/hostap-latest/src/crypto/ |
D | tls_gnutls.c | 46 gnutls_session_t session; member 68 static int tls_connection_verify_peer(gnutls_session_t session); 204 ret = gnutls_init(&conn->session, in tls_gnutls_init_session() 212 ret = gnutls_set_default_priority(conn->session); in tls_gnutls_init_session() 216 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", in tls_gnutls_init_session() 224 gnutls_transport_set_pull_function(conn->session, tls_pull_func); in tls_gnutls_init_session() 225 gnutls_transport_set_push_function(conn->session, tls_push_func); in tls_gnutls_init_session() 226 gnutls_transport_set_ptr(conn->session, (gnutls_transport_ptr_t) conn); in tls_gnutls_init_session() 227 gnutls_session_set_ptr(conn->session, conn); in tls_gnutls_init_session() 234 gnutls_deinit(conn->session); in tls_gnutls_init_session() [all …]
|
D | tls_wolfssl.c | 403 WOLFSSL_SESSION *session; in tls_connection_shutdown() local 414 session = wolfSSL_get1_session(conn->ssl); in tls_connection_shutdown() 416 wolfSSL_SESSION_free(session); in tls_connection_shutdown() 419 wolfSSL_set_session(conn->ssl, session); in tls_connection_shutdown() 420 wolfSSL_SESSION_free(session); in tls_connection_shutdown()
|
D | tls_mbedtls_alt.c | 84 …((ssl)->MBEDTLS_PRIVATE(session) ? (ssl)->MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(ciphersuite) :… 1870 const mbedtls_ssl_session *session, in tls_mbedtls_ssl_ticket_write() argument 1885 … return mbedtls_ssl_ticket_write(&tls_ctx_global.ticket_ctx, session, start, end, tlen, lifetime); in tls_mbedtls_ssl_ticket_write() 1888 static int tls_mbedtls_ssl_ticket_parse(void *p_ticket, mbedtls_ssl_session *session, unsigned char… in tls_mbedtls_ssl_ticket_parse() argument 1918 int rc = mbedtls_ssl_ticket_parse(&tls_ctx_global.ticket_ctx, session, buf, len); in tls_mbedtls_ssl_ticket_parse()
|
D | tls_openssl.c | 109 static size_t SSL_SESSION_get_master_key(const SSL_SESSION *session, in SSL_SESSION_get_master_key() argument 112 if (!session || session->master_key_length < 0 || in SSL_SESSION_get_master_key() 113 (size_t) session->master_key_length > outlen) in SSL_SESSION_get_master_key() 115 if ((size_t) session->master_key_length < outlen) in SSL_SESSION_get_master_key() 116 outlen = session->master_key_length; in SSL_SESSION_get_master_key() 117 os_memcpy(out, session->master_key, outlen); in SSL_SESSION_get_master_key()
|
/hostap-latest/wpa_supplicant/ |
D | README-P2P | 219 <adv_mac=peer MAC address> [role=2|4|1] <session=session id> 226 p2p_asp_provision 00:11:22:33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 s… 236 session - Mandatory Session ID of the first session to be established 237 session_mac - Mandatory MAC address that owns/initiated the session 246 <session=session id> <session_mac=peer MAC address> 251 …0:55:44:33:22:11 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_ma… 261 session - Mandatory Session ID of the first session to be established 262 session_mac - Mandatory MAC address that owns/initiated the session 799 P2PS-PROV-START 00:55:44:33:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 se… 807 session - always Session ID of the first session to be established [all …]
|
D | todo.txt | 56 - make sure that TLS session cache is not shared between EAP types or if it
|
D | ChangeLog | 600 * modified EAP fast session resumption to allow results to be used only 604 * modified WPS to merge mixed-WPA/WPA2 credentials from a single session 1075 * added a workaround for WPS PBC session overlap detection to avoid 1180 - Cancel WPS operation on PBC session overlap detection. 1422 session ticket overriding API that was included into the upstream 1838 * fixed EAP-AKA to allow resynchronization within the same session 1883 session resumption 2027 * added EAP workaround for PEAP session resumption: allow outer, 2028 i.e., not tunneled, EAP-Success to terminate session since; this can 2092 authentication session [all …]
|
D | README | 228 respectively. Both mechanisms will generate a master session key for 234 verify that both Authenticator and Supplicant know the master session 236 management mechanism (only the method for generating master session 278 - If WPA-PSK: wpa_supplicant uses PSK as the master session key
|
D | README-WPS | 110 for each WPS registration session. wpa_supplicant can do this with a
|
/hostap-latest/wlantest/ |
