/external/wpa_supplicant_8/hs20/server/ |
D | spp_server.c | 48 const char *realm, const char *session_id, 441 const char *realm, const char *session_id, in db_get_session_val() argument 449 "id=%Q", field, session_id); in db_get_session_val() 453 field, user, realm, session_id); in db_get_session_val() 463 session_id, sqlite3_errmsg(ctx->db)); in db_get_session_val() 623 const char *session_id, in build_post_dev_data_response() argument 638 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id); in build_post_dev_data_response() 679 const char *session_id, in build_sub_rem_resp() argument 716 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status, in build_sub_rem_resp() 733 hs20_eventlog_node(ctx, user, realm, session_id, in build_sub_rem_resp() [all …]
|
D | sql-example.txt | 10 …,'remediation_url','https://subscription-server.osu.example.com/hs20/remediation.php?session_id='); 11 …ediation_url','https://subscription-server.osu.example.com/hs20/free-remediation.php?session_id='); 12 …ample.com','signup_url','https://subscription-server.osu.example.com/hs20/signup.php?session_id=');
|
/external/libweave/src/privet/ |
D | security_manager_unittest.cc | 55 void(const std::string& session_id, 58 MOCK_METHOD1(OnPairingEnd, void(const std::string& session_id)); 90 std::string session_id; in PairAndAuthenticate() local 94 CryptoType::kSpake_p224, &session_id, in PairAndAuthenticate() 96 EXPECT_FALSE(session_id.empty()); in PairAndAuthenticate() 104 EXPECT_TRUE(security_.ConfirmPairing(session_id, client_commitment_base64, in PairAndAuthenticate() 117 std::vector<uint8_t>{session_id.begin(), session_id.end()})}; in PairAndAuthenticate() 210 std::string session_id; in TEST_F() local 214 CryptoType::kSpake_p224, &session_id, in TEST_F() 216 EXPECT_FALSE(session_id.empty()); in TEST_F() [all …]
|
D | security_manager.cc | 258 std::string* session_id, in StartPairing() argument 314 *session_id = session; in StartPairing() 316 LOG(INFO) << "Pairing code for session " << *session_id << " is " << code; in StartPairing() 327 bool SecurityManager::ConfirmPairing(const std::string& session_id, in ConfirmPairing() argument 332 auto session = pending_sessions_.find(session_id); in ConfirmPairing() 335 "Unknown session id: '%s'", session_id.c_str()); in ConfirmPairing() 341 ClosePendingSession(session_id); in ConfirmPairing() 350 ClosePendingSession(session_id); in ConfirmPairing() 369 weak_ptr_factory_.GetWeakPtr(), session_id), in ConfirmPairing() 371 ClosePendingSession(session_id); in ConfirmPairing() [all …]
|
D | security_manager.h | 39 base::Callback<void(const std::string& session_id, 43 base::Callback<void(const std::string& session_id)>; 80 std::string* session_id, 84 bool ConfirmPairing(const std::string& session_id, 89 bool CancelPairing(const std::string& session_id, ErrorPtr* error) override; 101 bool ClosePendingSession(const std::string& session_id); 102 bool CloseConfirmedSession(const std::string& session_id);
|
D | security_delegate.h | 57 std::string* session_id, 61 virtual bool ConfirmPairing(const std::string& session_id, 67 virtual bool CancelPairing(const std::string& session_id,
|
/external/wpa_supplicant_8/hs20/client/ |
D | spp_client.c | 27 const char *session_id, 109 const char *session_id, in build_spp_post_dev_data() argument 126 if (session_id) in build_spp_post_dev_data() 128 session_id); in build_spp_post_dev_data() 328 const char *session_id, in hs20_spp_upload_mo() argument 353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo() 410 const char *session_id, in process_spp_user_input_response() argument 423 ctx, session_id, in process_spp_user_input_response() 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response() 438 const char *session_id) in hs20_spp_user_input_completed() argument [all …]
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
D | ServerHelloTest.java | 32 byte[] session_id = new byte[] { 1, 2, 3, 4, 5, 6, 7, 8, 9, 0 }; in testServerHello() 36 server_version, session_id, cipher_suite, (byte) 0); in testServerHello() 43 message.session_id, session_id)); in testServerHello() 60 message.session_id, message_2.session_id)); in testServerHello()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sake.c | 28 u8 session_id; member 134 sake->session_id = data->session_id; in eap_sake_build_msg() 368 u8 subtype, session_id, id; in eap_sake_process() local 380 session_id = req->session_id; in eap_sake_process() 384 "session_id %d", subtype, session_id); in eap_sake_process() 388 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() 390 session_id, data->session_id); in eap_sake_process() 394 data->session_id = session_id; in eap_sake_process()
|
D | eap_tls.c | 24 u8 *session_id; member 145 os_free(data->session_id); in eap_tls_deinit() 196 os_free(data->session_id); in eap_tls_success() 197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 200 if (data->session_id) { in eap_tls_success() 202 data->session_id, data->id_len); in eap_tls_success() 308 os_free(data->session_id); in eap_tls_init_for_reauth() 309 data->session_id = NULL; in eap_tls_init_for_reauth() 376 if (data->session_id == NULL) in eap_tls_get_session_id() 384 os_memcpy(id, data->session_id, data->id_len); in eap_tls_get_session_id()
|
/external/wpa_supplicant_8/src/fst/ |
D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() 161 session_id, in fst_ctrl_iface_notify() 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 178 id = strtoul(session_id, NULL, 0); in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 217 id = strtoul(session_id, &p, 0); in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 279 id = strtoul(session_id, NULL, 0); in session_remove() 297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() 262 session_id, data->session_id); in eap_sake_check()
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs() 373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp() 406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument 421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 654 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 859 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 889 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req() [all …]
|
/external/boringssl/src/ssl/ |
D | ssl_session.c | 195 OPENSSL_cleanse(session->session_id, sizeof(session->session_id)); in SSL_SESSION_free() 212 return session->session_id; in SSL_SESSION_get_id() 326 if (!RAND_bytes(session->session_id, session->session_id_length)) { in ssl_get_new_session() 364 SSL *ssl, SSL_SESSION **out_session, const uint8_t *session_id, in ssl_lookup_session() argument 379 memcpy(data.session_id, session_id, session_id_len); in ssl_lookup_session() 400 session = ssl->initial_ctx->get_session_cb(ssl, (uint8_t *)session_id, in ssl_lookup_session() 445 ctx->session_id, ctx->session_id_len)) { in ssl_get_prev_session() 452 ssl, &session, ctx->session_id, ctx->session_id_len); in ssl_get_prev_session()
|
D | ssl_asn1.c | 201 !CBB_add_bytes(&child, in->session_id, in SSL_SESSION_to_bytes_full() 545 CBS session_id, master_key; in SSL_SESSION_parse() local 546 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse() 547 CBS_len(&session_id) > SSL3_MAX_SSL_SESSION_ID_LENGTH || in SSL_SESSION_parse() 553 memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id)); in SSL_SESSION_parse() 554 ret->session_id_length = CBS_len(&session_id); in SSL_SESSION_parse()
|
/external/webrtc/talk/app/webrtc/ |
D | webrtcsessiondescriptionfactory.h | 95 const std::string& session_id); 104 const std::string& session_id); 113 const std::string& session_id); 154 const std::string& session_id,
|
