Home
last modified time | relevance | path

Searched refs:session_id (Results 1 – 25 of 105) sorted by relevance

12345

/external/wpa_supplicant_8/hs20/server/
Dspp_server.c48 const char *realm, const char *session_id,
441 const char *realm, const char *session_id, in db_get_session_val() argument
449 "id=%Q", field, session_id); in db_get_session_val()
453 field, user, realm, session_id); in db_get_session_val()
463 session_id, sqlite3_errmsg(ctx->db)); in db_get_session_val()
623 const char *session_id, in build_post_dev_data_response() argument
638 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id); in build_post_dev_data_response()
679 const char *session_id, in build_sub_rem_resp() argument
716 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status, in build_sub_rem_resp()
733 hs20_eventlog_node(ctx, user, realm, session_id, in build_sub_rem_resp()
[all …]
Dsql-example.txt10 …,'remediation_url','https://subscription-server.osu.example.com/hs20/remediation.php?session_id=');
11 …ediation_url','https://subscription-server.osu.example.com/hs20/free-remediation.php?session_id=');
12 …ample.com','signup_url','https://subscription-server.osu.example.com/hs20/signup.php?session_id=');
/external/autotest/server/site_tests/cheets_CTS_N/
Dcheets_CTS_N.py93 session_id=None, argument
120 elif plan is not None and session_id is not None:
123 '--retry', '%d' % session_id]
205 def _tradefed_retry(self, test_name, session_id): argument
217 derivedplan = 'retry.%s.%s' % (test_name, session_id)
223 '--session', '%d' % session_id,
228 session_id=session_id)]
233 return session_id + 1, self._run_cts_tradefed(commands)
309 session_id = 0
320 module=target_module, session_id=session_id)
[all …]
/external/autotest/server/site_tests/cheets_CTS/
Dcheets_CTS.py96 session_id=None, argument
125 elif session_id is not None:
127 '%d' % session_id]
197 def _tradefed_continue(self, session_id, datetime_id=None): argument
209 self._tradefed_run_command(session_id=session_id)]
212 def _tradefed_retry(self, test_name, session_id): argument
223 derivedplan = 'retry.%s.%s' % (test_name, session_id)
230 % session_id, '-r', 'fail'],
239 session_id += 1
240 return (session_id, counts)
[all …]
/external/wpa_supplicant_8/hs20/client/
Dspp_client.c27 const char *session_id,
109 const char *session_id, in build_spp_post_dev_data() argument
126 if (session_id) in build_spp_post_dev_data()
128 session_id); in build_spp_post_dev_data()
328 const char *session_id, in hs20_spp_upload_mo() argument
353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo()
410 const char *session_id, in process_spp_user_input_response() argument
423 ctx, session_id, in process_spp_user_input_response()
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response()
438 const char *session_id) in hs20_spp_user_input_completed() argument
[all …]
/external/libusb/libusb/os/
Dhaiku_pollfs.cpp97 unsigned long session_id = (unsigned long)&fDevice; in WatchedEntry() local
101 struct libusb_device *dev = usbi_get_device_by_session_id(ctx, session_id); in WatchedEntry()
103 usbi_dbg("using previously allocated device with location %lu", session_id); in WatchedEntry()
107 usbi_dbg("allocating new device with location %lu", session_id); in WatchedEntry()
108 dev = usbi_alloc_device(ctx, session_id); in WatchedEntry()
167 unsigned long session_id = (unsigned long)&fDevice; in ~WatchedEntry() local
171 dev = usbi_get_device_by_session_id(ctx, session_id); in ~WatchedEntry()
176 usbi_dbg("device with location %lu not found", session_id); in ~WatchedEntry()
/external/wpa_supplicant_8/src/fst/
Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify()
161 session_id, in fst_ctrl_iface_notify()
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
178 id = strtoul(session_id, NULL, 0); in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
217 id = strtoul(session_id, &p, 0); in session_set()
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
279 id = strtoul(session_id, NULL, 0); in session_remove()
297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_sake.c28 u8 session_id; member
134 sake->session_id = data->session_id; in eap_sake_build_msg()
377 u8 subtype, session_id, id; in eap_sake_process() local
389 session_id = req->session_id; in eap_sake_process()
393 "session_id %d", subtype, session_id); in eap_sake_process()
397 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process()
399 session_id, data->session_id); in eap_sake_process()
403 data->session_id = session_id; in eap_sake_process()
Deap_tls.c24 u8 *session_id; member
145 os_free(data->session_id); in eap_tls_deinit()
196 os_free(data->session_id); in eap_tls_success()
197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
200 if (data->session_id) { in eap_tls_success()
202 data->session_id, data->id_len); in eap_tls_success()
308 os_free(data->session_id); in eap_tls_init_for_reauth()
309 data->session_id = NULL; in eap_tls_init_for_reauth()
376 if (data->session_id == NULL) in eap_tls_get_session_id()
384 os_memcpy(id, data->session_id, data->id_len); in eap_tls_get_session_id()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_sake.c27 u8 session_id; member
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
76 data->session_id); in eap_sake_init()
109 sake->session_id = data->session_id; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
252 session_id = resp->session_id; in eap_sake_check()
260 if (session_id != data->session_id) { in eap_sake_check()
262 session_id, data->session_id); in eap_sake_check()