D | rx_mgmt.c | 1196 const u8 *session, *frame_ad, *frame_ad_end, *encr_end; in rx_mgmt_assoc_req() local 1198 session = get_fils_session(ie, ie_len); in rx_mgmt_assoc_req() 1199 if (session) { in rx_mgmt_assoc_req() 1201 frame_ad_end = session + 2 + session[1]; in rx_mgmt_assoc_req() 1205 ie_len = session - ie; in rx_mgmt_assoc_req() 1364 const u8 *session, *frame_ad, *frame_ad_end, *encr_end; in rx_mgmt_assoc_resp() local 1366 session = get_fils_session(ies, ies_len); in rx_mgmt_assoc_resp() 1367 if (session) { in rx_mgmt_assoc_resp() 1369 frame_ad_end = session + 2 + session[1]; in rx_mgmt_assoc_resp() 1373 ies_len = session - ies; in rx_mgmt_assoc_resp() [all …]
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 60 master session key for the Authenticator (AP) and Supplicant 67 the master session key. These handshakes are identical regardless 69 generating master session key changes).</para>
|
D | wpa_supplicant.sgml | 117 as the master session key</para>
|
/hostap-latest/src/radius/ |
D | radius_server.c | 406 struct radius_session *session, *prev; in radius_server_session_remove() local 411 session = client->sessions; in radius_server_session_remove() 412 while (session) { in radius_server_session_remove() 413 if (session == sess) { in radius_server_session_remove() 422 prev = session; in radius_server_session_remove() 423 session = session->next; in radius_server_session_remove() 2005 struct radius_session *session, *prev; in radius_server_free_sessions() local 2007 session = sessions; in radius_server_free_sessions() 2008 while (session) { in radius_server_free_sessions() 2009 prev = session; in radius_server_free_sessions() [all …]
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user_sqlite | 23 session TEXT,
|
D | README | 199 EAP/TLS generates a session key that can be used to send WEP keys from 266 respectively. Both mechanisms will generate a master session key for 272 verify that both Authenticator and Supplicant know the master session 274 management mechanism (only the method for generating master session
|
D | ChangeLog | 319 * added EAP server support for TLS session resumption 437 by session timeout 598 * added a workaround for WPS PBC session overlap detection to avoid 729 * fix WPS PBC session overlap detection to use correct attribute 829 session ticket overriding API that was included into the upstream 996 * fixed session timeout processing with drivers that do not use 1185 session 1276 * fixed RADIUS accounting to generate a new session id for cases where 1347 * fixed accounting session handling to send Accounting-Start only once 1348 per session and not to send Accounting-Stop if the session was not
|
D | android.config | 98 # the OpenSSL library must be patched (openssl-0.9.9-session-ticket.patch)
|
D | README-WPS | 220 random AP PIN for each session, i.e., by using "wps_ap_pin random"
|
/hostap-latest/hs20/server/ |
D | sql.txt | 74 session TEXT,
|
D | spp_server.c | 2792 char *session; in gen_spp_session_id() local 2794 session = os_malloc(SPP_SESSION_ID_LEN * 2 + 1); in gen_spp_session_id() 2795 if (session == NULL) in gen_spp_session_id() 2800 os_free(session); in gen_spp_session_id() 2804 os_snprintf(session + i * 2, 3, "%02x", fgetc(f)); in gen_spp_session_id() 2807 return session; in gen_spp_session_id()
|
/hostap-latest/src/pasn/ |
D | pasn_initiator.c | 215 random_get_bytes(pasn->fils.session, FILS_SESSION_LEN) < 0) in wpas_pasn_fils_build_auth() 221 wpa_hexdump(MSG_DEBUG, "PASN: FILS: Session", pasn->fils.session, in wpas_pasn_fils_build_auth() 250 wpabuf_put_data(buf, pasn->fils.session, FILS_SESSION_LEN); in wpas_pasn_fils_build_auth() 383 if (os_memcmp(pasn->fils.session, elems.fils_session, in wpas_pasn_wd_fils_rx()
|
D | pasn_common.h | 29 u8 session[FILS_SESSION_LEN]; member
|
D | pasn_responder.c | 254 wpabuf_put_data(buf, fils->session, FILS_SESSION_LEN); in pasn_get_fils_wd()
|
/hostap-latest/src/ap/ |
D | wpa_auth.c | 3106 const u8 *session = NULL; local 3123 session = ie; 3129 if (!session) { 3143 if (os_memcmp(fils_session, session + 3, FILS_SESSION_LEN) != 0) { 3148 session + 3, FILS_SESSION_LEN); 3151 return session; 3203 const u8 *end, *ie_start, *ie, *session, *crypt; local 3232 session = wpa_fils_validate_fils_session(sm, ie, end - ie, 3234 if (!session) { 3239 crypt = session + 2 + session[1];
|
/hostap-latest/tests/hwsim/ |
D | test_p2ps.py | 156 advert_id, advert_mac, session, session_mac =\ 199 session_id=int(session, 0),
|