Home
last modified time | relevance | path

Searched refs:session_id (Results 1 – 25 of 87) sorted by relevance

1234

/external/wpa_supplicant_8/hs20/server/
Dspp_server.c48 const char *realm, const char *session_id,
441 const char *realm, const char *session_id, in db_get_session_val() argument
449 "id=%Q", field, session_id); in db_get_session_val()
453 field, user, realm, session_id); in db_get_session_val()
463 session_id, sqlite3_errmsg(ctx->db)); in db_get_session_val()
623 const char *session_id, in build_post_dev_data_response() argument
638 xml_node_add_attr(ctx->xml, spp_node, ns, "sessionID", session_id); in build_post_dev_data_response()
679 const char *session_id, in build_sub_rem_resp() argument
716 spp_node = build_post_dev_data_response(ctx, &ns, session_id, status, in build_sub_rem_resp()
733 hs20_eventlog_node(ctx, user, realm, session_id, in build_sub_rem_resp()
[all …]
Dsql-example.txt10 …,'remediation_url','https://subscription-server.osu.example.com/hs20/remediation.php?session_id=');
11 …ediation_url','https://subscription-server.osu.example.com/hs20/free-remediation.php?session_id=');
12 …ample.com','signup_url','https://subscription-server.osu.example.com/hs20/signup.php?session_id=');
/external/libweave/src/privet/
Dsecurity_manager_unittest.cc55 void(const std::string& session_id,
58 MOCK_METHOD1(OnPairingEnd, void(const std::string& session_id));
90 std::string session_id; in PairAndAuthenticate() local
94 CryptoType::kSpake_p224, &session_id, in PairAndAuthenticate()
96 EXPECT_FALSE(session_id.empty()); in PairAndAuthenticate()
104 EXPECT_TRUE(security_.ConfirmPairing(session_id, client_commitment_base64, in PairAndAuthenticate()
117 std::vector<uint8_t>{session_id.begin(), session_id.end()})}; in PairAndAuthenticate()
210 std::string session_id; in TEST_F() local
214 CryptoType::kSpake_p224, &session_id, in TEST_F()
216 EXPECT_FALSE(session_id.empty()); in TEST_F()
[all …]
Dsecurity_manager.cc258 std::string* session_id, in StartPairing() argument
314 *session_id = session; in StartPairing()
316 LOG(INFO) << "Pairing code for session " << *session_id << " is " << code; in StartPairing()
327 bool SecurityManager::ConfirmPairing(const std::string& session_id, in ConfirmPairing() argument
332 auto session = pending_sessions_.find(session_id); in ConfirmPairing()
335 "Unknown session id: '%s'", session_id.c_str()); in ConfirmPairing()
341 ClosePendingSession(session_id); in ConfirmPairing()
350 ClosePendingSession(session_id); in ConfirmPairing()
369 weak_ptr_factory_.GetWeakPtr(), session_id), in ConfirmPairing()
371 ClosePendingSession(session_id); in ConfirmPairing()
[all …]
Dsecurity_manager.h39 base::Callback<void(const std::string& session_id,
43 base::Callback<void(const std::string& session_id)>;
80 std::string* session_id,
84 bool ConfirmPairing(const std::string& session_id,
89 bool CancelPairing(const std::string& session_id, ErrorPtr* error) override;
101 bool ClosePendingSession(const std::string& session_id);
102 bool CloseConfirmedSession(const std::string& session_id);
Dsecurity_delegate.h57 std::string* session_id,
61 virtual bool ConfirmPairing(const std::string& session_id,
67 virtual bool CancelPairing(const std::string& session_id,
/external/wpa_supplicant_8/hs20/client/
Dspp_client.c27 const char *session_id,
109 const char *session_id, in build_spp_post_dev_data() argument
126 if (session_id) in build_spp_post_dev_data()
128 session_id); in build_spp_post_dev_data()
328 const char *session_id, in hs20_spp_upload_mo() argument
353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo()
410 const char *session_id, in process_spp_user_input_response() argument
423 ctx, session_id, in process_spp_user_input_response()
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response()
438 const char *session_id) in hs20_spp_user_input_completed() argument
[all …]
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
DServerHelloTest.java32 byte[] session_id = new byte[] { 1, 2, 3, 4, 5, 6, 7, 8, 9, 0 }; in testServerHello()
36 server_version, session_id, cipher_suite, (byte) 0); in testServerHello()
