Searched refs:session_id (Results 26 - 50 of 135) sorted by relevance

123456

/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.h67 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
H A Deap_pwd_common.c310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
324 session_id[0] = EAP_TYPE_PWD;
339 eap_pwd_h_final(hash, &session_id[1]);
358 session_id, SHA256_MAC_LEN + 1,
307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.h49 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac);
373 p2p_buf_add_session_id(buf, prov->session_id,
406 u32 session_id, u16 method,
421 tmp->session_id = session_id;
463 P2PS_PD_REQ_CHECK(1, session_id);
566 u32 session_id = 0; local
654 session_id = WPA_GET_LE32(msg.session_id);
827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id,
405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) argument
1198 u32 session_id; local
[all...]
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac);
373 p2p_buf_add_session_id(buf, prov->session_id,
406 u32 session_id, u16 method,
421 tmp->session_id = session_id;
463 P2PS_PD_REQ_CHECK(1, session_id);
566 u32 session_id = 0; local
654 session_id = WPA_GET_LE32(msg.session_id);
827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id,
405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) argument
1198 u32 session_id; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac);
373 p2p_buf_add_session_id(buf, prov->session_id,
406 u32 session_id, u16 method,
421 tmp->session_id = session_id;
463 P2PS_PD_REQ_CHECK(1, session_id);
566 u32 session_id = 0; local
654 session_id = WPA_GET_LE32(msg.session_id);
827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id,
405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) argument
1198 u32 session_id; local
[all...]
/external/boringssl/src/ssl/
H A Dssl_session.c195 OPENSSL_cleanse(session->session_id, sizeof(session->session_id));
212 return session->session_id;
326 if (!RAND_bytes(session->session_id, session->session_id_length)) {
360 /* ssl_lookup_session looks up |session_id| in the session cache and sets
364 SSL *ssl, SSL_SESSION **out_session, const uint8_t *session_id,
379 memcpy(data.session_id, session_id, session_id_len);
400 session = ssl->initial_ctx->get_session_cb(ssl, (uint8_t *)session_id,
445 ctx->session_id, ct
363 ssl_lookup_session( SSL *ssl, SSL_SESSION **out_session, const uint8_t *session_id, size_t session_id_len) argument
[all...]
H A Dssl_asn1.c201 !CBB_add_bytes(&child, in->session_id,
545 CBS session_id, master_key; local
546 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING) ||
547 CBS_len(&session_id) > SSL3_MAX_SSL_SESSION_ID_LENGTH ||
553 memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id));
554 ret->session_id_length = CBS_len(&session_id);
/external/webrtc/talk/app/webrtc/
H A Djsepsessiondescription.cc102 const std::string& session_id,
107 session_id_ = session_id;
100 Initialize( cricket::SessionDescription* description, const std::string& session_id, const std::string& session_version) argument
H A Djsep.h107 virtual std::string session_id() const = 0;
/external/autotest/client/cros/cellular/mbim_compliance/sequences/
H A Dconnect_sequence.py70 mbim_command_message.MBIMSetConnect(session_id=0,
/external/autotest/client/cros/cellular/mbim_compliance/tests/
H A Dcm_13.py43 session_id=0,
/external/autotest/client/site_tests/cellular_MbimComplianceControlRequest/
H A Dcellular_MbimComplianceCM13.py57 command_message = mbim_command_message.MBIMConnectQuery(session_id=0)
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.c310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
324 session_id[0] = EAP_TYPE_PWD;
339 eap_pwd_h_final(hash, &session_id[1]);
358 session_id, SHA256_MAC_LEN + 1,
307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.h49 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_i.h23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
324 session_id[0] = EAP_TYPE_PWD;
339 eap_pwd_h_final(hash, &session_id[1]);
358 session_id, SHA256_MAC_LEN + 1,
307 compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k, const BIGNUM *peer_scalar, const BIGNUM *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) argument
H A Deap_sake_common.h49 u8 session_id; member in struct:eap_sake_hdr
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_i.h23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_i.h23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
H A Dtlsv1_server_i.h24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_kay.c252 const u8 *session_id; local
255 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len);
256 if (session_id == NULL) {
268 os_memcpy(sid, session_id, need_len);
/external/tcpdump/
H A Dprint-rpki-rtr.c43 u_char session_id[2]; /* Session id */ member in union:rpki_rtr_pdu_::__anon17544
201 EXTRACT_16BITS(pdu_header->u.session_id),
219 EXTRACT_16BITS(pdu_header->u.session_id)));

Completed in 557 milliseconds

123456