/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.c | 303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 319 temp, sess->prf_len); in eap_eke_derive_key() 329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret() [all …]
|
H A D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius_server.c | 284 void srv_log(struct radius_session *sess, const char *fmt, ...) 287 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 307 if (sess->server->db) { in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 315 sess->username, buf); in srv_log() 317 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 320 sqlite3_errmsg(sess->server->db)); in srv_log() 373 struct radius_session *sess = client->sessions; in radius_server_get_session() local 375 while (sess) { in radius_server_get_session() [all …]
|
/freebsd/crypto/openssl/crypto/modes/ |
H A D | ocb128.c | 233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 255 ocb_block_lshift(stretch + (bottom / 8), shift, ctx->sess.offset.c); in CRYPTO_ocb128_setiv() 258 ctx->sess.offset.c[15] |= in CRYPTO_ocb128_setiv() 277 all_num_blocks = num_blocks + ctx->sess.blocks_hashed; in CRYPTO_ocb128_aad() 280 for (i = ctx->sess.blocks_hashed + 1; i <= all_num_blocks; i++) { in CRYPTO_ocb128_aad() 287 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() 293 ocb_block16_xor(&ctx->sess.offset_aad, &tmp, &tmp); in CRYPTO_ocb128_aad() 295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 306 ocb_block16_xor(&ctx->sess.offset_aad, &ctx->l_star, in CRYPTO_ocb128_aad() 307 &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() [all …]
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 284 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 285 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 314 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 321 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 327 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() [all …]
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_eke.c | 27 struct eap_eke_session sess; member 136 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 394 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 396 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
/freebsd/crypto/openssl/engines/ |
H A D | e_devcrypto.c | 86 static int clean_devcrypto_session(session_op_t *sess) { in clean_devcrypto_session() argument 87 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { in clean_devcrypto_session() 91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 106 session_op_t sess; member 214 if (cipher_ctx->sess.ses != 0 && in cipher_init() 215 clean_devcrypto_session(&cipher_ctx->sess) == 0) in cipher_init() 218 cipher_ctx->sess.cipher = cipher_d->devcryptoid; in cipher_init() 219 cipher_ctx->sess.keylen = cipher_d->keylen; in cipher_init() 220 cipher_ctx->sess.key = (void *)key; in cipher_init() 225 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? in cipher_init() [all …]
|
/freebsd/sys/fs/procfs/ |
H A D | procfs_status.c | 65 struct session *sess; in procfs_doprocstatus() 80 sess = p->p_pgrp->pg_session; in procfs_doprocstatus() 81 SESS_LOCK(sess); in procfs_doprocstatus() 82 sid = sess->s_leader ? sess->s_leader->p_pid : 0; in procfs_doprocstatus() 96 if ((p->p_flag & P_CONTROLT) && (tp = sess->s_ttyp)) in procfs_doprocstatus() 102 if (sess->s_ttyvp) { in procfs_doprocstatus() 110 SESS_UNLOCK(sess); in procfs_doprocstatus() 64 struct session *sess; procfs_doprocstatus() local
|
/freebsd/sys/dev/safexcel/ |
H A D | safexcel.c | 1383 const uint8_t *ckey, const uint8_t *akey, struct safexcel_session *sess) in safexcel_set_context() argument 1390 csp = crypto_get_params(sess->cses); in safexcel_set_context() 1396 ctrl0 = sess->alg | sess->digest | sess->hash; in safexcel_set_context() 1397 ctrl1 = sess->mode; in safexcel_set_context() 1435 data + off, data + off + sess->statelen); in safexcel_set_context() 1436 off += sess->statelen * 2; in safexcel_set_context() 1652 safexcel_instr_insert_digest(&instr, req->sess->digestlen); in safexcel_instr_eta() 1654 safexcel_instr_retrieve_digest(&instr, req->sess->digestlen); in safexcel_instr_eta() 1676 safexcel_instr_insert_digest(&instr, req->sess->digestlen); in safexcel_instr_sha_hash() 1729 ((req->sess->digestlen - 2) / 2) << 3 /* digest length */ | in safexcel_instr_ccm() [all …]
|
/freebsd/tools/pkgbase/ |
H A D | metalog_reader.lua | 86 local sess = Analysis_session(filename, verbose, w_notagdirs) 91 io.write(sess.pkg_report_full()) 93 errors = print_lints(sess) 95 errors = print_lints(sess) 97 io.write(sess.pkg_report_simple(dcount, dsize, { 98 fuid and sess.pkg_issetuid or nil, 99 fgid and sess.pkg_issetgid or nil, 100 fid and sess.pkg_issetid or nil 151 function print_lints(sess) 152 local dupwarn, duperr = sess.dup_report() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | clienthellotest.c | 73 SSL_SESSION *sess = NULL; in test_client_hello() local 158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); in test_client_hello() 159 if (!TEST_ptr(sess)) { in test_client_hello() 167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) in test_client_hello() 168 || !TEST_true(SSL_set_session(con, sess))) in test_client_hello() 249 SSL_SESSION_free(sess); in test_client_hello()
|
H A D | sslapitest.c | 73 size_t *idlen, SSL_SESSION **sess); 75 size_t identity_len, SSL_SESSION **sess); 433 SSL_SESSION *sess = NULL; in test_keylog_no_master_key() local 494 sess = SSL_get1_session(clientssl); in test_keylog_no_master_key() 509 || !TEST_true(SSL_set_session(clientssl, sess)) in test_keylog_no_master_key() 535 SSL_SESSION_free(sess); in test_keylog_no_master_key() 849 SSL_SESSION *sess = NULL, *sesspre, *sesspost; in test_ccs_change_cipher() local 870 || !TEST_ptr(sess = SSL_get1_session(clientssl))) in test_ccs_change_cipher() 880 || !TEST_true(SSL_set_session(clientssl, sess)) in test_ccs_change_cipher() 945 SSL_SESSION_free(sess); in test_ccs_change_cipher() [all …]
|
H A D | dtlstest.c | 198 SSL_SESSION *sess = NULL; in test_dtls_drop_records() local 229 || !TEST_ptr(sess = SSL_get1_session(clientssl))) in test_dtls_drop_records() 259 if (sess != NULL) { in test_dtls_drop_records() 260 if (!TEST_true(SSL_set_session(clientssl, sess))) in test_dtls_drop_records() 289 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl))) in test_dtls_drop_records() 299 SSL_SESSION_free(sess); in test_dtls_drop_records()
|
H A D | tls13ccstest.c | 251 SSL_SESSION *sess = NULL; in test_tls13ccs() local 306 sess = SSL_get1_session(cssl); in test_tls13ccs() 307 if (!TEST_ptr(sess)) in test_tls13ccs() 345 if (!TEST_true(SSL_set_session(cssl, sess)) in test_tls13ccs() 482 SSL_SESSION_free(sess); in test_tls13ccs()
|
H A D | bad_dtls_test.c | 465 SSL_SESSION *sess = NULL; in test_bad_dtls() local 483 sess = client_session(); in test_bad_dtls() 484 if (!TEST_ptr(sess)) in test_bad_dtls() 504 || !TEST_true(SSL_set_session(con, sess))) in test_bad_dtls() 593 SSL_SESSION_free(sess); in test_bad_dtls()
|
/freebsd/crypto/openssl/apps/ |
H A D | s_server.c | 192 size_t identity_len, SSL_SESSION **sess) in psk_find_session_cb() argument 201 *sess = NULL; in psk_find_session_cb() 207 *sess = psksess; in psk_find_session_cb() 236 *sess = tmpsess; in psk_find_session_cb() 3699 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() local 3702 SSL_SESSION_get_id(session, &sess->idlen); in add_session() 3703 sess->derlen = i2d_SSL_SESSION(session, NULL); in add_session() 3704 if (sess->derlen < 0) { in add_session() 3706 OPENSSL_free(sess); in add_session() 3710 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session() [all …]
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 962 SSL_SESSION **sess) in tls_get_stateful_ticket() argument 985 *sess = tmpsess; in tls_get_stateful_ticket() 994 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local 1026 &sess)) { in tls_parse_ctos_psk() 1032 if(sess == NULL in tls_parse_ctos_psk() 1064 sess = SSL_SESSION_new(); in tls_parse_ctos_psk() 1065 if (sess == NULL in tls_parse_ctos_psk() 1066 || !SSL_SESSION_set1_master_key(sess, pskdata, in tls_parse_ctos_psk() 1068 || !SSL_SESSION_set_cipher(sess, cipher) in tls_parse_ctos_psk() 1069 || !SSL_SESSION_set_protocol_version(sess, in tls_parse_ctos_psk() [all …]
|
/freebsd/lib/libkvm/ |
H A D | kvm_proc.c | 111 struct session sess; in kvm_proclist() local 271 if (KREAD(kd, (u_long)pgrp.pg_session, &sess)) { in kvm_proclist() 276 kp->ki_sid = sess.s_sid; in kvm_proclist() 277 (void)memcpy(kp->ki_login, sess.s_login, in kvm_proclist() 279 if ((proc.p_flag & P_CONTROLT) && sess.s_ttyp != NULL) { in kvm_proclist() 280 if (KREAD(kd, (u_long)sess.s_ttyp, &tty)) { in kvm_proclist() 282 "can't read tty at %p", sess.s_ttyp); in kvm_proclist() 309 if (KREAD(kd, (u_long)tty.t_session, &sess)) { in kvm_proclist() 315 kp->ki_tsid = sess.s_sid; in kvm_proclist() 392 kp->ki_kiflag = sess.s_ttyvp ? KI_CTTY : 0; in kvm_proclist() [all …]
|
/freebsd/sys/contrib/openzfs/module/os/freebsd/zfs/ |
H A D | crypto_os.c | 157 freebsd_crypt_freesession(freebsd_crypt_session_t *sess) in freebsd_crypt_freesession() argument 159 mtx_destroy(&sess->fs_lock); in freebsd_crypt_freesession() 160 crypto_freesession(sess->fs_sid); in freebsd_crypt_freesession() 161 memset(sess, 0, sizeof (*sess)); in freebsd_crypt_freesession()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 112 SSL_SESSION *sess; in SSL_get1_session() local 120 sess = ssl->session; in SSL_get1_session() 121 if (sess) in SSL_get1_session() 122 SSL_SESSION_up_ref(sess); in SSL_get1_session() 124 return sess; in SSL_get1_session() 312 SSL_SESSION *sess = ssl_session_dup_intern(src, ticket); in ssl_session_dup() local 314 if (sess != NULL) in ssl_session_dup() 315 sess->not_resumable = 0; in ssl_session_dup() 317 return sess; in ssl_session_dup() 1321 int (*cb) (struct ssl_st *ssl, SSL_SESSION *sess)) in SSL_CTX_sess_set_new_cb() argument [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | tls_wolfssl.c | 183 static void remove_session_cb(WOLFSSL_CTX *ctx, WOLFSSL_SESSION *sess) in remove_session_cb() argument 187 buf = wolfSSL_SESSION_get_ex_data(sess, tls_ex_idx_session); in remove_session_cb() 192 buf, sess); in remove_session_cb() 195 wolfSSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); in remove_session_cb() 2216 WOLFSSL_SESSION *sess; in tls_connection_remove_session() local 2218 sess = wolfSSL_get_session(conn->ssl); in tls_connection_remove_session() 2219 if (!sess) in tls_connection_remove_session() 2222 wolfSSL_SSL_SESSION_set_timeout(sess, 0); in tls_connection_remove_session() 2264 WOLFSSL_SESSION *sess; in tls_connection_set_success_data() local 2269 sess = wolfSSL_get_session(conn->ssl); in tls_connection_set_success_data() [all …]
|
H A D | tls_openssl.c | 957 static void remove_session_cb(SSL_CTX *ctx, SSL_SESSION *sess) in remove_session_cb() argument 964 "OpenSSL: Remove session %p (tls_ex_idx_session=%d)", sess, in remove_session_cb() 969 buf = SSL_SESSION_get_ex_data(sess, tls_ex_idx_session); in remove_session_cb() 974 SSL_SESSION_set_ex_data(sess, tls_ex_idx_session, NULL); in remove_session_cb() 979 buf, sess); in remove_session_cb() 987 buf, sess); in remove_session_cb() 4422 SSL_SESSION *sess; in tls_connection_get_eap_fast_key() local 4446 sess = SSL_get_session(ssl); in tls_connection_get_eap_fast_key() 4447 if (!ver || !sess) in tls_connection_get_eap_fast_key() 4466 master_key_len = SSL_SESSION_get_master_key(sess, master_key, in tls_connection_get_eap_fast_key() [all …]
|
/freebsd/crypto/openssl/ssl/record/ |
H A D | ssl3_record.c | 108 SSL_SESSION *sess = s->session; in early_data_count_ok() local 115 if (!s->server && sess->ext.max_early_data == 0) { in early_data_count_ok() 121 sess = s->psksession; in early_data_count_ok() 125 max_early_data = sess->ext.max_early_data; in early_data_count_ok() 129 max_early_data = s->recv_max_early_data < sess->ext.max_early_data in early_data_count_ok() 130 ? s->recv_max_early_data : sess->ext.max_early_data; in early_data_count_ok() 180 SSL_SESSION *sess; in ssl3_get_record() local 197 sess = s->session; in ssl3_get_record() 643 if ((sess != NULL) in ssl3_get_record() 1532 SSL_SESSION *sess; in dtls1_process_record() local [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_sess_set_get_cb.pod | 22 SSL_SESSION *sess); 24 SSL_SESSION *sess); 60 ssl session B<sess>. 87 the B<ctx> and the ssl session B<sess>. It does not provide any feedback.
|
/freebsd/sys/kern/ |
H A D | subr_prf.c | 236 struct session *sess = NULL; in vtprintf() local 244 sess = p->p_session; in vtprintf() 245 sess_hold(sess); in vtprintf() 247 tp = sess->s_ttyp; in vtprintf() 265 if (sess != NULL) in vtprintf() 266 sess_release(sess); in vtprintf()
|