/external/wpa_supplicant_8/hs20/server/ |
H A D | spp_server.c | 48 const char *realm, const char *session_id, 441 const char *realm, const char *session_id, 449 "id=%Q", field, session_id); 453 field, user, realm, session_id); 463 session_id, sqlite3_errmsg(ctx->db)); 623 const char *session_id, 638 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id); 679 const char *session_id, 716 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status, 733 hs20_eventlog_node(ctx, user, realm, session_id, 440 db_get_session_val(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *field) argument 621 build_post_dev_data_response(struct hs20_svc *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *status, const char *error_code) argument 677 build_sub_rem_resp(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int machine_rem, int dmacc) argument 752 machine_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 761 policy_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 807 browser_remediation(struct hs20_svc *ctx, const char *session_id, const char *redirect_uri, const char *uri) argument 834 user_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument 855 free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument 877 no_sub_rem(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument 892 hs20_subscription_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc, const char *redirect_uri) argument 1006 hs20_policy_update(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument 1126 spp_exec_upload_mo(struct hs20_svc *ctx, const char *session_id, const char *urn) argument 1146 hs20_subscription_registration(struct hs20_svc *ctx, const char *realm, const char *session_id, const char *redirect_uri) argument 1177 hs20_user_input_remediation(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1277 spp_exec_get_certificate(struct hs20_svc *ctx, const char *session_id, const char *user, const char *realm) argument 1322 hs20_user_input_registration(struct hs20_svc *ctx, const char *session_id, int enrollment_done) argument 1442 hs20_user_input_free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument 1494 hs20_user_input_complete(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1531 hs20_cert_enroll_completed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1557 hs20_cert_enroll_failed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument 1597 hs20_spp_post_dev_data(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument 1865 build_spp_exchange_complete(struct hs20_svc *ctx, const char *session_id, const char *status, const char *error_code) argument 1891 add_subscription(struct hs20_svc *ctx, const char *session_id) argument 2016 hs20_spp_update_response(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument 2169 char *session_id; local [all...] |
/external/autotest/server/site_tests/cheets_CTS_N/ |
H A D | cheets_CTS_N.py | 93 session_id=None, 102 3. Continue a session: assign the session ID via |session_id|. 110 @param session_id: tradefed session id to continue. 120 elif plan is not None and session_id is not None: 121 # In 7.1 R2 we can only retry session_id with the original plan. 123 '--retry', '%d' % session_id] 205 def _tradefed_retry(self, test_name, session_id): 208 It is assumed that there are no notexecuted tests of session_id, 212 @param session_id: tradefed session id to retry. 214 @return: tuple of (new session_id, test [all...] |
/external/toybox/tests/ |
H A D | pgrep.test | 18 session_id=0 29 testing "-s" "pgrep -s $session_id yes" "$proc\n" "" ""
|
/external/autotest/server/site_tests/cheets_CTS/ |
H A D | cheets_CTS.py | 96 session_id=None, 106 3. Continue a session: assign the session ID via |session_id|. 114 @param session_id: tradefed session id to continue. 125 elif session_id is not None: 127 '%d' % session_id] 197 def _tradefed_continue(self, session_id, datetime_id=None): 201 @param session_id: tradefed session id to continue. 209 self._tradefed_run_command(session_id=session_id)] 212 def _tradefed_retry(self, test_name, session_id) [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | spp_client.c | 27 const char *session_id, 109 const char *session_id, 126 if (session_id) 128 session_id); 328 const char *session_id, 353 node = build_spp_post_dev_data(ctx, &ns, session_id, 410 const char *session_id, 423 ctx, session_id, 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); 438 const char *session_id) 107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) argument 326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument 409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) argument 437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) argument 472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument 511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) argument 606 char *session_id = NULL; local 827 char *status, *session_id; local 863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument 891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument [all...] |
/external/libusb/libusb/os/ |
H A D | haiku_pollfs.cpp | 97 unsigned long session_id = (unsigned long)&fDevice; local 101 struct libusb_device *dev = usbi_get_device_by_session_id(ctx, session_id); 103 usbi_dbg("using previously allocated device with location %lu", session_id); 107 usbi_dbg("allocating new device with location %lu", session_id); 108 dev = usbi_alloc_device(ctx, session_id); 167 unsigned long session_id = (unsigned long)&fDevice; local 171 dev = usbi_get_device_by_session_id(ctx, session_id); 176 usbi_dbg("device with location %lu not found", session_id);
