/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.h | 67 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
H A D | eap_pwd_common.c | 310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 324 session_id[0] = EAP_TYPE_PWD; 339 eap_pwd_h_final(hash, &session_id[1]); 358 session_id, SHA256_MAC_LEN + 1, 307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); 373 p2p_buf_add_session_id(buf, prov->session_id, 406 u32 session_id, u16 method, 421 tmp->session_id = session_id; 463 P2PS_PD_REQ_CHECK(1, session_id); 566 u32 session_id = 0; local 654 session_id = WPA_GET_LE32(msg.session_id); 827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, 405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) argument 1198 u32 session_id; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); 373 p2p_buf_add_session_id(buf, prov->session_id, 406 u32 session_id, u16 method, 421 tmp->session_id = session_id; 463 P2PS_PD_REQ_CHECK(1, session_id); 566 u32 session_id = 0; local 654 session_id = WPA_GET_LE32(msg.session_id); 827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, 405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) argument 1198 u32 session_id; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); 373 p2p_buf_add_session_id(buf, prov->session_id, 406 u32 session_id, u16 method, 421 tmp->session_id = session_id; 463 P2PS_PD_REQ_CHECK(1, session_id); 566 u32 session_id = 0; local 654 session_id = WPA_GET_LE32(msg.session_id); 827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, 405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) argument 1198 u32 session_id; local [all...] |
/external/boringssl/src/ssl/ |
H A D | ssl_session.c | 195 OPENSSL_cleanse(session->session_id, sizeof(session->session_id)); 212 return session->session_id; 326 if (!RAND_bytes(session->session_id, session->session_id_length)) { 360 /* ssl_lookup_session looks up |session_id| in the session cache and sets 364 SSL *ssl, SSL_SESSION **out_session, const uint8_t *session_id, 379 memcpy(data.session_id, session_id, session_id_len); 400 session = ssl->initial_ctx->get_session_cb(ssl, (uint8_t *)session_id, 445 ctx->session_id, ct 363 ssl_lookup_session( SSL *ssl, SSL_SESSION **out_session, const uint8_t *session_id, size_t session_id_len) argument [all...] |
H A D | ssl_asn1.c | 201 !CBB_add_bytes(&child, in->session_id, 545 CBS session_id, master_key; local 546 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING) || 547 CBS_len(&session_id) > SSL3_MAX_SSL_SESSION_ID_LENGTH || 553 memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id)); 554 ret->session_id_length = CBS_len(&session_id);
|
/external/webrtc/talk/app/webrtc/ |
H A D | jsepsessiondescription.cc | 102 const std::string& session_id, 107 session_id_ = session_id; 100 Initialize( cricket::SessionDescription* description, const std::string& session_id, const std::string& session_version) argument
|
H A D | jsep.h | 107 virtual std::string session_id() const = 0;
|
/external/autotest/client/cros/cellular/mbim_compliance/sequences/ |
H A D | connect_sequence.py | 70 mbim_command_message.MBIMSetConnect(session_id=0,
|
/external/autotest/client/cros/cellular/mbim_compliance/tests/ |
H A D | cm_13.py | 43 session_id=0,
|
/external/autotest/client/site_tests/cellular_MbimComplianceControlRequest/ |
H A D | cellular_MbimComplianceCM13.py | 57 command_message = mbim_command_message.MBIMConnectQuery(session_id=0)
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 324 session_id[0] = EAP_TYPE_PWD; 339 eap_pwd_h_final(hash, &session_id[1]); 358 session_id, SHA256_MAC_LEN + 1, 307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 324 session_id[0] = EAP_TYPE_PWD; 339 eap_pwd_h_final(hash, &session_id[1]); 358 session_id, SHA256_MAC_LEN + 1, 307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
|
H A D | eap_sake_common.h | 49 u8 session_id; member in struct:eap_sake_hdr
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
H A D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 252 const u8 *session_id; local 255 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); 256 if (session_id == NULL) { 268 os_memcpy(sid, session_id, need_len);
|
/external/tcpdump/ |
H A D | print-rpki-rtr.c | 43 u_char session_id[2]; /* Session id */ member in union:rpki_rtr_pdu_::__anon17544 201 EXTRACT_16BITS(pdu_header->u.session_id), 219 EXTRACT_16BITS(pdu_header->u.session_id)));
|