/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 73 unsigned int sess_id; member 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 371 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument 376 if (sess->sess_id == sess_id) { in radius_server_get_session() 433 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout() 443 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout() 466 sess->sess_id = data->next_sess_id++; in radius_server_new_session() 658 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session() 902 unsigned int sess_id; in radius_server_encapsulate_eap() local [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 78 unsigned int sess_id; member 447 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 457 sess->sess_id, sess->nas_ip, in srv_log() 514 radius_server_get_session(struct radius_client *client, unsigned int sess_id) in radius_server_get_session() argument 519 if (sess->sess_id == sess_id) { in radius_server_get_session() 576 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id); in radius_server_session_remove_timeout() 586 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id); in radius_server_session_timeout() 609 sess->sess_id = data->next_sess_id++; in radius_server_new_session() 825 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id); in radius_server_get_new_session() 1069 unsigned int sess_id; in radius_server_encapsulate_eap() local [all …]
|
/third_party/openssl/doc/man1/ |
D | openssl-cmds.pod.in | 48 sess_id, 129 L<openssl-sess_id(1)>,
|
D | openssl-sess_id.pod.in | 6 openssl-sess_id - SSL/TLS session handling command 10 B<openssl> B<sess_id>
|
D | build.info | 46 DEPEND[openssl-sess_id.pod]=../perlvars.pm
|
D | openssl.pod | 256 =item B<sess_id> 799 L<openssl-sess_id(1)>,
|
D | openssl-s_server.pod.in | 894 The session parameters can printed out using the L<openssl-sess_id(1)> command. 912 L<openssl-sess_id(1)>,
|
D | openssl-s_client.pod.in | 893 L<openssl-sess_id(1)>,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | eapol_test.c | 365 const u8 *sess_id; in eapol_test_compare_pmk() local 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 396 if (!sess_id) in eapol_test_compare_pmk() 404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
D | ctrl_iface.c | 2043 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local 2301 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2302 if (sess_id) { in wpa_supplicant_ctrl_iface_status() 2309 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | eapol_test.c | 365 const u8 *sess_id; in eapol_test_compare_pmk() local 395 sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); in eapol_test_compare_pmk() 396 if (!sess_id) in eapol_test_compare_pmk() 404 os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) in eapol_test_compare_pmk() 408 wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); in eapol_test_compare_pmk()
|
D | ctrl_iface.c | 2213 const u8 *sess_id; in wpa_supplicant_ctrl_iface_status() local 2475 sess_id = eapol_sm_get_session_id(wpa_s->eapol, &sess_id_len); in wpa_supplicant_ctrl_iface_status() 2476 if (sess_id) { in wpa_supplicant_ctrl_iface_status() 2483 ret = wpa_snprintf_hex(pos, end - pos, sess_id, sess_id_len); in wpa_supplicant_ctrl_iface_status()
|
/third_party/gstreamer/gstplugins_base/gst-libs/gst/sdp/ |
D | gstsdpmessage.c | 204 FREE_STRING (origin->sess_id); in gst_sdp_origin_init() 357 gst_sdp_message_set_origin (cp, msg->origin.username, msg->origin.sess_id, in gst_sdp_message_copy() 508 if (msg->origin.sess_id && msg->origin.sess_version && msg->origin.nettype && in gst_sdp_message_as_text() 511 msg->origin.username ? msg->origin.username : "-", msg->origin.sess_id, in gst_sdp_message_as_text() 825 const gchar * sess_id, const gchar * sess_version, const gchar * nettype, in gst_sdp_message_set_origin() argument 831 REPLACE_STRING (msg->origin.sess_id, sess_id); in gst_sdp_message_set_origin() 3003 READ_STRING (c->msg->origin.sess_id); in gst_sdp_parse_line() 3293 g_print (" sess_id: '%s'\n", GST_STR_NULL (msg->origin.sess_id)); in gst_sdp_message_dump()
|
D | gstsdpmessage.h | 74 gchar *sess_id; member 374 … const gchar *sess_id, const gchar *sess_version,
|
/third_party/openssl/apps/ |
D | build.info | 19 s_client.c s_server.c s_time.c sess_id.c smime.c speed.c \
|
/third_party/openssl/ssl/ |
D | ssl_sess.c | 480 SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, in lookup_sess_in_cache() argument 493 memcpy(data.session_id, sess_id, sess_id_len); in lookup_sess_in_cache() 511 ret = s->session_ctx->get_session_cb(s, sess_id, sess_id_len, ©); in lookup_sess_in_cache()
|
D | ssl_local.h | 2388 __owur SSL_SESSION *lookup_sess_in_cache(SSL *s, const unsigned char *sess_id, 2679 const unsigned char *sess_id,
|
D | t1_lib.c | 1782 size_t eticklen, const unsigned char *sess_id, in tls_decrypt_ticket() argument 1961 memcpy(sess->session_id, sess_id, sesslen); in tls_decrypt_ticket()
|
/third_party/openssl/test/helpers/ |
D | handshake.c | 1409 const unsigned char* sess_id = NULL; in do_handshake_internal() local 1628 sess_id = SSL_SESSION_get_id(sess, &sess_id_len); in do_handshake_internal() 1637 if (sess_id == NULL || sess_id_len == 0) in do_handshake_internal()
|
/third_party/gstreamer/gstplugins_bad/ext/webrtc/ |
D | gstwebrtcbin.c | 3343 gchar *v, *sess_id; in _create_offer_task() local 3347 sess_id = g_strdup (origin->sess_id); in _create_offer_task() 3349 sess_id = g_strdup_printf ("%" G_GUINT64_FORMAT, RANDOM_SESSION_ID); in _create_offer_task() 3351 gst_sdp_message_set_origin (ret, "-", sess_id, v, "IN", "IP4", "0.0.0.0"); in _create_offer_task() 3352 g_free (sess_id); in _create_offer_task() 3841 gst_sdp_message_set_origin (ret, "-", offer_origin->sess_id, in _create_answer_task()
|
/third_party/openssl/doc/ |
D | build.info | 277 DEPEND[html/man1/openssl-sess_id.html]=man1/openssl-sess_id.pod 278 GENERATE[html/man1/openssl-sess_id.html]=man1/openssl-sess_id.pod 279 DEPEND[man/man1/openssl-sess_id.1]=man1/openssl-sess_id.pod 280 GENERATE[man/man1/openssl-sess_id.1]=man1/openssl-sess_id.pod 281 DEPEND[man1/openssl-sess_id.pod]{pod}=man1/openssl-sess_id.pod.in 282 GENERATE[man1/openssl-sess_id.pod]=man1/openssl-sess_id.pod.in 397 html/man1/openssl-sess_id.html \ 457 man/man1/openssl-sess_id.1 \
|
/third_party/gstreamer/gstplugins_bad/tests/check/elements/ |
D | webrtcbin.c | 2881 fail_unless_equals_string (previous_origin->sess_id, our_origin->sess_id); in sdp_equal_session_id() 3442 origin->username, origin->sess_id, origin->sess_version, in offer_remove_last_media()
|
/third_party/openssl/ |
D | BUILD.gn | 1752 "apps/sess_id.c",
|
D | CHANGES.md | 4592 * New output format NSS in the sess_id command line tool. This allows
|
/third_party/gstreamer/gstplugins_good/gst/rtsp/ |
D | gstrtspsrc.c | 9971 GST_STR_NULL (msg->origin.sess_id)); in gst_rtspsrc_print_sdp_message()
|