Searched refs:session_id (Results 1 - 25 of 152) sorted by relevance

1234567

/external/wpa_supplicant_8/hs20/server/
H A Dspp_server.c48 const char *realm, const char *session_id,
441 const char *realm, const char *session_id,
449 "id=%Q", field, session_id);
453 field, user, realm, session_id);
463 session_id, sqlite3_errmsg(ctx->db));
623 const char *session_id,
638 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id);
679 const char *session_id,
716 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status,
733 hs20_eventlog_node(ctx, user, realm, session_id,
440 db_get_session_val(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *field) argument
621 build_post_dev_data_response(struct hs20_svc *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *status, const char *error_code) argument
677 build_sub_rem_resp(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int machine_rem, int dmacc) argument
752 machine_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
761 policy_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
807 browser_remediation(struct hs20_svc *ctx, const char *session_id, const char *redirect_uri, const char *uri) argument
834 user_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument
855 free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument
877 no_sub_rem(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument
892 hs20_subscription_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc, const char *redirect_uri) argument
1006 hs20_policy_update(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
1126 spp_exec_upload_mo(struct hs20_svc *ctx, const char *session_id, const char *urn) argument
1146 hs20_subscription_registration(struct hs20_svc *ctx, const char *realm, const char *session_id, const char *redirect_uri) argument
1177 hs20_user_input_remediation(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1277 spp_exec_get_certificate(struct hs20_svc *ctx, const char *session_id, const char *user, const char *realm) argument
1322 hs20_user_input_registration(struct hs20_svc *ctx, const char *session_id, int enrollment_done) argument
1442 hs20_user_input_free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument
1494 hs20_user_input_complete(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1531 hs20_cert_enroll_completed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1557 hs20_cert_enroll_failed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1597 hs20_spp_post_dev_data(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument
1865 build_spp_exchange_complete(struct hs20_svc *ctx, const char *session_id, const char *status, const char *error_code) argument
1891 add_subscription(struct hs20_svc *ctx, const char *session_id) argument
2016 hs20_spp_update_response(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument
2169 char *session_id; local
[all...]
/external/autotest/server/site_tests/cheets_CTS_N/
H A Dcheets_CTS_N.py93 session_id=None,
102 3. Continue a session: assign the session ID via |session_id|.
110 @param session_id: tradefed session id to continue.
120 elif plan is not None and session_id is not None:
121 # In 7.1 R2 we can only retry session_id with the original plan.
123 '--retry', '%d' % session_id]
205 def _tradefed_retry(self, test_name, session_id):
208 It is assumed that there are no notexecuted tests of session_id,
212 @param session_id: tradefed session id to retry.
214 @return: tuple of (new session_id, test
[all...]
/external/toybox/tests/
H A Dpgrep.test18 session_id=0
29 testing "-s" "pgrep -s $session_id yes" "$proc\n" "" ""
/external/autotest/server/site_tests/cheets_CTS/
H A Dcheets_CTS.py96 session_id=None,
106 3. Continue a session: assign the session ID via |session_id|.
114 @param session_id: tradefed session id to continue.
125 elif session_id is not None:
127 '%d' % session_id]
197 def _tradefed_continue(self, session_id, datetime_id=None):
201 @param session_id: tradefed session id to continue.
209 self._tradefed_run_command(session_id=session_id)]
212 def _tradefed_retry(self, test_name, session_id)
[all...]
/external/wpa_supplicant_8/hs20/client/
H A Dspp_client.c27 const char *session_id,
109 const char *session_id,
126 if (session_id)
128 session_id);
328 const char *session_id,
353 node = build_spp_post_dev_data(ctx, &ns, session_id,
410 const char *session_id,
423 ctx, session_id,
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL);
438 const char *session_id)
107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) argument
326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument
409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) argument
437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) argument
472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) argument
511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) argument
606 char *session_id = NULL; local
827 char *status, *session_id; local
863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument
891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) argument
[all...]
