/hostap-latest/hs20/server/ |
D | spp_server.c | 50 const char *realm, const char *session_id, 57 const char *session_id, 530 const char *realm, const char *session_id, in db_get_session_val() argument 538 "id=%Q", field, session_id); in db_get_session_val() 542 field, user, realm, session_id); in db_get_session_val() 552 session_id, sqlite3_errmsg(ctx->db)); in db_get_session_val() 739 const char *session_id, in build_post_dev_data_response() argument 754 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id); in build_post_dev_data_response() 834 const char *session_id, in build_sub_rem_resp() argument 883 pw = db_get_session_val(ctx, user, realm, session_id, in build_sub_rem_resp() [all …]
|
D | sql-example.txt | 10 …,'remediation_url','https://subscription-server.osu.example.com/hs20/remediation.php?session_id='); 11 …ediation_url','https://subscription-server.osu.example.com/hs20/free-remediation.php?session_id='); 12 …ample.com','signup_url','https://subscription-server.osu.example.com/hs20/signup.php?session_id=');
|
/hostap-latest/hs20/client/ |
D | spp_client.c | 27 const char *session_id, 109 const char *session_id, in build_spp_post_dev_data() argument 126 if (session_id) in build_spp_post_dev_data() 128 session_id); in build_spp_post_dev_data() 328 const char *session_id, in hs20_spp_upload_mo() argument 353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo() 410 const char *session_id, in process_spp_user_input_response() argument 423 ctx, session_id, in process_spp_user_input_response() 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response() 438 const char *session_id) in hs20_spp_user_input_completed() argument [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_sake.c | 28 u8 session_id; member 133 sake->session_id = data->session_id; in eap_sake_build_msg() 379 u8 subtype, session_id, id; in eap_sake_process() local 391 session_id = req->session_id; in eap_sake_process() 395 "session_id %d", subtype, session_id); in eap_sake_process() 399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() 401 session_id, data->session_id); in eap_sake_process() 405 data->session_id = session_id; in eap_sake_process()
|
D | eap_tls.c | 24 u8 *session_id; member 152 os_free(data->session_id); in eap_tls_deinit() 226 os_free(data->session_id); in eap_tls_success() 227 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 230 if (data->session_id) { in eap_tls_success() 232 data->session_id, data->id_len); in eap_tls_success() 352 os_free(data->session_id); in eap_tls_init_for_reauth() 353 data->session_id = NULL; in eap_tls_init_for_reauth() 418 if (data->session_id == NULL) in eap_tls_get_session_id() 421 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
|
D | eap_peap.c | 58 u8 *session_id; member 203 os_free(data->session_id); in eap_peap_deinit() 1171 os_free(data->session_id); in eap_peap_process() 1172 data->session_id = in eap_peap_process() 1176 if (data->session_id) { in eap_peap_process() 1179 data->session_id, data->id_len); in eap_peap_process() 1260 os_free(data->session_id); in eap_peap_init_for_reauth() 1261 data->session_id = NULL; in eap_peap_init_for_reauth() 1373 if (data->session_id == NULL || !data->phase2_success) in eap_peap_get_session_id() 1376 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id()
|
D | eap_teap.c | 56 u8 *session_id; member 237 os_free(data->session_id); in eap_teap_clear() 238 data->session_id = NULL; in eap_teap_clear() 797 os_free(data->session_id); in eap_teap_session_id() 798 data->session_id = os_malloc(max_id_len); in eap_teap_session_id() 799 if (!data->session_id) in eap_teap_session_id() 802 data->session_id[0] = EAP_TYPE_TEAP; in eap_teap_session_id() 803 res = tls_get_tls_unique(data->ssl.conn, data->session_id + 1, in eap_teap_session_id() 806 os_free(data->session_id); in eap_teap_session_id() 807 data->session_id = NULL; in eap_teap_session_id() [all …]
|
D | eap_ttls.c | 58 u8 *session_id; member 223 os_free(data->session_id); in eap_ttls_deinit() 325 os_free(data->session_id); in eap_ttls_v0_derive_key() 326 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_ttls_v0_derive_key() 329 if (data->session_id) { in eap_ttls_v0_derive_key() 331 data->session_id, data->id_len); in eap_ttls_v0_derive_key() 1760 os_free(data->session_id); in eap_ttls_init_for_reauth() 1761 data->session_id = NULL; in eap_ttls_init_for_reauth() 1850 if (data->session_id == NULL || !data->phase2_success) in eap_ttls_get_session_id() 1853 id = os_memdup(data->session_id, data->id_len); in eap_ttls_get_session_id()
|
