Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 27) sorted by relevance

12

/hostap-latest/src/crypto/
Dtls_gnutls.c46 gnutls_session_t session; member
68 static int tls_connection_verify_peer(gnutls_session_t session);
204 ret = gnutls_init(&conn->session, in tls_gnutls_init_session()
212 ret = gnutls_set_default_priority(conn->session); in tls_gnutls_init_session()
216 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", in tls_gnutls_init_session()
224 gnutls_transport_set_pull_function(conn->session, tls_pull_func); in tls_gnutls_init_session()
225 gnutls_transport_set_push_function(conn->session, tls_push_func); in tls_gnutls_init_session()
226 gnutls_transport_set_ptr(conn->session, (gnutls_transport_ptr_t) conn); in tls_gnutls_init_session()
227 gnutls_session_set_ptr(conn->session, conn); in tls_gnutls_init_session()
234 gnutls_deinit(conn->session); in tls_gnutls_init_session()
[all …]
Dtls_wolfssl.c403 WOLFSSL_SESSION *session; in tls_connection_shutdown() local
414 session = wolfSSL_get1_session(conn->ssl); in tls_connection_shutdown()
416 wolfSSL_SESSION_free(session); in tls_connection_shutdown()
419 wolfSSL_set_session(conn->ssl, session); in tls_connection_shutdown()
420 wolfSSL_SESSION_free(session); in tls_connection_shutdown()
Dtls_mbedtls_alt.c84 …((ssl)->MBEDTLS_PRIVATE(session) ? (ssl)->MBEDTLS_PRIVATE(session)->MBEDTLS_PRIVATE(ciphersuite) :…
1870 const mbedtls_ssl_session *session, in tls_mbedtls_ssl_ticket_write() argument
1885 … return mbedtls_ssl_ticket_write(&tls_ctx_global.ticket_ctx, session, start, end, tlen, lifetime); in tls_mbedtls_ssl_ticket_write()
1888 static int tls_mbedtls_ssl_ticket_parse(void *p_ticket, mbedtls_ssl_session *session, unsigned char… in tls_mbedtls_ssl_ticket_parse() argument
1918 int rc = mbedtls_ssl_ticket_parse(&tls_ctx_global.ticket_ctx, session, buf, len); in tls_mbedtls_ssl_ticket_parse()
Dtls_openssl.c109 static size_t SSL_SESSION_get_master_key(const SSL_SESSION *session, in SSL_SESSION_get_master_key() argument
112 if (!session || session->master_key_length < 0 || in SSL_SESSION_get_master_key()
113 (size_t) session->master_key_length > outlen) in SSL_SESSION_get_master_key()
115 if ((size_t) session->master_key_length < outlen) in SSL_SESSION_get_master_key()
116 outlen = session->master_key_length; in SSL_SESSION_get_master_key()
117 os_memcpy(out, session->master_key, outlen); in SSL_SESSION_get_master_key()
/hostap-latest/wpa_supplicant/
DREADME-P2P219 <adv_mac=peer MAC address> [role=2|4|1] <session=session id>
226 p2p_asp_provision 00:11:22:33:44:55 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 session=12ab34 s…
236 session - Mandatory Session ID of the first session to be established
237 session_mac - Mandatory MAC address that owns/initiated the session
246 <session=session id> <session_mac=peer MAC address>
251 …0:55:44:33:22:11 adv_id=4d6fc7 adv_mac=00:55:44:33:22:11 role=1 status=0 session=12ab34 session_ma…
261 session - Mandatory Session ID of the first session to be established
262 session_mac - Mandatory MAC address that owns/initiated the session
799 P2PS-PROV-START 00:55:44:33:22:11 adv_id=111 adv_mac=00:55:44:33:22:11 conncap=1 session=1234567 se…
807 session - always Session ID of the first session to be established
[all …]
Dtodo.txt56 - make sure that TLS session cache is not shared between EAP types or if it
DChangeLog600 * modified EAP fast session resumption to allow results to be used only
604 * modified WPS to merge mixed-WPA/WPA2 credentials from a single session
1075 * added a workaround for WPS PBC session overlap detection to avoid
1180 - Cancel WPS operation on PBC session overlap detection.
1422 session ticket overriding API that was included into the upstream
1838 * fixed EAP-AKA to allow resynchronization within the same session
1883 session resumption
2027 * added EAP workaround for PEAP session resumption: allow outer,
2028 i.e., not tunneled, EAP-Success to terminate session since; this can
2092 authentication session
[all …]
DREADME228 respectively. Both mechanisms will generate a master session key for
234 verify that both Authenticator and Supplicant know the master session
236 management mechanism (only the method for generating master session
278 - If WPA-PSK: wpa_supplicant uses PSK as the master session key
DREADME-WPS110 for each WPS registration session. wpa_supplicant can do this with a
/hostap-latest/wlantest/
Drx_mgmt.c1196 const u8 *session, *frame_ad, *frame_ad_end, *encr_end; in rx_mgmt_assoc_req() local
1198 session = get_fils_session(ie, ie_len); in rx_mgmt_assoc_req()
1199 if (session) { in rx_mgmt_assoc_req()
1201 frame_ad_end = session + 2 + session[1]; in rx_mgmt_assoc_req()
1205 ie_len = session - ie; in rx_mgmt_assoc_req()
1364 const u8 *session, *frame_ad, *frame_ad_end, *encr_end; in rx_mgmt_assoc_resp() local
1366 session = get_fils_session(ies, ies_len); in rx_mgmt_assoc_resp()
1367 if (session) { in rx_mgmt_assoc_resp()
1369 frame_ad_end = session + 2 + session[1]; in rx_mgmt_assoc_resp()
1373 ies_len = session - ies; in rx_mgmt_assoc_resp()
[all …]
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_background.sgml60 master session key for the Authenticator (AP) and Supplicant
67 the master session key. These handshakes are identical regardless
69 generating master session key changes).</para>
Dwpa_supplicant.sgml117 as the master session key</para>
/hostap-latest/src/radius/
Dradius_server.c406 struct radius_session *session, *prev; in radius_server_session_remove() local
411 session = client->sessions; in radius_server_session_remove()
412 while (session) { in radius_server_session_remove()
413 if (session == sess) { in radius_server_session_remove()
422 prev = session; in radius_server_session_remove()
423 session = session->next; in radius_server_session_remove()
2005 struct radius_session *session, *prev; in radius_server_free_sessions() local
2007 session = sessions; in radius_server_free_sessions()
2008 while (session) { in radius_server_free_sessions()
2009 prev = session; in radius_server_free_sessions()
[all …]
/hostap-latest/hostapd/
Dhostapd.eap_user_sqlite23 session TEXT,
DREADME199 EAP/TLS generates a session key that can be used to send WEP keys from
266 respectively. Both mechanisms will generate a master session key for
272 verify that both Authenticator and Supplicant know the master session
274 management mechanism (only the method for generating master session
DChangeLog319 * added EAP server support for TLS session resumption
437 by session timeout
598 * added a workaround for WPS PBC session overlap detection to avoid
729 * fix WPS PBC session overlap detection to use correct attribute
829 session ticket overriding API that was included into the upstream
996 * fixed session timeout processing with drivers that do not use
1185 session
1276 * fixed RADIUS accounting to generate a new session id for cases where
1347 * fixed accounting session handling to send Accounting-Start only once
1348 per session and not to send Accounting-Stop if the session was not
Dandroid.config98 # the OpenSSL library must be patched (openssl-0.9.9-session-ticket.patch)
DREADME-WPS220 random AP PIN for each session, i.e., by using "wps_ap_pin random"
/hostap-latest/hs20/server/
Dsql.txt74 session TEXT,
Dspp_server.c2792 char *session; in gen_spp_session_id() local
2794 session = os_malloc(SPP_SESSION_ID_LEN * 2 + 1); in gen_spp_session_id()
2795 if (session == NULL) in gen_spp_session_id()
2800 os_free(session); in gen_spp_session_id()
2804 os_snprintf(session + i * 2, 3, "%02x", fgetc(f)); in gen_spp_session_id()
2807 return session; in gen_spp_session_id()
/hostap-latest/src/pasn/
Dpasn_initiator.c215 random_get_bytes(pasn->fils.session, FILS_SESSION_LEN) < 0) in wpas_pasn_fils_build_auth()
221 wpa_hexdump(MSG_DEBUG, "PASN: FILS: Session", pasn->fils.session, in wpas_pasn_fils_build_auth()
250 wpabuf_put_data(buf, pasn->fils.session, FILS_SESSION_LEN); in wpas_pasn_fils_build_auth()
383 if (os_memcmp(pasn->fils.session, elems.fils_session, in wpas_pasn_wd_fils_rx()
Dpasn_common.h29 u8 session[FILS_SESSION_LEN]; member
Dpasn_responder.c254 wpabuf_put_data(buf, fils->session, FILS_SESSION_LEN); in pasn_get_fils_wd()
/hostap-latest/src/ap/
Dwpa_auth.c3106 const u8 *session = NULL; local
3123 session = ie;
3129 if (!session) {
3143 if (os_memcmp(fils_session, session + 3, FILS_SESSION_LEN) != 0) {
3148 session + 3, FILS_SESSION_LEN);
3151 return session;
3203 const u8 *end, *ie_start, *ie, *session, *crypt; local
3232 session = wpa_fils_validate_fils_session(sm, ie, end - ie,
3234 if (!session) {
3239 crypt = session + 2 + session[1];
/hostap-latest/tests/hwsim/
Dtest_p2ps.py156 advert_id, advert_mac, session, session_mac =\
199 session_id=int(session, 0),

12