/external/wpa_supplicant_8/hs20/server/ |
D | spp_server.c | 48 const char *realm, const char *session_id, 441 const char *realm, const char *session_id, in db_get_session_val() argument 449 "id=%Q", field, session_id); in db_get_session_val() 453 field, user, realm, session_id); in db_get_session_val() 463 session_id, sqlite3_errmsg(ctx->db)); in db_get_session_val() 623 const char *session_id, in build_post_dev_data_response() argument 638 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id); in build_post_dev_data_response() 679 const char *session_id, in build_sub_rem_resp() argument 716 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status, in build_sub_rem_resp() 733 hs20_eventlog_node(ctx, user, realm, session_id, in build_sub_rem_resp() [all …]
|
D | sql-example.txt | 10 …,'remediation_url','https://subscription-server.osu.example.com/hs20/remediation.php?session_id='); 11 …ediation_url','https://subscription-server.osu.example.com/hs20/free-remediation.php?session_id='); 12 …ample.com','signup_url','https://subscription-server.osu.example.com/hs20/signup.php?session_id=');
|
/external/autotest/server/site_tests/cheets_CTS_N/ |
D | cheets_CTS_N.py | 93 session_id=None, argument 120 elif plan is not None and session_id is not None: 123 '--retry', '%d' % session_id] 205 def _tradefed_retry(self, test_name, session_id): argument 217 derivedplan = 'retry.%s.%s' % (test_name, session_id) 223 '--session', '%d' % session_id, 228 session_id=session_id)] 233 return session_id + 1, self._run_cts_tradefed(commands) 309 session_id = 0 320 module=target_module, session_id=session_id) [all …]
|
/external/autotest/server/site_tests/cheets_CTS/ |
D | cheets_CTS.py | 96 session_id=None, argument 125 elif session_id is not None: 127 '%d' % session_id] 197 def _tradefed_continue(self, session_id, datetime_id=None): argument 209 self._tradefed_run_command(session_id=session_id)] 212 def _tradefed_retry(self, test_name, session_id): argument 223 derivedplan = 'retry.%s.%s' % (test_name, session_id) 230 % session_id, '-r', 'fail'], 239 session_id += 1 240 return (session_id, counts) [all …]
|
/external/wpa_supplicant_8/hs20/client/ |
D | spp_client.c | 27 const char *session_id, 109 const char *session_id, in build_spp_post_dev_data() argument 126 if (session_id) in build_spp_post_dev_data() 128 session_id); in build_spp_post_dev_data() 328 const char *session_id, in hs20_spp_upload_mo() argument 353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo() 410 const char *session_id, in process_spp_user_input_response() argument 423 ctx, session_id, in process_spp_user_input_response() 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response() 438 const char *session_id) in hs20_spp_user_input_completed() argument [all …]
|
/external/libusb/libusb/os/ |
D | haiku_pollfs.cpp | 97 unsigned long session_id = (unsigned long)&fDevice; in WatchedEntry() local 101 struct libusb_device *dev = usbi_get_device_by_session_id(ctx, session_id); in WatchedEntry() 103 usbi_dbg("using previously allocated device with location %lu", session_id); in WatchedEntry() 107 usbi_dbg("allocating new device with location %lu", session_id); in WatchedEntry() 108 dev = usbi_alloc_device(ctx, session_id); in WatchedEntry() 167 unsigned long session_id = (unsigned long)&fDevice; in ~WatchedEntry() local 171 dev = usbi_get_device_by_session_id(ctx, session_id); in ~WatchedEntry() 176 usbi_dbg("device with location %lu not found", session_id); in ~WatchedEntry()
|
/external/wpa_supplicant_8/src/fst/ |
D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() 161 session_id, in fst_ctrl_iface_notify() 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 178 id = strtoul(session_id, NULL, 0); in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 217 id = strtoul(session_id, &p, 0); in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 279 id = strtoul(session_id, NULL, 0); in session_remove() 297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sake.c | 28 u8 session_id; member 134 sake->session_id = data->session_id; in eap_sake_build_msg() 377 u8 subtype, session_id, id; in eap_sake_process() local 389 session_id = req->session_id; in eap_sake_process() 393 "session_id %d", subtype, session_id); in eap_sake_process() 397 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() 399 session_id, data->session_id); in eap_sake_process() 403 data->session_id = session_id; in eap_sake_process()
|
D | eap_tls.c | 24 u8 *session_id; member 145 os_free(data->session_id); in eap_tls_deinit() 196 os_free(data->session_id); in eap_tls_success() 197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 200 if (data->session_id) { in eap_tls_success() 202 data->session_id, data->id_len); in eap_tls_success() 308 os_free(data->session_id); in eap_tls_init_for_reauth() 309 data->session_id = NULL; in eap_tls_init_for_reauth() 376 if (data->session_id == NULL) in eap_tls_get_session_id() 384 os_memcpy(id, data->session_id, data->id_len); in eap_tls_get_session_id()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() 262 session_id, data->session_id); in eap_sake_check()
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs() 373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp() 406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument 421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 654 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 859 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 889 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req() [all …]
|
/external/openssh/ |
D | kexc25519s.c | 126 if (kex->session_id == NULL) { in input_kex_c25519_init() 128 kex->session_id = malloc(kex->session_id_len); in input_kex_c25519_init() 129 if (kex->session_id == NULL) { in input_kex_c25519_init() 133 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_c25519_init()
|
D | kexc25519c.c | 149 if (kex->session_id == NULL) { in input_kex_c25519_reply() 151 kex->session_id = malloc(kex->session_id_len); in input_kex_c25519_reply() 152 if (kex->session_id == NULL) { in input_kex_c25519_reply() 156 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_c25519_reply()
|
D | kexecdhs.c | 161 if (kex->session_id == NULL) { in input_kex_ecdh_init() 163 kex->session_id = malloc(kex->session_id_len); in input_kex_ecdh_init() 164 if (kex->session_id == NULL) { in input_kex_ecdh_init() 168 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_ecdh_init()
|
D | kexdhc.c | 191 if (kex->session_id == NULL) { in input_kex_dh() 193 kex->session_id = malloc(kex->session_id_len); in input_kex_dh() 194 if (kex->session_id == NULL) { in input_kex_dh() 198 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_dh()
|
D | kexecdhc.c | 196 if (kex->session_id == NULL) { in input_kex_ecdh_reply() 198 kex->session_id = malloc(kex->session_id_len); in input_kex_ecdh_reply() 199 if (kex->session_id == NULL) { in input_kex_ecdh_reply() 203 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_ecdh_reply()
|
D | kexdhs.c | 181 if (kex->session_id == NULL) { in input_kex_dh_init() 183 kex->session_id = malloc(kex->session_id_len); in input_kex_dh_init() 184 if (kex->session_id == NULL) { in input_kex_dh_init() 188 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_dh_init()
|
D | kexgexs.c | 212 if (kex->session_id == NULL) { in input_kex_dh_gex_init() 214 kex->session_id = malloc(kex->session_id_len); in input_kex_dh_gex_init() 215 if (kex->session_id == NULL) { in input_kex_dh_gex_init() 219 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_dh_gex_init()
|
/external/webrtc/talk/app/webrtc/ |
D | webrtcsessiondescriptionfactory.h | 95 const std::string& session_id); 104 const std::string& session_id); 113 const std::string& session_id); 154 const std::string& session_id,
|
D | webrtcsessiondescriptionfactory.cc | 139 const std::string& session_id, in WebRtcSessionDescriptionFactory() argument 151 session_id_(session_id), in WebRtcSessionDescriptionFactory() 162 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument 168 session_id, in WebRtcSessionDescriptionFactory() 178 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument 185 session_id, in WebRtcSessionDescriptionFactory() 210 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument 216 session_id, in WebRtcSessionDescriptionFactory()
|
D | jsepsessiondescription.h | 56 const std::string& session_id, 65 virtual std::string session_id() const { in session_id() function
|
/external/iproute2/ip/ |
D | ipl2tp.c | 43 uint32_t session_id; member 148 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); in create_session() 181 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); in delete_session() 223 p->session_id, p->tunnel_id); in print_session() 276 p->session_id = rta_getattr_u32(attrs[L2TP_ATTR_SESSION_ID]); in get_response() 376 if (p->config.tunnel_id && p->config.session_id) { in get_session() 378 addattr32(&req.n, 128, L2TP_ATTR_SESSION_ID, p->config.session_id); in get_session() 546 p->session_id = uval; in parse_args() 645 if ((p.session) && (p.session_id == 0)) in do_add() 691 if ((p.session) && (p.session_id == 0)) in do_del() [all …]
|
/external/toybox/tests/ |
D | pgrep.test | 18 session_id=0 29 testing "-s" "pgrep -s $session_id yes" "$proc\n" "" ""
|
/external/boringssl/src/ssl/ |
D | ssl_session.cc | 269 OPENSSL_memcpy(new_session->session_id, session->session_id, in SSL_SESSION_dup() 376 OPENSSL_cleanse(session->session_id, sizeof(session->session_id)); in SSL_SESSION_free() 394 return session->session_id; in SSL_SESSION_get_id() 565 if (!RAND_bytes(session->session_id, session->session_id_length)) { in ssl_get_new_session() 771 SSL *ssl, SSL_SESSION **out_session, const uint8_t *session_id, in ssl_lookup_session() argument 786 OPENSSL_memcpy(data.session_id, session_id, session_id_len); in ssl_lookup_session() 801 session = ssl->session_ctx->get_session_cb(ssl, (uint8_t *)session_id, in ssl_lookup_session() 857 client_hello->session_id, in ssl_get_prev_session() 872 ssl, &session, client_hello->session_id, client_hello->session_id_len); in ssl_get_prev_session()
|
D | ssl_asn1.cc | 214 !CBB_add_bytes(&child, in->session_id, in SSL_SESSION_to_bytes_full() 616 CBS session_id, master_key; in SSL_SESSION_parse() local 617 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse() 618 CBS_len(&session_id) > SSL3_MAX_SSL_SESSION_ID_LENGTH || in SSL_SESSION_parse() 624 OPENSSL_memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id)); in SSL_SESSION_parse() 625 ret->session_id_length = CBS_len(&session_id); in SSL_SESSION_parse()
|