safexcel/ |
| H A D | safexcel.c | 1383 const uint8_t *ckey, const uint8_t *akey, struct safexcel_session *sess) in safexcel_set_context() argument 1390 csp = crypto_get_params(sess->cses); in safexcel_set_context() 1396 ctrl0 = sess->alg | sess->digest | sess->hash; in safexcel_set_context() 1397 ctrl1 = sess->mode; in safexcel_set_context() 1435 data + off, data + off + sess->statelen); in safexcel_set_context() 1436 off += sess->statelen * 2; in safexcel_set_context() 1652 safexcel_instr_insert_digest(&instr, req->sess->digestlen); in safexcel_instr_eta() 1654 safexcel_instr_retrieve_digest(&instr, req->sess->digestlen); in safexcel_instr_eta() 1676 safexcel_instr_insert_digest(&instr, req->sess->digestlen); in safexcel_instr_sha_hash() 1729 ((req->sess->digestlen - 2) / 2) << 3 /* digest length */ | in safexcel_instr_ccm() [all …]
|
| /freebsd-src/tools/pkgbase/ |
| H A D | metalog_reader.lua | 86 local sess = Analysis_session(filename, verbose, w_notagdirs) 91 io.write(sess.pkg_report_full()) 93 errors = print_lints(sess) 95 errors = print_lints(sess) 97 io.write(sess.pkg_report_simple(dcount, dsize, { 98 fuid and sess.pkg_issetuid or nil, 99 fgid and sess.pkg_issetgid or nil, 100 fid and sess.pkg_issetid or nil 151 function print_lints(sess) 152 local dupwarn, duperr = sess.dup_report() [all …]
|
| /freebsd-src/crypto/openssl/test/ |
| H A D | clienthellotest.c | 73 SSL_SESSION *sess = NULL; in test_client_hello() local 158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); in test_client_hello() 159 if (!TEST_ptr(sess)) { in test_client_hello() 167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) in test_client_hello() 168 || !TEST_true(SSL_set_session(con, sess))) in test_client_hello() 249 SSL_SESSION_free(sess); in test_client_hello()
|
| H A D | sslapitest.c | 73 size_t *idlen, SSL_SESSION **sess); 75 size_t identity_len, SSL_SESSION **sess); 433 SSL_SESSION *sess = NULL; in test_keylog_no_master_key() local 494 sess = SSL_get1_session(clientssl); in test_keylog_no_master_key() 509 || !TEST_true(SSL_set_session(clientssl, sess)) in test_keylog_no_master_key() 535 SSL_SESSION_free(sess); in test_keylog_no_master_key() 849 SSL_SESSION *sess = NULL, *sesspre, *sesspost; in test_ccs_change_cipher() local 870 || !TEST_ptr(sess = SSL_get1_session(clientssl))) in test_ccs_change_cipher() 880 || !TEST_true(SSL_set_session(clientssl, sess)) in test_ccs_change_cipher() 945 SSL_SESSION_free(sess); in test_ccs_change_cipher() 2006 new_session_cb(SSL * ssl,SSL_SESSION * sess) new_session_cb() argument 2017 remove_session_cb(SSL_CTX * ctx,SSL_SESSION * sess) remove_session_cb() argument 2409 new_cachesession_cb(SSL * ssl,SSL_SESSION * sess) new_cachesession_cb() argument 3229 use_session_cb(SSL * ssl,const EVP_MD * md,const unsigned char ** id,size_t * idlen,SSL_SESSION ** sess) use_session_cb() argument 3290 find_session_cb(SSL * ssl,const unsigned char * identity,size_t identity_len,SSL_SESSION ** sess) find_session_cb() argument 3369 SSL_SESSION *sess = NULL; create_a_psk() local 3402 setupearly_data_test(SSL_CTX ** cctx,SSL_CTX ** sctx,SSL ** clientssl,SSL ** serverssl,SSL_SESSION ** sess,int idx,size_t mdsize) setupearly_data_test() argument 3516 SSL_SESSION *sess = NULL; test_early_data_read_write() local 3755 SSL_SESSION *sess = NULL; test_early_data_replay_int() local 3907 SSL_SESSION *sess = NULL; early_data_skip_helper() local 4130 SSL_SESSION *sess = NULL; test_early_data_not_sent() local 4213 SSL_SESSION *sess = NULL; test_early_data_psk() local 4401 SSL_SESSION *sess = NULL; test_early_data_psk_with_all_ciphers() local 4511 SSL_SESSION *sess = NULL; test_early_data_not_expected() local 5898 SSL_SESSION *sess = NULL; test_custom_exts() local 6430 SSL_SESSION *sess = NULL; test_export_key_mat_early() local 7517 SSL_SESSION *sess = NULL; test_info_callback() local 8241 SSL_SESSION *sess; test_shutdown() local 9028 SSL_SESSION *sess = NULL; test_session_cache_overflow() local 9152 SSL_SESSION *sess = NULL; test_servername() local 10600 SSL_SESSION *sess; global() member 10658 SSL_SESSION *sess = NULL; test_multi_resume() local [all...] |
