| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
| H A D | eap_server_sake.c | 27 u8 session_id; member 241 u8 version, session_id, subtype; in eap_sake_check() local [all...] |
| H A D | eap_server_pwd.c | 54 u8 session_id[1 + SHA256_MAC_LEN]; member
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
|
| H A D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
| H A D | wpas_kay.c | 269 const u8 *session_id; in ieee802_1x_auth_get_session_id() local
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
| H A D | wpa_auth_kay.c | 358 const u8 *session_id; in ieee802_1x_auth_get_session_id() local
|
| /third_party/node/src/ |
| H A D | inspector_io.cc | 111 void Post(int session_id, in Post() argument 174 void Post(int session_id, in Post() argument 337 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument 66 RequestToServer(TransportAction action, int session_id, std::unique_ptr<v8_inspector::StringBuffer> message) RequestToServer() argument 348 MessageReceived(int session_id, const std::string& message) MessageReceived() argument 355 EndSession(int session_id) EndSession() argument [all...] |
| /third_party/lwip/src/netif/ppp/ |
| H A D | pppol2tp.c | 347 u16_t hflags, hlen, len=0, tunnel_id=0, session_id=0, ns=0, nr=0, offset=0; in pppol2tp_input() local
|
| /third_party/openssl/test/ |
| H A D | bad_dtls_test.c | 53 static unsigned char session_id[32]; variable
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
| H A D | eap_pwd_common.c | 330 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) compute_keys() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
| H A D | eap_gpsk.c | 26 u8 session_id[128]; member
|
| H A D | eap_peap.c | 58 u8 *session_id; member [all...] |
| H A D | eap_pwd.c | 54 u8 session_id[1 + SHA256_MAC_LEN]; member
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
| H A D | eap_server_pwd.c | 54 u8 session_id[1 + SHA256_MAC_LEN]; member
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
| H A D | spp_client.c | 107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) build_spp_post_dev_data() argument 326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_upload_mo() argument 409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) process_spp_user_input_response() argument 437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) hs20_spp_user_input_completed() argument 472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_get_certificate() argument 511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) hs20_spp_exec() argument 606 char *session_id = NULL; process_spp_post_dev_data_response() local 827 char *status, *session_id; process_spp_exchange_complete() local 863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) build_spp_update_response() argument 891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) hs20_spp_update_response() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
| H A D | eap_pwd_common.c | 330 compute_keys(EAP_PWD_group *grp, const struct crypto_bignum *k, const struct crypto_bignum *peer_scalar, const struct crypto_bignum *server_scalar, const u8 *confirm_peer, const u8 *confirm_server, const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) compute_keys() argument
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
| H A D | eap_gpsk.c | 26 u8 session_id[128]; member
|
| H A D | eap_pwd.c | 54 u8 session_id[1 + SHA256_MAC_LEN]; member
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
| H A D | spp_client.c | 107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) build_spp_post_dev_data() argument 326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_upload_mo() argument 409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) process_spp_user_input_response() argument 437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) hs20_spp_user_input_completed() argument 472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_get_certificate() argument 511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) hs20_spp_exec() argument 606 char *session_id = NULL; process_spp_post_dev_data_response() local 827 char *status, *session_id; process_spp_exchange_complete() local 863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) build_spp_update_response() argument 891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) hs20_spp_update_response() argument [all...] |
| /third_party/ffmpeg/libavformat/ |
| H A D | rtspdec.c | 130 unsigned char *session_id = rt->session_id; in check_sessionid() local [all...] |
| H A D | rtsp.h | 149 char session_id[512]; member 252 char session_id[512]; member
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/fst/ |
| H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() local 161 session_id, in fst_ctrl_iface_notify() local 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) session_respond() argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) session_transfer() argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) session_teardown() argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; fst_ctrl_iface_on_event() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/ |
| H A D | p2p_pd.c | 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) p2ps_setup_p2ps_prov() argument 1199 u32 session_id; p2p_validate_p2ps_pd_resp() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/fst/ |
| H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() local 161 session_id, in fst_ctrl_iface_notify() local 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) session_respond() argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) session_transfer() argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) session_teardown() argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; fst_ctrl_iface_on_event() local [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/ |
| H A D | p2p_pd.c | 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) p2ps_setup_p2ps_prov() argument 1199 u32 session_id; p2p_validate_p2ps_pd_resp() local [all...] |