/external/libusb/libusb/os/
H A Dhaiku_pollfs.cpp97 unsigned long session_id = (unsigned long)&fDevice; local
101 struct libusb_device *dev = usbi_get_device_by_session_id(ctx, session_id);
103 usbi_dbg("using previously allocated device with location %lu", session_id);
107 usbi_dbg("allocating new device with location %lu", session_id);
108 dev = usbi_alloc_device(ctx, session_id);
167 unsigned long session_id = (unsigned long)&fDevice; local
171 dev = usbi_get_device_by_session_id(ctx, session_id);
176 usbi_dbg("device with location %lu not found", session_id);
/external/webrtc/talk/app/webrtc/
H A Djsepsessiondescription.h56 const std::string& session_id,
65 virtual std::string session_id() const { function in class:webrtc::JsepSessionDescription
H A Dwebrtcsessiondescriptionfactory.h95 const std::string& session_id);
104 const std::string& session_id);
113 const std::string& session_id);
154 const std::string& session_id,
H A Dwebrtcsessiondescriptionfactory.cc139 const std::string& session_id,
151 session_id_(session_id),
162 const std::string& session_id)
168 session_id,
178 const std::string& session_id)
185 session_id,
210 const std::string& session_id)
216 session_id,
132 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, rtc::scoped_ptr<DtlsIdentityStoreInterface> dtls_identity_store, const rtc::scoped_refptr<WebRtcIdentityRequestObserver>& identity_request_observer, WebRtcSession* session, const std::string& session_id, bool dtls_enabled) argument
158 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, WebRtcSession* session, const std::string& session_id) argument
173 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, rtc::scoped_ptr<DtlsIdentityStoreInterface> dtls_identity_store, WebRtcSession* session, const std::string& session_id) argument
205 WebRtcSessionDescriptionFactory( rtc::Thread* signaling_thread, cricket::ChannelManager* channel_manager, const rtc::scoped_refptr<rtc::RTCCertificate>& certificate, WebRtcSession* session, const std::string& session_id) argument
/external/openssh/
H A Dkexc25519c.c149 if (kex->session_id == NULL) {
151 kex->session_id = malloc(kex->session_id_len);
152 if (kex->session_id == NULL) {
156 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexc25519s.c126 if (kex->session_id == NULL) {
128 kex->session_id = malloc(kex->session_id_len);
129 if (kex->session_id == NULL) {
133 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexecdhs.c161 if (kex->session_id == NULL) {
163 kex->session_id = malloc(kex->session_id_len);
164 if (kex->session_id == NULL) {
168 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dauthfd.h41 u_char session_id[16], u_char response[16]);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_tls.c24 u8 *session_id; member in struct:eap_tls_data
145 os_free(data->session_id);
196 os_free(data->session_id);
197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
200 if (data->session_id) {
202 data->session_id, data->id_len);
308 os_free(data->session_id);
309 data->session_id = NULL;
376 if (data->session_id == NULL)
384 os_memcpy(id, data->session_id, dat
[all...]
H A Deap_sake.c28 u8 session_id; member in struct:eap_sake_data
134 sake->session_id = data->session_id;
377 u8 subtype, session_id, id; local
389 session_id = req->session_id;
393 "session_id %d", subtype, session_id);
397 if (data->session_id_set && data->session_id != session_id) {
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_tls.c24 u8 *session_id; member in struct:eap_tls_data
145 os_free(data->session_id);
196 os_free(data->session_id);
197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
200 if (data->session_id) {
202 data->session_id, data->id_len);
308 os_free(data->session_id);
309 data->session_id = NULL;
376 if (data->session_id == NULL)
384 os_memcpy(id, data->session_id, dat
[all...]
