/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 28 u8 session_id; member in struct:eap_sake_data 133 sake->session_id = data->session_id; 375 u8 subtype, session_id, id; local 387 session_id = req->session_id; 391 "session_id %d", subtype, session_id); 395 if (data->session_id_set && data->session_id != session_id) { [all...] |
eap_gpsk.c | 26 u8 session_id[128]; member in struct:eap_gpsk_data 384 data->session_id, &data->id_len) < 0) { 391 data->session_id, data->id_len); 756 sid = os_memdup(data->session_id, data->id_len);
|
eap_pwd.c | 48 u8 session_id[1 + SHA256_MAC_LEN]; member in struct:eap_pwd_data 204 id = os_memdup(data->session_id, 1 + SHA256_MAC_LEN); 762 &cs, data->msk, data->emsk, data->session_id) < 0) {
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 27 u8 session_id[128]; member in struct:eap_gpsk_data 428 data->session_id, &data->id_len) < 0) { 434 data->session_id, data->id_len); 618 sid = os_memdup(data->session_id, data->id_len);
|
eap_server_sake.c | 27 u8 session_id; member in struct:eap_sake_data 70 if (os_get_random(&data->session_id, 1)) { 76 data->session_id); 109 sake->session_id = data->session_id; 241 u8 version, session_id, subtype; local 252 session_id = resp->session_id; 260 if (session_id != data->session_id) { [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_client
|
tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_kay.c | 261 const u8 *session_id; local 264 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); 265 if (session_id == NULL) { 277 os_memcpy(sid, session_id, need_len);
|
/hardware/qcom/audio/hal/ |
voice.c | 275 uint32_t session_id; local 277 ret = voice_extn_get_active_session_id(adev, &session_id); 279 session_id = VOICE_VSID; 281 return session_id; 288 uint32_t session_id; local 312 session_id = voice_get_active_session_id(adev); 314 session_id, rec_mode);
|
/hardware/qcom/audio/hal/voice_extn/ |
voice_extn.c | 144 uint32_t session_id = 0; local 149 session_id = session->vsid; 154 return session_id; 330 uint32_t *session_id) 332 *session_id = get_session_id_with_state(adev, CALL_ACTIVE);
|
/hardware/qcom/audio/post_proc/ |
ma_listener.c | 72 uint32_t session_id; member in struct:ma_listener_context_s 204 __func__, context->session_id, temp_vol, stream_type); 491 int32_t session_id, 537 context->session_id = session_id;
|
/hardware/qcom/camera/msm8998/QCamera2/stack/mm-jpeg-interface/test/ |
mm_jpegdec_test.c | 94 uint32_t session_id; member in struct:__anon49380 406 &jpeg_obj.job.decode_job.session_id); 407 if (jpeg_obj.job.decode_job.session_id == 0) { 440 jpeg_obj.ops.destroy_session(jpeg_obj.job.decode_job.session_id);
|
mm_jpeg_test.c | 130 uint32_t session_id; member in struct:__anon49378 490 &jpeg_obj->job.encode_job.session_id); 491 if (jpeg_obj->job.encode_job.session_id == 0) { 524 jpeg_obj->ops.destroy_session(jpeg_obj->job.encode_job.session_id);
|
/hardware/qcom/msm8960/original-kernel-headers/linux/ |
msm_rotator.h | 27 uint32_t session_id; member in struct:msm_rotator_buf_sync 34 unsigned int session_id; member in struct:msm_rotator_img_info 47 int session_id; member in struct:msm_rotator_data_info
|
/system/nfc/src/nfa/hci/ |
nfa_hci_main.cc | 419 memcpy(nfa_hci_cb.cfg.admin_gate.session_id, p_session_id, 860 uint8_t session_id[NFA_HCI_SESSION_ID_LEN]; local 872 (!(memcmp(nfa_hci_cb.cfg.admin_gate.session_id, default_session [all...] |
/bionic/libc/kernel/uapi/linux/ |
ppp-ioctl.h | 65 __u16 session_id; member in struct:pppol2tp_ioc_stats
|
/device/google/marlin/camera/QCamera2/stack/mm-jpeg-interface/test/ |
mm_jpeg_test.c | 130 uint32_t session_id; member in struct:__anon2562 484 &jpeg_obj->job.encode_job.session_id); 485 if (jpeg_obj->job.encode_job.session_id == 0) { 518 jpeg_obj->ops.destroy_session(jpeg_obj->job.encode_job.session_id);
|
/external/boringssl/src/ssl/ |
ssl_asn1.cc | 213 !CBB_add_asn1_octet_string(&session, in->session_id, 567 CBS session_id, master_key; local 568 if (!CBS_get_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING) || 569 CBS_len(&session_id) > SSL3_MAX_SSL_SESSION_ID_LENGTH || 575 OPENSSL_memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id)); 576 ret->session_id_length = CBS_len(&session_id);
|
tls13_client.cc | 73 CBS body = msg.body, extensions, server_random, session_id; local 78 !CBS_get_u8_length_prefixed(&body, &session_id) || 79 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) || 222 CBS body = msg.body, server_random, session_id, extensions; local 228 !CBS_get_u8_length_prefixed(&body, &session_id) || 229 !CBS_mem_equal(&session_id, hs->session_id, hs->session_id_len) ||
|
tls13_server.cc | 234 OPENSSL_memcpy(hs->session_id, client_hello.session_id, 493 CBB body, session_id, extensions; local 498 !CBB_add_u8_length_prefixed(&body, &session_id) || 499 !CBB_add_bytes(&session_id, hs->session_id, hs->session_id_len) || 563 CBB body, extensions, session_id; local 568 !CBB_add_u8_length_prefixed(&body, &session_id) || 569 !CBB_add_bytes(&session_id, hs->session_id, hs->session_id_len) | [all...] |
/external/iproute2/ip/ |
ipl2tp.c | 43 uint32_t session_id; member in struct:l2tp_parm 158 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); 200 addattr32(&req.n, 1024, L2TP_ATTR_SESSION_ID, p->session_id); 265 p->session_id, p->tunnel_id); 326 p->session_id = rta_getattr_u32(attrs[L2TP_ATTR_SESSION_ID]); 434 if (p->config.tunnel_id && p->config.session_id) { 437 p->config.session_id); 502 " session_id ID peer_session_id ID\n" 508 " ip l2tp del session tunnel_id ID session_id ID\n" 510 " ip l2tp show session [ tunnel_id ID ] [ session_id ID ]\n [all...] |
/external/kernel-headers/original/uapi/linux/ |
ppp-ioctl.h | 70 __u16 session_id; /* if zero, get tunnel stats */ member in struct:pppol2tp_ioc_stats 71 __u32 using_ipsec:1; /* valid only for session_id == 0 */
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); 373 p2p_buf_add_session_id(buf, prov->session_id, 406 u32 session_id, u16 method, 421 tmp->session_id = session_id; 463 P2PS_PD_REQ_CHECK(1, session_id); 566 u32 session_id = 0; local 654 session_id = WPA_GET_LE32(msg.session_id); 827 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, 1201 u32 session_id; local [all...] |
/external/libusb/libusb/os/ |
sunos_usb.c | 180 uint64_t session_id = 0; local 213 session_id |= (bdf << i * 8); 234 session_id |= ((addr_prop[0] & 0xff) << i * 8); 242 dev = usbi_get_device_by_session_id(nargs->ctx, session_id); 244 dev = usbi_alloc_device(nargs->ctx, session_id); 291 devpriv->ugenpath, path, (uint64_t)session_id, [all...] |
wince_usb.c | 283 unsigned long session_id; local 297 success = UkwGetDeviceAddress(devices[i], &bus_addr, &dev_addr, &session_id); 304 dev = usbi_get_device_by_session_id(ctx, session_id); 307 bus_addr, dev_addr, session_id); 314 bus_addr, dev_addr, session_id); 315 dev = usbi_alloc_device(ctx, session_id);
|