| H A D | dtlstest.c | 198 SSL_SESSION *sess = NULL; in test_dtls_drop_records() local 229 || !TEST_ptr(sess = SSL_get1_session(clientssl))) in test_dtls_drop_records() 259 if (sess != NULL) { in test_dtls_drop_records() 260 if (!TEST_true(SSL_set_session(clientssl, sess))) in test_dtls_drop_records() 289 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl))) in test_dtls_drop_records() 299 SSL_SESSION_free(sess); in test_dtls_drop_records()
|
| H A D | tls13ccstest.c | 251 SSL_SESSION *sess = NULL; in test_tls13ccs() local 306 sess = SSL_get1_session(cssl); in test_tls13ccs() 307 if (!TEST_ptr(sess)) in test_tls13ccs() 345 if (!TEST_true(SSL_set_session(cssl, sess)) in test_tls13ccs() 482 SSL_SESSION_free(sess); in test_tls13ccs()
|
| H A D | bad_dtls_test.c | 465 SSL_SESSION *sess = NULL; in test_bad_dtls() local 483 sess = client_session(); in test_bad_dtls() 484 if (!TEST_ptr(sess)) in test_bad_dtls() 504 || !TEST_true(SSL_set_session(con, sess))) in test_bad_dtls() 593 SSL_SESSION_free(sess); in test_bad_dtls()
|
| /freebsd-src/crypto/openssl/apps/ |
| H A D | s_server.c | 192 size_t identity_len, SSL_SESSION **sess) in psk_find_session_cb() argument 201 *sess = NULL; in psk_find_session_cb() 207 *sess = psksess; in psk_find_session_cb() 236 *sess = tmpsess; in psk_find_session_cb() 3699 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() local 3702 SSL_SESSION_get_id(session, &sess->idlen); in add_session() 3703 sess->derlen = i2d_SSL_SESSION(session, NULL); in add_session() 3704 if (sess->derlen < 0) { in add_session() 3706 OPENSSL_free(sess); in add_session() 3710 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session() [all …]
|
| /freebsd-src/crypto/openssl/ssl/statem/ |
| H A D | extensions_srvr.c | 962 SSL_SESSION **sess) in tls_get_stateful_ticket() 985 *sess = tmpsess; in tls_parse_ctos_psk() 994 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() 1026 &sess)) { in tls_parse_ctos_psk() 1032 if(sess == NULL in tls_parse_ctos_psk() 1064 sess = SSL_SESSION_new(); in tls_parse_ctos_psk() 1065 if (sess == NULL in tls_parse_ctos_psk() 1066 || !SSL_SESSION_set1_master_key(sess, pskdata, in tls_parse_ctos_psk() 1068 || !SSL_SESSION_set_cipher(sess, cipher) in tls_parse_ctos_psk() 1069 || !SSL_SESSION_set_protocol_version(sess, in tls_parse_ctos_psk() 957 tls_get_stateful_ticket(SSL * s,PACKET * tick,SSL_SESSION ** sess) tls_get_stateful_ticket() argument 989 SSL_SESSION *sess = NULL; tls_parse_ctos_psk() local [all...] |
| /freebsd-src/lib/libkvm/ |
| H A D | kvm_proc.c | 111 struct session sess; in kvm_proclist() local 271 if (KREAD(kd, (u_long)pgrp.pg_session, &sess)) { in kvm_proclist() 276 kp->ki_sid = sess.s_sid; in kvm_proclist() 277 (void)memcpy(kp->ki_login, sess.s_login, in kvm_proclist() 279 if ((proc.p_flag & P_CONTROLT) && sess.s_ttyp != NULL) { in kvm_proclist() 280 if (KREAD(kd, (u_long)sess.s_ttyp, &tty)) { in kvm_proclist() 282 "can't read tty at %p", sess.s_ttyp); in kvm_proclist() 309 if (KREAD(kd, (u_long)tty.t_session, &sess)) { in kvm_proclist() 315 kp->ki_tsid = sess.s_sid; in kvm_proclist() 392 kp->ki_kiflag = sess in kvm_proclist() [all...] |
| /freebsd-src/crypto/openssl/ssl/ |
