/hostap/src/fst/ |
D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() 297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() 320 static int session_respond(const char *session_id, char *buf, size_t buflen) in session_respond() 363 static int session_transfer(const char *session_id, char *buf, size_t buflen) in session_transfer() 387 static int session_teardown(const char *session_id, char *buf, size_t buflen) in session_teardown() 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; in fst_ctrl_iface_on_event() local
|
/hostap/src/eap_peer/ |
D | eap_sake.c | 28 u8 session_id; member 379 u8 subtype, session_id, id; in eap_sake_process() local
|
D | eap_tls.c | 24 u8 *session_id; member
|
D | eap_pwd.c | 54 u8 session_id[1 + SHA256_MAC_LEN]; member
|
D | eap_gpsk.c | 26 u8 session_id[128]; member
|
D | eap_peap.c | 58 u8 *session_id; member
|
D | eap_teap.c | 44 u8 *session_id; member
|
D | eap_fast.c | 56 u8 *session_id; member
|
D | eap_ttls.c | 58 u8 *session_id; member
|
D | eap.c | 692 u8 *session_id = NULL; in eap_peer_erp_init() local
|
/hostap/src/p2p/ |
D | p2p_pd.c | 512 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() 896 u32 session_id = 0; in p2p_process_prov_disc_req() local 1543 u32 session_id; in p2p_validate_p2ps_pd_resp() local
|
D | p2p.h | 241 u32 session_id; member
|
D | p2p_i.h | 792 const u8 *session_id; member
|
/hostap/src/eap_server/ |
D | eap_server_sake.c | 27 u8 session_id; member 241 u8 version, session_id, subtype; in eap_sake_check() local
|
D | eap_server_gpsk.c | 27 u8 session_id[128]; member
|
D | eap_server_pwd.c | 54 u8 session_id[1 + SHA256_MAC_LEN]; member
|
/hostap/src/ap/ |
D | authsrv.c | 118 char session_id[RADIUS_MAX_ATTR_LEN + 1] = ""; in hostapd_radius_log_acct_req() local
|
/hostap/src/eap_common/ |
D | eap_sake_common.h | 49 u8 session_id; member
|
D | eap_pwd_common.c | 334 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) in compute_keys()
|
/hostap/src/tls/ |
D | tlsv1_server_i.h | 24 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
|
D | tlsv1_client_i.h | 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; member
|
/hostap/src/eapol_supp/ |
D | eapol_supp_sm.c | 511 u8 *session_id, *emsk; in SM_STATE() local
|
/hostap/tests/hwsim/ |
D | wpasupplicant.py | 1490 def asp_provision(self, peer, adv_id, adv_mac, session_id, session_mac, argument
|