H A Deap_sake.c28 u8 session_id; member in struct:eap_sake_data
134 sake->session_id = data->session_id;
377 u8 subtype, session_id, id; local
389 session_id = req->session_id;
393 "session_id %d", subtype, session_id);
397 if (data->session_id_set && data->session_id != session_id) {
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_tls.c24 u8 *session_id; member in struct:eap_tls_data
145 os_free(data->session_id);
196 os_free(data->session_id);
197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl,
200 if (data->session_id) {
202 data->session_id, data->id_len);
308 os_free(data->session_id);
309 data->session_id = NULL;
376 if (data->session_id == NULL)
384 os_memcpy(id, data->session_id, dat
[all...]
H A Deap_sake.c28 u8 session_id; member in struct:eap_sake_data
134 sake->session_id = data->session_id;
377 u8 subtype, session_id, id; local
389 session_id = req->session_id;
393 "session_id %d", subtype, session_id);
397 if (data->session_id_set && data->session_id != session_id) {
[all...]
/external/wpa_supplicant_8/hostapd/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument
149 session_id, local
161 session_id, local
171 static int session_get(const char *session_id, char *buf, size_t buflen) argument
178 id = strtoul(session_id, NULL, 0);
210 static int session_set(const char *session_id, char *buf, size_t buflen) argument
217 id = strtoul(session_id, &p, 0);
273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument
279 id = strtoul(session_id, NULL, 0);
297 static int session_initiate(const char *session_id, cha argument
320 session_respond(const char *session_id, char *buf, size_t buflen) argument
363 session_transfer(const char *session_id, char *buf, size_t buflen) argument
387 session_teardown(const char *session_id, char *buf, size_t buflen) argument
728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local
[all...]
/external/wpa_supplicant_8/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument
149 session_id, local
161 session_id, local
171 static int session_get(const char *session_id, char *buf, size_t buflen) argument
178 id = strtoul(session_id, NULL, 0);
210 static int session_set(const char *session_id, char *buf, size_t buflen) argument
217 id = strtoul(session_id, &p, 0);
273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument
279 id = strtoul(session_id, NULL, 0);
297 static int session_initiate(const char *session_id, cha argument
320 session_respond(const char *session_id, char *buf, size_t buflen) argument
363 session_transfer(const char *session_id, char *buf, size_t buflen) argument
387 session_teardown(const char *session_id, char *buf, size_t buflen) argument
728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, argument
149 session_id, local
161 session_id, local
171 static int session_get(const char *session_id, char *buf, size_t buflen) argument
178 id = strtoul(session_id, NULL, 0);
210 static int session_set(const char *session_id, char *buf, size_t buflen) argument
217 id = strtoul(session_id, &p, 0);
273 static int session_remove(const char *session_id, char *buf, size_t buflen) argument
279 id = strtoul(session_id, NULL, 0);
297 static int session_initiate(const char *session_id, cha argument
320 session_respond(const char *session_id, char *buf, size_t buflen) argument
363 session_transfer(const char *session_id, char *buf, size_t buflen) argument
387 session_teardown(const char *session_id, char *buf, size_t buflen) argument
728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member in struct:eap_sake_data
70 if (os_get_random(&data->session_id, 1)) {
76 data->session_id);
109 sake->session_id = data->session_id;
241 u8 version, session_id, subtype; local
252 session_id = resp->session_id;
260 if (session_id != data->session_id) {
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member in struct:eap_sake_data
70 if (os_get_random(&data->session_id, 1)) {
76 data->session_id);
109 sake->session_id = data->session_id;
241 u8 version, session_id, subtype; local
252 session_id = resp->session_id;
260 if (session_id != data->session_id) {
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member in struct:eap_sake_data
70 if (os_get_random(&data->session_id, 1)) {
76 data->session_id);
109 sake->session_id = data->session_id;
241 u8 version, session_id, subtype; local
252 session_id = resp->session_id;
260 if (session_id != data->session_id) {
[all...]

Completed in 2023 milliseconds

1234567