| H A D | ssl_sess.c | 112 SSL_SESSION *sess; in SSL_SESSION_set_ex_data() 120 sess = ssl->session; in SSL_SESSION_get_ex_data() 121 if (sess) 122 SSL_SESSION_up_ref(sess); in SSL_SESSION_new() 124 return sess; in SSL_SESSION_new() 312 SSL_SESSION *sess = ssl_session_dup_intern(src, ticket); in SSL_SESSION_get0_id_context() 314 if (sess != NULL) in SSL_SESSION_get0_id_context() 315 sess->not_resumable = 0; in SSL_SESSION_get0_id_context() 317 return sess; 1321 int (*cb) (struct ssl_st *ssl, SSL_SESSION *sess)) in SSL_CTX_sess_get_remove_cb() 97 SSL_SESSION *sess; SSL_get1_session() local 296 SSL_SESSION *sess = ssl_session_dup_intern(src, ticket); ssl_session_dup() local 1305 SSL_CTX_sess_set_new_cb(SSL_CTX * ctx,int (* cb)(struct ssl_st * ssl,SSL_SESSION * sess)) SSL_CTX_sess_set_new_cb() argument 1315 SSL_CTX_sess_set_remove_cb(SSL_CTX * ctx,void (* cb)(SSL_CTX * ctx,SSL_SESSION * sess)) SSL_CTX_sess_set_remove_cb() argument [all...] |
| /freebsd-src/contrib/wpa/src/crypto/ |
| H A D | tls_wolfssl.c | 183 static void remove_session_cb(WOLFSSL_CTX *ctx, WOLFSSL_SESSION *sess) in remove_session_cb() 187 buf = wolfSSL_SESSION_get_ex_data(sess, tls_ex_idx_session); in remove_session_cb() 191 "wolfSSL: Free application session data %p (sess %p)", 192 buf, sess); 195 wolfSSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); in tls_init() 2216 WOLFSSL_SESSION *sess; 2218 sess = wolfSSL_get_session(conn->ssl); 2219 if (!sess) 2222 wolfSSL_SSL_SESSION_set_timeout(sess, 0); 2264 WOLFSSL_SESSION *sess; 177 remove_session_cb(WOLFSSL_CTX * ctx,WOLFSSL_SESSION * sess) remove_session_cb() argument 2151 WOLFSSL_SESSION *sess; tls_connection_remove_session() local 2166 WOLFSSL_SESSION *sess; tls_connection_set_success_data() local 2200 WOLFSSL_SESSION *sess; tls_connection_get_success_data() local [all...] |
| /freebsd-src/sys/contrib/openzfs/module/os/freebsd/zfs/ |
| H A D | crypto_os.c | 157 freebsd_crypt_freesession(freebsd_crypt_session_t *sess) in freebsd_crypt_freesession() argument 159 mtx_destroy(&sess->fs_lock); in freebsd_crypt_freesession() 160 crypto_freesession(sess->fs_sid); in freebsd_crypt_freesession() 161 memset(sess, 0, sizeof (*sess)); in freebsd_crypt_freesession()
|
| /freebsd-src/crypto/openssl/ssl/record/ |
| H A D | ssl3_record.c | 108 SSL_SESSION *sess = s->session; in early_data_count_ok() local 115 if (!s->server && sess->ext.max_early_data == 0) { in early_data_count_ok() 121 sess = s->psksession; in early_data_count_ok() 125 max_early_data = sess->ext.max_early_data; in early_data_count_ok() 129 max_early_data = s->recv_max_early_data < sess->ext.max_early_data in early_data_count_ok() 130 ? s->recv_max_early_data : sess->ext.max_early_data; in early_data_count_ok() 180 SSL_SESSION *sess; in ssl3_get_record() local 197 sess = s->session; in ssl3_get_record() 643 if ((sess != NULL) in ssl3_get_record() 1532 SSL_SESSION *sess; in dtls1_process_record() local [all …]
|
| /freebsd-src/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_sess_set_get_cb.pod | 22 SSL_SESSION *sess); 24 SSL_SESSION *sess); 60 ssl session B<sess>. 87 the B<ctx> and the ssl session B<sess>. It does not provide any feedback.
|
| H A D | SSL_CTX_use_psk_identity_hint.pod | 22 SSL_SESSION **sess); 49 in B<*sess>. The SSL_SESSION object should, as a minimum, set the master key, 55 callback should return successfully and ensure that B<*sess> is
|
| /freebsd-src/sys/kern/ |
| H A D | subr_prf.c | 236 struct session *sess = NULL; in vtprintf() 244 sess = p->p_session; in vtprintf() 245 sess_hold(sess); in vtprintf() 247 tp = sess->s_ttyp; in vtprintf() 265 if (sess != NULL) in vtprintf() 266 sess_release(sess); in vtprintf() 235 struct session *sess = NULL; vtprintf() local
|