43 message.session_id, session_id)); in testServerHello()
60 message.session_id, message_2.session_id)); in testServerHello()
/external/wpa_supplicant_8/src/eap_peer/
Deap_sake.c28 u8 session_id; member
134 sake->session_id = data->session_id; in eap_sake_build_msg()
368 u8 subtype, session_id, id; in eap_sake_process() local
380 session_id = req->session_id; in eap_sake_process()
384 "session_id %d", subtype, session_id); in eap_sake_process()
388 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process()
390 session_id, data->session_id); in eap_sake_process()
394 data->session_id = session_id; in eap_sake_process()
Deap_tls.c24 u8 *session_id; member
145 os_free(data->session_id); in eap_tls_deinit()
196 os_free(data->session_id); in eap_tls_success()
197 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
200 if (data->session_id) { in eap_tls_success()
202 data->session_id, data->id_len); in eap_tls_success()
308 os_free(data->session_id); in eap_tls_init_for_reauth()
309 data->session_id = NULL; in eap_tls_init_for_reauth()
376 if (data->session_id == NULL) in eap_tls_get_session_id()
384 os_memcpy(id, data->session_id, data->id_len); in eap_tls_get_session_id()
/external/wpa_supplicant_8/src/fst/
Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify()
161 session_id, in fst_ctrl_iface_notify()
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
178 id = strtoul(session_id, NULL, 0); in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
217 id = strtoul(session_id, &p, 0); in session_set()
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
279 id = strtoul(session_id, NULL, 0); in session_remove()
297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_sake.c27 u8 session_id; member
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
76 data->session_id); in eap_sake_init()
109 sake->session_id = data->session_id; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
252 session_id = resp->session_id; in eap_sake_check()
260 if (session_id != data->session_id) { in eap_sake_check()
262 session_id, data->session_id); in eap_sake_check()
/external/wpa_supplicant_8/src/p2p/
Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs()
373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp()
406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument
421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov()
463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req()
566 u32 session_id = 0; in p2p_process_prov_disc_req() local
654 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req()
827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
859 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
889 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req()
[all …]
/external/boringssl/src/ssl/
Dssl_session.c195 OPENSSL_cleanse(session->session_id, sizeof(session->session_id)); in SSL_SESSION_free()
212 return session->session_id; in SSL_SESSION_get_id()
326 if (!RAND_bytes(session->session_id, session->session_id_length)) { in ssl_get_new_session()
364 SSL *ssl, SSL_SESSION **out_session, const uint8_t *session_id, in ssl_lookup_session() argument
379 memcpy(data.session_id, session_id, session_id_len); in ssl_lookup_session()
400 session = ssl->initial_ctx->get_session_cb(ssl, (uint8_t *)session_id, in ssl_lookup_session()
445 ctx->session_id, ctx->session_id_len)) { in ssl_get_prev_session()
452 ssl, &session, ctx->session_id, ctx->session_id_len); in ssl_get_prev_session()
Dssl_asn1.c201 !CBB_add_bytes(&child, in->session_id, in SSL_SESSION_to_bytes_full()
545 CBS session_id, master_key; in SSL_SESSION_parse() local
546 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse()
547 CBS_len(&session_id) > SSL3_MAX_SSL_SESSION_ID_LENGTH || in SSL_SESSION_parse()
553 memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id)); in SSL_SESSION_parse()
554 ret->session_id_length = CBS_len(&session_id); in SSL_SESSION_parse()
/external/webrtc/talk/app/webrtc/
Dwebrtcsessiondescriptionfactory.h95 const std::string& session_id);
104 const std::string& session_id);
113 const std::string& session_id);