|
/external/webrtc/talk/app/webrtc/ |
H A D | jsepsessiondescription.h | 56 const std::string& session_id, 65 virtual std::string session_id() const { function in class:webrtc::JsepSessionDescription
|
H A D | webrtcsessiondescriptionfactory.h | 95 const std::string& session_id); 104 const std::string& session_id); 113 const std::string& session_id); 154 const std::string& session_id,
|
H A D | webrtcsessiondescriptionfactory.cc | 139 const std::string& session_id, 151 session_id_(session_id), 162 const std::string& session_id) 168 session_id, 178 const std::string& session_id) 185 session_id, 210 const std::string& session_id) 216 session_id, 132 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, rtc::scoped_ptr<DtlsIdentityStoreInterface> dtls_identity_store, const rtc::scoped_refptr<WebRtcIdentityRequestObserver>& identity_request_observer, WebRtcSession* session, const std::string& session_id, bool dtls_enabled) argument 158 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, WebRtcSession* session, const std::string& session_id) argument 173 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, rtc::scoped_ptr<DtlsIdentityStoreInterface> dtls_identity_store, WebRtcSession* session, const std::string& session_id) argument 205 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, const rtc::scoped_refptr<rtc::RTCCertificate>& certificate, WebRtcSession* session, const std::string& session_id) argument
|
/external/openssh/ |
H A D | kexc25519c.c | 149 if (kex->session_id == NULL) { 151 kex->session_id = malloc(kex->session_id_len); 152 if (kex->session_id == NULL) { 156 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexc25519s.c | 126 if (kex->session_id == NULL) { 128 kex->session_id = malloc(kex->session_id_len); 129 if (kex->session_id == NULL) { 133 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexecdhs.c | 161 if (kex->session_id == NULL) { 163 kex->session_id = malloc(kex->session_id_len); 164 if (kex->session_id == NULL) { 168 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | authfd.h | 41 u_char session_id[16], u_char response[16]);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 145 os_free(data->session_id); 196 os_free(data->session_id); 197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 200 if (data->session_id) { 202 data->session_id, data->id_len); 308 os_free(data->session_id); 309 data->session_id = NULL; 376 if (data->session_id == NULL) 384 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 377 u8 subtype, session_id, id; local 389 session_id = req->session_id; 393 "session_id %d", subtype, session_id); 397 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 145 os_free(data->session_id); 196 os_free(data->session_id); 197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 200 if (data->session_id) { 202 data->session_id, data->id_len); 308 os_free(data->session_id); 309 data->session_id = NULL; 376 if (data->session_id == NULL) 384 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 377 u8 subtype, session_id, id; local 389 session_id = req->session_id; 393 "session_id %d", subtype, session_id); 397 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls.c | 24 u8 *session_id; member in struct:eap_tls_data 145 os_free(data->session_id); 196 os_free(data->session_id); 197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, 200 if (data->session_id) { 202 data->session_id, data->id_len); 308 os_free(data->session_id); 309 data->session_id = NULL; 376 if (data->session_id == NULL) 384 os_memcpy(id, data->session_id, dat [all...] |
H A D | eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 134 sake->session_id = data->session_id; 377 u8 subtype, session_id, id; local 389 session_id = req->session_id; 393 "session_id %d", subtype, session_id); 397 if (data->session_id_set && data->session_id != session_id) { [all...] |
/external/wpa_supplicant_8/hostapd/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument 149 session_id, local 161 session_id, local 171 static int session_get(const char *session_id, char *buf, size_t buflen) argument 178 id = strtoul(session_id, NULL, 0); 210 static int session_set(const char *session_id, char *buf, size_t buflen) argument 217 id = strtoul(session_id, &p, 0); 273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument 279 id = strtoul(session_id, NULL, 0); 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local [all...] |
/external/wpa_supplicant_8/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument 149 session_id, local 161 session_id, local 171 static int session_get(const char *session_id, char *buf, size_t buflen) argument 178 id = strtoul(session_id, NULL, 0); 210 static int session_set(const char *session_id, char *buf, size_t buflen) argument 217 id = strtoul(session_id, &p, 0); 273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument 279 id = strtoul(session_id, NULL, 0); 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument 149 session_id, local 161 session_id, local 171 static int session_get(const char *session_id, char *buf, size_t buflen) argument 178 id = strtoul(session_id, NULL, 0); 210 static int session_set(const char *session_id, char *buf, size_t buflen) argument 217 id = strtoul(session_id, &p, 0); 273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument 279 id = strtoul(session_id, NULL, 0); 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |