/external/wpa_supplicant_8/hs20/server/ |
H A D | spp_server.c | 48 const char *realm, const char *session_id, 441 const char *realm, const char *session_id, 449 "id=%Q", field, session_id); 453 field, user, realm, session_id); 463 session_id, sqlite3_errmsg(ctx->db)); 623 const char *session_id, 638 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id); 679 const char *session_id, 716 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status, 733 hs20_eventlog_node(ctx, user, realm, session_id, 440 db_get_session_val(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *field) argument 621 build_post_dev_data_response(struct hs20_svc *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *status, const char *error_code) argument 677 build_sub_rem_resp(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int machine_rem, int dmacc) argument 752 machine_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 761 policy_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 807 browser_remediation(struct hs20_svc *ctx, const char *session_id, const char *redirect_uri, const char *uri) argument 834 user_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument 855 free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument 877 no_sub_rem(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument 892 hs20_subscription_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc, const char *redirect_uri) argument 1006 hs20_policy_update(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 1126 spp_exec_upload_mo(struct hs20_svc *ctx, const char *session_id, const char *urn) argument 1146 hs20_subscription_registration(struct hs20_svc *ctx, const char *realm, const char *session_id, const char *redirect_uri) argument 1177 hs20_user_input_remediation(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1277 spp_exec_get_certificate(struct hs20_svc *ctx, const char *session_id, const char *user, const char *realm) argument 1322 hs20_user_input_registration(struct hs20_svc *ctx, const char *session_id, int enrollment_done) argument 1442 hs20_user_input_free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument 1494 hs20_user_input_complete(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1531 hs20_cert_enroll_completed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1557 hs20_cert_enroll_failed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1597 hs20_spp_post_dev_data(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument 1867 build_spp_exchange_complete(struct hs20_svc *ctx, const char *session_id, const char *status, const char *error_code) argument 1893 add_subscription(struct hs20_svc *ctx, const char *session_id) argument 2018 hs20_spp_update_response(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument 2171 char *session_id; local [all...] |
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | ServerHelloTest.java | 32 byte[] session_id = new byte[] { 1, 2, 3, 4, 5, 6, 7, 8, 9, 0 }; 36 server_version, session_id, cipher_suite, (byte) 0); 43 message.session_id, session_id)); 60 message.session_id, message_2.session_id));
|
/external/libweave/src/privet/ |
H A D | security_manager_unittest.cc | 55 void(const std::string& session_id, 58 MOCK_METHOD1(OnPairingEnd, void(const std::string& session_id)); 90 std::string session_id; local 94 CryptoType::kSpake_p224, &session_id, 96 EXPECT_FALSE(session_id.empty()); 104 EXPECT_TRUE(security_.ConfirmPairing(session_id, client_commitment_base64, 117 std::vector<uint8_t>{session_id.begin(), session_id.end()})}; 210 std::string session_id; local 214 CryptoType::kSpake_p224, &session_id, 241 std::string session_id; local 297 std::string session_id; local [all...] |
H A D | security_delegate.h | 57 std::string* session_id, 61 virtual bool ConfirmPairing(const std::string& session_id, 67 virtual bool CancelPairing(const std::string& session_id,
|
H A D | security_manager.h | 39 base::Callback<void(const std::string& session_id, 43 base::Callback<void(const std::string& session_id)>; 80 std::string* session_id, 84 bool ConfirmPairing(const std::string& session_id, 89 bool CancelPairing(const std::string& session_id, ErrorPtr* error) override; 101 bool ClosePendingSession(const std::string& session_id); 102 bool CloseConfirmedSession(const std::string& session_id);
|
H A D | security_manager.cc | 258 std::string* session_id, 314 *session_id = session; 316 LOG(INFO) << "Pairing code for session " << *session_id << " is " << code; 327 bool SecurityManager::ConfirmPairing(const std::string& session_id, argument 332 auto session = pending_sessions_.find(session_id); 335 "Unknown session id: '%s'", session_id.c_str()); 341 ClosePendingSession(session_id); 350 ClosePendingSession(session_id); 369 weak_ptr_factory_.GetWeakPtr(), session_id), 371 ClosePendingSession(session_id); 256 StartPairing(PairingType mode, CryptoType crypto, std::string* session_id, std::string* device_commitment, ErrorPtr* error) argument 375 CancelPairing(const std::string& session_id, ErrorPtr* error) argument 420 ClosePendingSession(const std::string& session_id) argument 430 CloseConfirmedSession(const std::string& session_id) argument [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | spp_client.c | 27 const char *session_id, 109 const char *session_id, 126 if (session_id) 128 session_id); 328 const char *session_id, 353 node = build_spp_post_dev_data(ctx, &ns, session_id, 410 const char *session_id, 423 ctx, session_id, 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); 438 const char *session_id) 107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) argument 326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument 409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) argument 437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) argument 472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument 511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) argument 606 char *session_id = NULL; local 827 char *status, *session_id; local 863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument 891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument [all...] |
/external/webrtc/talk/app/webrtc/ |
H A D | jsepsessiondescription.h | 56 const std::string& session_id, 65 virtual std::string session_id() const { function in class:webrtc::JsepSessionDescription
|
H A D | webrtcsessiondescriptionfactory.h | 95 const std::string& session_id); 104 const std::string& session_id); 113 const std::string& session_id); 154 const std::string& session_id,
|
H A D | webrtcsessiondescriptionfactory.cc | 139 const std::string& session_id, 151 session_id_(session_id), 162 const std::string& session_id) 168 session_id, 178 const std::string& session_id) 185 session_id, 210 const std::string& session_id) 216 session_id, 132 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, rtc::scoped_ptr<DtlsIdentityStoreInterface> dtls_identity_store, const rtc::scoped_refptr<WebRtcIdentityRequestObserver>& identity_request_observer, WebRtcSession* session, const std::string& session_id, bool dtls_enabled) argument 158 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, WebRtcSession* session, const std::string& session_id) argument 173 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, rtc::scoped_ptr<DtlsIdentityStoreInterface> dtls_identity_store, WebRtcSession* session, const std::string& session_id) argument 205 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, const rtc::scoped_refptr<rtc::RTCCertificate>& certificate, WebRtcSession* session, const std::string& session_id) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 145 os_free(data->session_id); 196 os_free(data->session_id); 197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 200 if (data->session_id) { 202 data->session_id, data->id_len); 308 os_free(data->session_id); 309 data->session_id = NULL; 376 if (data->session_id == NULL) 384 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 368 u8 subtype, session_id, id; local 380 session_id = req->session_id; 384 "session_id %d", subtype, session_id); 388 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 145 os_free(data->session_id); 196 os_free(data->session_id); 197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 200 if (data->session_id) { 202 data->session_id, data->id_len); 308 os_free(data->session_id); 309 data->session_id = NULL; 376 if (data->session_id == NULL) 384 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 368 u8 subtype, session_id, id; local 380 session_id = req->session_id; 384 "session_id %d", subtype, session_id); 388 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 145 os_free(data->session_id); 196 os_free(data->session_id); 197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 200 if (data->session_id) { 202 data->session_id, data->id_len); 308 os_free(data->session_id); 309 data->session_id = NULL; 376 if (data->session_id == NULL) 384 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 368 u8 subtype, session_id, id; local 380 session_id = req->session_id; 384 "session_id %d", subtype, session_id); 388 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_8/hostapd/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument 149 session_id, local 161 session_id, local 171 static int session_get(const char *session_id, char *buf, size_t buflen) argument 178 id = strtoul(session_id, NULL, 0); 210 static int session_set(const char *session_id, char *buf, size_t buflen) argument 217 id = strtoul(session_id, &p, 0); 273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument 279 id = strtoul(session_id, NULL, 0); 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local [all...] |
/external/wpa_supplicant_8/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument 149 session_id, local 161 session_id, local 171 static int session_get(const char *session_id, char *buf, size_t buflen) argument 178 id = strtoul(session_id, NULL, 0); 210 static int session_set(const char *session_id, char *buf, size_t buflen) argument 217 id = strtoul(session_id, &p, 0); 273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument 279 id = strtoul(session_id, NULL, 0); 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument 149 session_id, local 161 session_id, local 171 static int session_get(const char *session_id, char *buf, size_t buflen) argument 178 id = strtoul(session_id, NULL, 0); 210 static int session_set(const char *session_id, char *buf, size_t buflen) argument 217 id = strtoul(session_id, &p, 0); 273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument 279 id = strtoul(session_id, NULL, 0); 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
/external/toybox/tests/ |
H A D | pgrep.test | 18 session_id=0 29 testing "pgrep -s" "pgrep -s $session_id yes" "$proc\n" "" ""
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.h | 67 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.h | 67 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|