/external/wpa_supplicant_8/src/p2p/
Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs()
373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp()
406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument
421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov()
463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req()
566 u32 session_id = 0; in p2p_process_prov_disc_req() local
654 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req()
827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
859 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
889 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req()
[all …]
/external/openssh/
Dkexc25519s.c126 if (kex->session_id == NULL) { in input_kex_c25519_init()
128 kex->session_id = malloc(kex->session_id_len); in input_kex_c25519_init()
129 if (kex->session_id == NULL) { in input_kex_c25519_init()
133 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_c25519_init()
Dkexc25519c.c149 if (kex->session_id == NULL) { in input_kex_c25519_reply()
151 kex->session_id = malloc(kex->session_id_len); in input_kex_c25519_reply()
152 if (kex->session_id == NULL) { in input_kex_c25519_reply()
156 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_c25519_reply()
Dkexecdhs.c161 if (kex->session_id == NULL) { in input_kex_ecdh_init()
163 kex->session_id = malloc(kex->session_id_len); in input_kex_ecdh_init()
164 if (kex->session_id == NULL) { in input_kex_ecdh_init()
168 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_ecdh_init()
Dkexdhc.c191 if (kex->session_id == NULL) { in input_kex_dh()
193 kex->session_id = malloc(kex->session_id_len); in input_kex_dh()
194 if (kex->session_id == NULL) { in input_kex_dh()
198 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_dh()
Dkexecdhc.c196 if (kex->session_id == NULL) { in input_kex_ecdh_reply()
198 kex->session_id = malloc(kex->session_id_len); in input_kex_ecdh_reply()
199 if (kex->session_id == NULL) { in input_kex_ecdh_reply()
203 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_ecdh_reply()
Dkexdhs.c181 if (kex->session_id == NULL) { in input_kex_dh_init()
183 kex->session_id = malloc(kex->session_id_len); in input_kex_dh_init()
184 if (kex->session_id == NULL) { in input_kex_dh_init()
188 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_dh_init()
Dkexgexs.c212 if (kex->session_id == NULL) { in input_kex_dh_gex_init()
214 kex->session_id = malloc(kex->session_id_len); in input_kex_dh_gex_init()
215 if (kex->session_id == NULL) { in input_kex_dh_gex_init()
219 memcpy(kex->session_id, hash, kex->session_id_len); in input_kex_dh_gex_init()
/external/webrtc/talk/app/webrtc/
Dwebrtcsessiondescriptionfactory.h95 const std::string& session_id);
104 const std::string& session_id);
113 const std::string& session_id);
154 const std::string& session_id,
Dwebrtcsessiondescriptionfactory.cc139 const std::string& session_id, in WebRtcSessionDescriptionFactory() argument
151 session_id_(session_id), in WebRtcSessionDescriptionFactory()
162 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument
168 session_id, in WebRtcSessionDescriptionFactory()
178 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument
185 session_id, in WebRtcSessionDescriptionFactory()
210 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument
216 session_id, in WebRtcSessionDescriptionFactory()
Djsepsessiondescription.h56 const std::string& session_id,
65 virtual std::string session_id() const { in session_id() function
/external/iproute2/ip/
Dipl2tp.c43 uint32_t session_id; member
148 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); in create_session()
181 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); in delete_session()
223 p->session_id, p->tunnel_id); in print_session()
276 p->session_id = rta_getattr_u32(attrs[L2TP_ATTR_SESSION_ID]); in get_response()
376 if (p->config.tunnel_id && p->config.session_id) { in get_session()
378 addattr32(&req.n, 128, L2TP_ATTR_SESSION_ID, p->config.session_id); in get_session()
546 p->session_id = uval; in parse_args()
645 if ((p.session) && (p.session_id == 0)) in do_add()
691 if ((p.session) && (p.session_id == 0)) in do_del()
[all …]
/external/toybox/tests/
Dpgrep.test18 session_id=0
29 testing "-s" "pgrep -s $session_id yes" "$proc\n" "" ""
/external/boringssl/src/ssl/
Dssl_session.cc269 OPENSSL_memcpy(new_session->session_id, session->session_id, in SSL_SESSION_dup()
376 OPENSSL_cleanse(session->session_id, sizeof(session->session_id)); in SSL_SESSION_free()
394 return session->session_id; in SSL_SESSION_get_id()
565 if (!RAND_bytes(session->session_id, session->session_id_length)) { in ssl_get_new_session()
771 SSL *ssl, SSL_SESSION **out_session, const uint8_t *session_id, in ssl_lookup_session() argument
786 OPENSSL_memcpy(data.session_id, session_id, session_id_len); in ssl_lookup_session()
801 session = ssl->session_ctx->get_session_cb(ssl, (uint8_t *)session_id, in ssl_lookup_session()
857 client_hello->session_id, in ssl_get_prev_session()
872 ssl, &session, client_hello->session_id, client_hello->session_id_len); in ssl_get_prev_session()
Dssl_asn1.cc214 !CBB_add_bytes(&child, in->session_id, in SSL_SESSION_to_bytes_full()
616 CBS session_id, master_key; in SSL_SESSION_parse() local
617 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse()
618 CBS_len(&session_id) > SSL3_MAX_SSL_SESSION_ID_LENGTH || in SSL_SESSION_parse()
624 OPENSSL_memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id)); in SSL_SESSION_parse()
625 ret->session_id_length = CBS_len(&session_id); in SSL_SESSION_parse()

12345