D | eap_fast.c | 56 u8 *session_id; member 252 os_free(data->session_id); in eap_fast_deinit() 819 os_free(data->session_id); in eap_fast_process_crypto_binding() 820 data->session_id = eap_peer_tls_derive_session_id( in eap_fast_process_crypto_binding() 822 if (data->session_id) { in eap_fast_process_crypto_binding() 824 data->session_id, data->id_len); in eap_fast_process_crypto_binding() 1713 os_free(data->session_id); 1714 data->session_id = NULL; 1777 if (!data->success || !data->session_id) in eap_fast_get_session_id() 1780 id = os_memdup(data->session_id, data->id_len); in eap_fast_get_session_id()
|
D | eap_gpsk.c | 26 u8 session_id[128]; member 384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2() 391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2() 756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
|
D | eap_pwd.c | 54 u8 session_id[1 + SHA256_MAC_LEN]; member 229 id = os_memdup(data->session_id, 1 + SHA256_MAC_LEN); in eap_pwd_get_session_id() 856 &cs, data->msk, data->emsk, data->session_id) < 0) { in eap_pwd_perform_confirm_exchange()
|
D | eap.c | 692 u8 *session_id = NULL; in eap_peer_erp_init() local 739 session_id = ext_session_id; in eap_peer_erp_init() 742 session_id = sm->eapSessionId; in eap_peer_erp_init() 746 if (!session_id || session_id_len == 0) { in eap_peer_erp_init() 753 if (hmac_sha256_kdf(session_id, session_id_len, "EMSK", len, in eap_peer_erp_init()
|
/hostap-latest/src/fst/ |
D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() 161 session_id, in fst_ctrl_iface_notify() 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 178 id = strtoul(session_id, NULL, 0); in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 217 id = strtoul(session_id, &p, 0); in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 279 id = strtoul(session_id, NULL, 0); in session_remove() 297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument [all …]
|
/hostap-latest/src/eap_server/ |
D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() 262 session_id, data->session_id); in eap_sake_check()
|
D | eap_server_gpsk.c | 27 u8 session_id[128]; member 429 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2() 435 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2() 619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
|
D | eap_server_pwd.c | 54 u8 session_id[1 + SHA256_MAC_LEN]; member 854 data->session_id) < 0) in eap_pwd_process_confirm_resp() 1047 id = os_memdup(data->session_id, 1 + SHA256_MAC_LEN); in eap_pwd_get_session_id()
|
/hostap-latest/src/p2p/ |
D | p2p_pd.c | 168 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs() 385 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp() 418 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument 433 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 475 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 578 u32 session_id = 0; in p2p_process_prov_disc_req() local 666 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 839 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 871 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 901 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req() [all …]
|
/hostap-latest/src/eap_common/ |
D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument 352 session_id[0] = EAP_TYPE_PWD; in compute_keys() 373 eap_pwd_h_final(hash, &session_id[1]); in compute_keys() 395 session_id, SHA256_MAC_LEN + 1, in compute_keys()
|
D | eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
D | eap_sake_common.h | 49 u8 session_id; member
|
/hostap-latest/src/tls/ |
D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
|
D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
|
D | tlsv1_server_write.c | 69 if (random_get_bytes(conn->session_id, conn->session_id_len)) { in tls_write_server_hello() 75 conn->session_id, conn->session_id_len); in tls_write_server_hello() 95 os_memcpy(pos, conn->session_id, conn->session_id_len); in tls_write_server_hello()
|
D | tlsv1_client_read.c | 156 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) { in tls_process_server_hello() 163 os_memcpy(conn->session_id, pos, conn->session_id_len); in tls_process_server_hello() 167 conn->session_id, conn->session_id_len); in tls_process_server_hello()
|
/hostap-latest/src/eapol_supp/ |
D | eapol_supp_sm.c | 511 u8 *session_id, *emsk; in SM_STATE() local 518 session_id = eap_proxy_get_eap_session_id( in SM_STATE() 521 if (sm->config->erp && session_id && emsk) { in SM_STATE() 522 eap_peer_erp_init(sm->eap, session_id, in SM_STATE() 526 os_free(session_id); in SM_STATE()
|