Searched defs:session_id (Results 1 - 25 of 168) sorted by last modified time

1234567

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.c289 u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
303 session_id[0] = EAP_TYPE_PWD;
318 eap_pwd_h_final(hash, &session_id[1]);
337 session_id, SHA256_MAC_LEN + 1,
286 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *confirm_peer, u8 *confirm_server, u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.h49 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_fast.c56 u8 *session_id; member in struct:eap_fast_data
255 os_free(data->session_id);
804 os_free(data->session_id);
805 data->session_id = eap_peer_tls_derive_session_id(
807 if (data->session_id) {
809 data->session_id, data->id_len);
1643 os_free(data->session_id);
1644 data->session_id = NULL;
1716 os_memcpy(id, data->session_id, data->id_len);
H A Deap_gpsk.c26 u8 session_id[128]; member in struct:eap_gpsk_data
387 data->session_id, &data->id_len) < 0) {
394 data->session_id, data->id_len);
761 os_memcpy(sid, data->session_id, data->id_len);
H A Deap_peap.c58 u8 *session_id; member in struct:eap_peap_data
192 os_free(data->session_id);
1044 os_free(data->session_id);
1045 data->session_id =
1049 if (data->session_id) {
1052 data->session_id, data->id_len);
1128 os_free(data->session_id);
1129 data->session_id = NULL;
1217 if (data->session_id == NULL || !data->phase2_success)
1225 os_memcpy(id, data->session_id, dat
[all...]
H A Deap_pwd.c46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data
205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN);
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
H A Deap_sake.c28 u8 session_id; member in struct:eap_sake_data
134 sake->session_id = data->session_id;
370 u8 subtype, session_id; local
381 session_id = req->session_id;
385 "session_id %d", subtype, session_id);
389 if (data->session_id_set && data->session_id != session_id) {
[all...]
H A Deap_tls.c24 u8 *session_id; member in struct:eap_tls_data
144 os_free(data->session_id);
208 os_free(data->session_id);
209 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
212 if (data->session_id) {
214 data->session_id, data->id_len);
280 os_free(data->session_id);
281 data->session_id = NULL;
348 if (data->session_id == NULL)
356 os_memcpy(id, data->session_id, dat
[all...]
H A Deap_ttls.c57 u8 *session_id; member in struct:eap_ttls_data
154 os_free(data->session_id);
237 os_free(data->session_id);
238 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
241 if (data->session_id) {
243 data->session_id, data->id_len);
1543 os_free(data->session_id);
1544 data->session_id = NULL;
1634 if (data->session_id == NULL || !data->phase2_success)
1642 os_memcpy(id, data->session_id, dat
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pwd.c48 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data
852 data->session_id) < 0)
H A Deap_server_sake.c27 u8 session_id; member in struct:eap_sake_data
70 if (os_get_random(&data->session_id, 1)) {
76 data->session_id);
109 sake->session_id = data->session_id;
241 u8 version, session_id, subtype; local
252 session_id = resp->session_id;
260 if (session_id != data->session_id) {
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_i.h23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/hs20/client/
H A Dspp_client.c25 const char *session_id,
102 const char *session_id,
119 if (session_id)
121 session_id);
321 const char *session_id,
346 node = build_spp_post_dev_data(ctx, &ns, session_id,
403 const char *session_id,
416 ctx, session_id,
422 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL);
431 const char *session_id)
100 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) argument
319 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument
402 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) argument
430 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) argument
465 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument
504 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) argument
599 char *session_id = NULL; local
820 char *status, *session_id; local
856 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument
884 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument
[all...]
/external/wpa_supplicant_8/hs20/server/
H A Dspp_server.c48 const char *realm, const char *session_id,
419 const char *realm, const char *session_id,
427 "id=%Q", field, session_id);
431 field, user, realm, session_id);
441 session_id, sqlite3_errmsg(ctx->db));
601 const char *session_id,
616 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id);
657 const char *session_id,
694 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status,
711 hs20_eventlog_node(ctx, user, realm, session_id,
418 db_get_session_val(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *field) argument
599 build_post_dev_data_response(struct hs20_svc *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *status, const char *error_code) argument
