Home
last modified time | relevance | path

Searched defs:session_id (Results 26 - 50 of 81) sorted by relevance

1234

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member
241 u8 version, session_id, subtype; in eap_sake_check() local
[all...]
H A Deap_server_pwd.c54 u8 session_id[1 + SHA256_MAC_LEN]; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_i.h23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
H A Dtlsv1_server_i.h24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dwpas_kay.c269 const u8 *session_id; in ieee802_1x_auth_get_session_id() local
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth_kay.c358 const u8 *session_id; in ieee802_1x_auth_get_session_id() local
/third_party/node/src/
H A Dinspector_io.cc111 void Post(int session_id, in Post() argument
174 void Post(int session_id, in Post() argument
337 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument
66 RequestToServer(TransportAction action, int session_id, std::unique_ptr<v8_inspector::StringBuffer> message) RequestToServer() argument
348 MessageReceived(int session_id, const std::string& message) MessageReceived() argument
355 EndSession(int session_id) EndSession() argument
[all...]
/third_party/lwip/src/netif/ppp/
H A Dpppol2tp.c347 u16_t hflags, hlen, len=0, tunnel_id=0, session_id=0, ns=0, nr=0, offset=0; in pppol2tp_input() local
/third_party/openssl/test/
H A Dbad_dtls_test.c53 static unsigned char session_id[32]; variable
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_pwd_common.c330 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) compute_keys() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_gpsk.c26 u8 session_id[128]; member
H A Deap_peap.c58 u8 *session_id; member
[all...]
H A Deap_pwd.c54 u8 session_id[1 + SHA256_MAC_LEN]; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_pwd.c54 u8 session_id[1 + SHA256_MAC_LEN]; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
H A Dspp_client.c107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) build_spp_post_dev_data() argument
326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_upload_mo() argument
409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) process_spp_user_input_response() argument
437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) hs20_spp_user_input_completed() argument
472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_get_certificate() argument
511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) hs20_spp_exec() argument
606 char *session_id = NULL; process_spp_post_dev_data_response() local
827 char *status, *session_id; process_spp_exchange_complete() local
863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) build_spp_update_response() argument
891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) hs20_spp_update_response() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_pwd_common.c330 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) compute_keys() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_gpsk.c26 u8 session_id[128]; member
H A Deap_pwd.c54 u8 session_id[1 + SHA256_MAC_LEN]; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
H A Dspp_client.c107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) build_spp_post_dev_data() argument
326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_upload_mo() argument
409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) process_spp_user_input_response() argument
437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) hs20_spp_user_input_completed() argument
472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_get_certificate() argument
511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) hs20_spp_exec() argument
606 char *session_id = NULL; process_spp_post_dev_data_response() local
827 char *status, *session_id; process_spp_exchange_complete() local
863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) build_spp_update_response() argument
891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) hs20_spp_update_response() argument
[all...]
/third_party/ffmpeg/libavformat/
H A Drtspdec.c130 unsigned char *session_id = rt->session_id; in check_sessionid() local
[all...]
H A Drtsp.h149 char session_id[512]; member
252 char session_id[512]; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify() local
161 session_id, in fst_ctrl_iface_notify() local
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
297 static int session_initiate(const char *session_id, cha argument
320 session_respond(const char *session_id, char *buf, size_t buflen) session_respond() argument
363 session_transfer(const char *session_id, char *buf, size_t buflen) session_transfer() argument
387 session_teardown(const char *session_id, char *buf, size_t buflen) session_teardown() argument
728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; fst_ctrl_iface_on_event() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/
H A Dp2p_pd.c566 u32 session_id = 0; in p2p_process_prov_disc_req() local
405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) p2ps_setup_p2ps_prov() argument
1199 u32 session_id; p2p_validate_p2ps_pd_resp() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify() local
161 session_id, in fst_ctrl_iface_notify() local
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
297 static int session_initiate(const char *session_id, cha argument
320 session_respond(const char *session_id, char *buf, size_t buflen) session_respond() argument
363 session_transfer(const char *session_id, char *buf, size_t buflen) session_transfer() argument
387 session_teardown(const char *session_id, char *buf, size_t buflen) session_teardown() argument
728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; fst_ctrl_iface_on_event() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/
H A Dp2p_pd.c566 u32 session_id = 0; in p2p_process_prov_disc_req() local
405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) p2ps_setup_p2ps_prov() argument
1199 u32 session_id; p2p_validate_p2ps_pd_resp() local
[all...]

Completed in 23 milliseconds

1234