D | webrtcsessiondescriptionfactory.cc | 139 const std::string& session_id, in WebRtcSessionDescriptionFactory() argument 151 session_id_(session_id), in WebRtcSessionDescriptionFactory() 162 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument 168 session_id, in WebRtcSessionDescriptionFactory() 178 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument 185 session_id, in WebRtcSessionDescriptionFactory() 210 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument 216 session_id, in WebRtcSessionDescriptionFactory()
|
D | jsepsessiondescription.h | 56 const std::string& session_id, 65 virtual std::string session_id() const { in session_id() function
|
/external/iproute2/ip/ |
D | ipl2tp.c | 43 uint32_t session_id; member 148 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); in create_session() 181 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); in delete_session() 223 p->session_id, p->tunnel_id); in print_session() 276 p->session_id = rta_getattr_u32(attrs[L2TP_ATTR_SESSION_ID]); in get_response() 376 if (p->config.tunnel_id && p->config.session_id) { in get_session() 378 addattr32(&req.n, 128, L2TP_ATTR_SESSION_ID, p->config.session_id); in get_session() 546 p->session_id = uval; in parse_args() 645 if ((p.session) && (p.session_id == 0)) in do_add() 691 if ((p.session) && (p.session_id == 0)) in do_del() [all …]
|
/external/libnfc-nxp/src/ |
D | phHciNfc_AdminMgmt.c | 96 uint8_t session_id[SESSIONID_LEN]; member 322 cmp_val = phOsalNfc_MemCompare(p_hw_config->session_id , in phHciNfc_Admin_Initialise() 323 p_hw_ref->session_id , in phHciNfc_Admin_Initialise() 324 sizeof(p_hw_ref->session_id)); in phHciNfc_Admin_Initialise() 495 SESSION_INDEX, (uint8_t *)(p_hw_config->session_id), in phHciNfc_Admin_Initialise() 496 sizeof(p_hw_config->session_id)); in phHciNfc_Admin_Initialise() 1164 p_admin_info->session_id[i] = reg_value[i]; in phHciNfc_Admin_InfoUpdate() 1165 pHwRef->session_id[i] = reg_value[i]; in phHciNfc_Admin_InfoUpdate()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_pwd_common.c | 310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument 324 session_id[0] = EAP_TYPE_PWD; in compute_keys() 339 eap_pwd_h_final(hash, &session_id[1]); in compute_keys() 358 session_id, SHA256_MAC_LEN + 1, in compute_keys()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_kay.c | 252 const u8 *session_id; in ieee802_1x_auth_get_session_id() local 255 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id() 256 if (session_id == NULL) { in ieee802_1x_auth_get_session_id() 268 os_memcpy(sid, session_id, need_len); in ieee802_1x_auth_get_session_id()
|
/external/tcpdump/ |
D | print-rpki-rtr.c | 43 u_char session_id[2]; /* Session id */ member 201 EXTRACT_16BITS(pdu_header->u.session_id), in rpki_rtr_pdu_print() 219 EXTRACT_16BITS(pdu_header->u.session_id))); in rpki_rtr_pdu_print()
|
/external/valgrind/auxprogs/ |
D | valgrind-di-server.c | 187 ULong session_id; member 768 conn_count, conn_state[conn_no].session_id, filename ); in handle_transaction() 789 res = mk_Frame_le64_le64("OPOK", conn_state[conn_no].session_id, in handle_transaction() 792 conn_count, conn_state[conn_no].session_id, filename ); in handle_transaction() 805 if (req_session_id != conn_state[conn_no].session_id) { in handle_transaction() 923 conn_count, conn_state[conn_no].session_id, in handle_transaction() 930 conn_count, conn_state[conn_no].session_id); in handle_transaction() 1190 conn_state[i].session_id = next_session_id++; in main() 1259 conn_count, conn_state[conn_no].session_id, in main()
|
/external/valgrind/coregrind/m_debuginfo/ |
D | image.c | 78 ULong session_id; member 487 vg_assert(img->source.session_id > 0); in set_CEnt() 489 = mk_Frame_le64_le64_le64("READ", img->source.session_id, off, len); in set_CEnt() 506 if (rx_session_id != img->source.session_id in set_CEnt() 708 ULong session_id = 0, size = 0; in ML_() local 709 if (!parse_Frame_le64_le64(res, "OPOK", &session_id, &size)) in ML_() 720 img->source.session_id = session_id; in ML_() 764 vg_assert(img->source.session_id == 0); in ML_() 770 vg_assert(img->source.session_id != 0); in ML_()
|