655 build_sub_rem_resp(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int machine_rem, int dmacc) argument
730 machine_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
739 policy_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
785 browser_remediation(struct hs20_svc *ctx, const char *session_id, const char *redirect_uri, const char *uri) argument
812 user_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument
833 free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument
855 no_sub_rem(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument
870 hs20_subscription_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc, const char *redirect_uri) argument
984 hs20_policy_update(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
1104 spp_exec_upload_mo(struct hs20_svc *ctx, const char *session_id, const char *urn) argument
1124 hs20_subscription_registration(struct hs20_svc *ctx, const char *realm, const char *session_id, const char *redirect_uri) argument
1155 hs20_user_input_remediation(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1255 spp_exec_get_certificate(struct hs20_svc *ctx, const char *session_id, const char *user, const char *realm) argument
1300 hs20_user_input_registration(struct hs20_svc *ctx, const char *session_id, int enrollment_done) argument
1415 hs20_user_input_free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument
1467 hs20_user_input_complete(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1504 hs20_cert_enroll_completed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1530 hs20_cert_enroll_failed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1570 hs20_spp_post_dev_data(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument
1840 build_spp_exchange_complete(struct hs20_svc *ctx, const char *session_id, const char *status, const char *error_code) argument
1866 add_subscription(struct hs20_svc *ctx, const char *session_id) argument
1991 hs20_spp_update_response(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument
2144 char *session_id; local
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c289 u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
303 session_id[0] = EAP_TYPE_PWD;
318 eap_pwd_h_final(hash, &session_id[1]);
337 session_id, SHA256_MAC_LEN + 1,
286 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, BIGNUM *k, BIGNUM *peer_scalar, BIGNUM *server_scalar, u8 *confirm_peer, u8 *confirm_server, u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.h49 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_fast.c56 u8 *session_id; member in struct:eap_fast_data
255 os_free(data->session_id);
804 os_free(data->session_id);
805 data->session_id = eap_peer_tls_derive_session_id(
807 if (data->session_id) {
809 data->session_id, data->id_len);
1643 os_free(data->session_id);
1644 data->session_id = NULL;
1716 os_memcpy(id, data->session_id, data->id_len);
H A Deap_gpsk.c26 u8 session_id[128]; member in struct:eap_gpsk_data
387 data->session_id, &data->id_len) < 0) {
394 data->session_id, data->id_len);
761 os_memcpy(sid, data->session_id, data->id_len);
H A Deap_peap.c58 u8 *session_id; member in struct:eap_peap_data
192 os_free(data->session_id);
1044 os_free(data->session_id);
1045 data->session_id =
1049 if (data->session_id) {
1052 data->session_id, data->id_len);
1128 os_free(data->session_id);
1129 data->session_id = NULL;
1217 if (data->session_id == NULL || !data->phase2_success)
1225 os_memcpy(id, data->session_id, dat
[all...]
H A Deap_pwd.c46 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data
205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN);
674 &cs, data->msk, data->emsk, data->session_id) < 0) {
H A Deap_sake.c28 u8 session_id; member in struct:eap_sake_data
134 sake->session_id = data->session_id;
370 u8 subtype, session_id; local
381 session_id = req->session_id;
385 "session_id %d", subtype, session_id);
389 if (data->session_id_set && data->session_id != session_id) {
[all...]
H A Deap_tls.c24 u8 *session_id; member in struct:eap_tls_data
144 os_free(data->session_id);
208 os_free(data->session_id);
209 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
212 if (data->session_id) {
214 data->session_id, data->id_len);
280 os_free(data->session_id);
281 data->session_id = NULL;
348 if (data->session_id == NULL)
356 os_memcpy(id, data->session_id, dat
[all...]
H A Deap_ttls.c57 u8 *session_id; member in struct:eap_ttls_data
154 os_free(data->session_id);
237 os_free(data->session_id);
238 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
241 if (data->session_id) {
243 data->session_id, data->id_len);
1543 os_free(data->session_id);
1544 data->session_id = NULL;
1634 if (data->session_id == NULL || !data->phase2_success)
1642 os_memcpy(id, data->session_id, dat
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pwd.c48 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data
852 data->session_id) < 0)

Completed in 1815 milliseconds

1234567