154 const std::string& session_id,
Dwebrtcsessiondescriptionfactory.cc139 const std::string& session_id, in WebRtcSessionDescriptionFactory() argument
151 session_id_(session_id), in WebRtcSessionDescriptionFactory()
162 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument
168 session_id, in WebRtcSessionDescriptionFactory()
178 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument
185 session_id, in WebRtcSessionDescriptionFactory()
210 const std::string& session_id) in WebRtcSessionDescriptionFactory() argument
216 session_id, in WebRtcSessionDescriptionFactory()
Djsepsessiondescription.h56 const std::string& session_id,
65 virtual std::string session_id() const { in session_id() function
/external/iproute2/ip/
Dipl2tp.c43 uint32_t session_id; member
148 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); in create_session()
181 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); in delete_session()
223 p->session_id, p->tunnel_id); in print_session()
276 p->session_id = rta_getattr_u32(attrs[L2TP_ATTR_SESSION_ID]); in get_response()
376 if (p->config.tunnel_id && p->config.session_id) { in get_session()
378 addattr32(&req.n, 128, L2TP_ATTR_SESSION_ID, p->config.session_id); in get_session()
546 p->session_id = uval; in parse_args()
645 if ((p.session) && (p.session_id == 0)) in do_add()
691 if ((p.session) && (p.session_id == 0)) in do_del()
[all …]
/external/libnfc-nxp/src/
DphHciNfc_AdminMgmt.c96 uint8_t session_id[SESSIONID_LEN]; member
322 cmp_val = phOsalNfc_MemCompare(p_hw_config->session_id , in phHciNfc_Admin_Initialise()
323 p_hw_ref->session_id , in phHciNfc_Admin_Initialise()
324 sizeof(p_hw_ref->session_id)); in phHciNfc_Admin_Initialise()
495 SESSION_INDEX, (uint8_t *)(p_hw_config->session_id), in phHciNfc_Admin_Initialise()
496 sizeof(p_hw_config->session_id)); in phHciNfc_Admin_Initialise()
1164 p_admin_info->session_id[i] = reg_value[i]; in phHciNfc_Admin_InfoUpdate()
1165 pHwRef->session_id[i] = reg_value[i]; in phHciNfc_Admin_InfoUpdate()
/external/wpa_supplicant_8/src/eap_common/
Deap_pwd_common.c310 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys() argument
324 session_id[0] = EAP_TYPE_PWD; in compute_keys()
339 eap_pwd_h_final(hash, &session_id[1]); in compute_keys()
358 session_id, SHA256_MAC_LEN + 1, in compute_keys()
/external/wpa_supplicant_8/wpa_supplicant/
Dwpas_kay.c252 const u8 *session_id; in ieee802_1x_auth_get_session_id() local
255 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id()
256 if (session_id == NULL) { in ieee802_1x_auth_get_session_id()
268 os_memcpy(sid, session_id, need_len); in ieee802_1x_auth_get_session_id()
/external/tcpdump/
Dprint-rpki-rtr.c43 u_char session_id[2]; /* Session id */ member
201 EXTRACT_16BITS(pdu_header->u.session_id), in rpki_rtr_pdu_print()
219 EXTRACT_16BITS(pdu_header->u.session_id))); in rpki_rtr_pdu_print()
/external/valgrind/auxprogs/
Dvalgrind-di-server.c187 ULong session_id; member
768 conn_count, conn_state[conn_no].session_id, filename ); in handle_transaction()
789 res = mk_Frame_le64_le64("OPOK", conn_state[conn_no].session_id, in handle_transaction()
792 conn_count, conn_state[conn_no].session_id, filename ); in handle_transaction()
805 if (req_session_id != conn_state[conn_no].session_id) { in handle_transaction()
923 conn_count, conn_state[conn_no].session_id, in handle_transaction()
930 conn_count, conn_state[conn_no].session_id); in handle_transaction()
1190 conn_state[i].session_id = next_session_id++; in main()
1259 conn_count, conn_state[conn_no].session_id, in main()
/external/valgrind/coregrind/m_debuginfo/
Dimage.c78 ULong session_id; member
487 vg_assert(img->source.session_id > 0); in set_CEnt()
489 = mk_Frame_le64_le64_le64("READ", img->source.session_id, off, len); in set_CEnt()
506 if (rx_session_id != img->source.session_id in set_CEnt()
708 ULong session_id = 0, size = 0; in ML_() local
709 if (!parse_Frame_le64_le64(res, "OPOK", &session_id, &size)) in ML_()
720 img->source.session_id = session_id; in ML_()
764 vg_assert(img->source.session_id == 0); in ML_()
770 vg_assert(img->source.session_id != 0); in ML_()

1234