/third_party/ffmpeg/libavformat/ |
D | oggenc.c | 62 unsigned serial_num; ///< serial number member 113 bytestream_put_le32(&ptr, oggstream->serial_num); in ogg_write_page() 480 unsigned serial_num = i + ogg->serial_offset; in ogg_init() local 513 serial_num = av_get_random_seed(); in ogg_init() 516 if (serial_num == sc->serial_num) in ogg_init() 520 oggstream->serial_num = serial_num; in ogg_init()
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/ |
D | sctp_asconf.c | 627 uint32_t serial_num; in sctp_handle_asconf() local 647 serial_num = ntohl(cp->serial_number); in sctp_handle_asconf() 649 if (SCTP_TSN_GE(asoc->asconf_seq_in, serial_num)) { in sctp_handle_asconf() 653 serial_num); in sctp_handle_asconf() 655 } else if (serial_num != (asoc->asconf_seq_in + 1)) { in sctp_handle_asconf() 657 serial_num, asoc->asconf_seq_in + 1); in sctp_handle_asconf() 662 asoc->asconf_seq_in = serial_num; /* update sequence */ in sctp_handle_asconf() 667 asconf_limit, serial_num); in sctp_handle_asconf() 674 if (ack->serial_number == serial_num) in sctp_handle_asconf() 677 ack->serial_number, serial_num); in sctp_handle_asconf() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | authsrv.c | 180 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | tls_openssl.c | 1646 char *serial_num; in tls_connection_peer_serial_num() local 1657 serial_num = os_malloc(len); in tls_connection_peer_serial_num() 1658 if (!serial_num) in tls_connection_peer_serial_num() 1660 wpa_snprintf_hex_uppercase(serial_num, len, in tls_connection_peer_serial_num() 1663 return serial_num; in tls_connection_peer_serial_num() 2209 char serial_num[128]; in openssl_tls_cert_event() local 2240 wpa_snprintf_hex_uppercase(serial_num, sizeof(serial_num), in openssl_tls_cert_event() 2243 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 5165 char serial_num[128]; in openssl_debug_dump_certificate() local 5171 wpa_snprintf_hex_uppercase(serial_num, sizeof(serial_num), in openssl_debug_dump_certificate() [all …]
|
D | tls.h | 59 const char *serial_num; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | authsrv.c | 160 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_i.h | 161 char *serial_num; member
|
D | eap_server_tls.c | 209 if (sm->serial_num) { in eap_tls_buildReq() 214 sm->serial_num); in eap_tls_buildReq()
|
D | eap_server_tls_common.c | 364 if (!sm->serial_num && in eap_server_tls_phase1() 366 sm->serial_num = tls_connection_peer_serial_num( in eap_server_tls_phase1()
|
D | eap_server.c | 1903 os_free(sm->serial_num); in eap_server_sm_deinit() 1979 return sm->serial_num; in eap_get_serial_num()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | tls_openssl.c | 1659 char *serial_num; in tls_connection_peer_serial_num() local 1670 serial_num = os_malloc(len); in tls_connection_peer_serial_num() 1671 if (!serial_num) in tls_connection_peer_serial_num() 1673 wpa_snprintf_hex_uppercase(serial_num, len, in tls_connection_peer_serial_num() 1676 return serial_num; in tls_connection_peer_serial_num() 2225 char serial_num[128]; in openssl_tls_cert_event() local 2256 wpa_snprintf_hex_uppercase(serial_num, sizeof(serial_num), in openssl_tls_cert_event() 2259 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 5451 char serial_num[128]; in openssl_debug_dump_certificate() local 5460 wpa_snprintf_hex_uppercase(serial_num, sizeof(serial_num), in openssl_debug_dump_certificate() [all …]
|
D | tls.h | 59 const char *serial_num; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_tls_common.c | 362 if (!sm->serial_num && in eap_server_tls_phase1() 364 sm->serial_num = tls_connection_peer_serial_num(sm->ssl_ctx, in eap_server_tls_phase1()
|
D | eap_server_tls.c | 208 if (sm->serial_num) { in eap_tls_buildReq() 213 sm->serial_num); in eap_tls_buildReq()
|
D | eap_i.h | 162 char *serial_num; member
|
D | eap_server.c | 1923 os_free(sm->serial_num); in eap_server_sm_deinit() 2002 return sm->serial_num; in eap_get_serial_num()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 743 const char *serial_num; in db_update_last_msk() local 748 serial_num = eap_get_serial_num(sess->eap); in db_update_last_msk() 749 if (serial_num) { in db_update_last_msk() 750 id_len = 5 + os_strlen(serial_num) + 1; in db_update_last_msk() 754 os_snprintf(id_str, id_len, "cert-%s", serial_num); in db_update_last_msk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 910 const char *serial_num; in db_update_last_msk() local 915 serial_num = eap_get_serial_num(sess->eap); in db_update_last_msk() 916 if (serial_num) { in db_update_last_msk() 917 id_len = 5 + os_strlen(serial_num) + 1; in db_update_last_msk() 921 os_snprintf(id_str, id_len, "cert-%s", serial_num); in db_update_last_msk()
|