Home
last modified time | relevance | path

Searched refs:sess (Results 1 – 25 of 145) sorted by relevance

123456

/third_party/gstreamer/gstplugins_good/gst/rtpmanager/
Drtpsession.c127 static gboolean rtp_session_send_rtcp (RTPSession * sess,
129 static gboolean rtp_session_send_rtcp_with_deadline (RTPSession * sess,
136 static guint32 rtp_session_create_new_ssrc (RTPSession * sess);
137 static RTPSource *obtain_source (RTPSession * sess, guint32 ssrc,
139 static RTPSource *obtain_internal_source (RTPSession * sess,
141 static GstFlowReturn rtp_session_schedule_bye_locked (RTPSession * sess,
143 static GstClockTime calculate_rtcp_interval (RTPSession * sess,
656 rtp_session_init (RTPSession * sess) in rtp_session_init() argument
661 g_mutex_init (&sess->lock); in rtp_session_init()
662 sess->key = g_random_int (); in rtp_session_init()
[all …]
Drtpsession.h32 #define RTP_SESSION(sess) (G_TYPE_CHECK_INSTANCE_CAST((sess),RTP_TYPE_SESSION,RTPSession… argument
34 #define RTP_IS_SESSION(sess) (G_TYPE_CHECK_INSTANCE_TYPE((sess),RTP_TYPE_SESSION)) argument
36 #define RTP_SESSION_CAST(sess) ((RTPSession *)(sess)) argument
38 #define RTP_SESSION_LOCK(sess) (g_mutex_lock (&(sess)->lock)) argument
39 #define RTP_SESSION_UNLOCK(sess) (g_mutex_unlock (&(sess)->lock)) argument
54 typedef GstFlowReturn (*RTPSessionProcessRTP) (RTPSession *sess, RTPSource *src, GstBuffer *buffer,…
68 typedef GstFlowReturn (*RTPSessionSendRTP) (RTPSession *sess, RTPSource *src, gpointer data, gpoint…
83 typedef GstFlowReturn (*RTPSessionSendRTCP) (RTPSession *sess, RTPSource *src, GstBuffer *buffer,
97 typedef GstFlowReturn (*RTPSessionSyncRTCP) (RTPSession *sess, GstBuffer *buffer, gpointer user_dat…
109 typedef gint (*RTPSessionClockRate) (RTPSession *sess, guint8 payload, gpointer user_data);
[all …]
Dgstrtpsession.h65 GstCaps* (*request_pt_map) (GstRtpSession *sess, guint pt);
66 void (*clear_pt_map) (GstRtpSession *sess);
68 void (*on_new_ssrc) (GstRtpSession *sess, guint32 ssrc);
69 void (*on_ssrc_collision) (GstRtpSession *sess, guint32 ssrc);
70 void (*on_ssrc_validated) (GstRtpSession *sess, guint32 ssrc);
71 void (*on_ssrc_active) (GstRtpSession *sess, guint32 ssrc);
72 void (*on_ssrc_sdes) (GstRtpSession *sess, guint32 ssrc);
73 void (*on_bye_ssrc) (GstRtpSession *sess, guint32 ssrc);
74 void (*on_bye_timeout) (GstRtpSession *sess, guint32 ssrc);
75 void (*on_timeout) (GstRtpSession *sess, guint32 ssrc);
[all …]
Dgstrtpbin.c476 #define GST_RTP_SESSION_LOCK(sess) g_mutex_lock (&(sess)->lock) argument
477 #define GST_RTP_SESSION_UNLOCK(sess) g_mutex_unlock (&(sess)->lock) argument
561 GstRtpBinSession *sess = (GstRtpBinSession *) walk->data; in find_session_by_id() local
563 if (sess->id == id) in find_session_by_id()
564 return sess; in find_session_by_id()
582 GstRtpBinSession *sess = (GstRtpBinSession *) walk->data; in find_session_by_pad() local
584 if ((sess->recv_rtp_sink_ghost == pad) || in find_session_by_pad()
585 (sess->recv_rtcp_sink_ghost == pad) || in find_session_by_pad()
586 (sess->send_rtp_sink_ghost == pad) || in find_session_by_pad()
587 (sess->send_rtcp_src_ghost == pad) || pad_is_recv_fec (sess, pad)) in find_session_by_pad()
[all …]
Dgstrtpsession.c249 #define GST_RTP_SESSION_LOCK(sess) g_mutex_lock (&(sess)->priv->lock) argument
250 #define GST_RTP_SESSION_UNLOCK(sess) g_mutex_unlock (&(sess)->priv->lock) argument
252 #define GST_RTP_SESSION_WAIT(sess) g_cond_wait (&(sess)->priv->cond, &(sess)->priv->lock) argument
253 #define GST_RTP_SESSION_SIGNAL(sess) g_cond_signal (&(sess)->priv->cond) argument
292 static GstFlowReturn gst_rtp_session_process_rtp (RTPSession * sess,
294 static GstFlowReturn gst_rtp_session_send_rtp (RTPSession * sess,
296 static GstFlowReturn gst_rtp_session_send_rtcp (RTPSession * sess,
298 static GstFlowReturn gst_rtp_session_sync_rtcp (RTPSession * sess,
300 static gint gst_rtp_session_clock_rate (RTPSession * sess, guint8 payload,
302 static void gst_rtp_session_reconsider (RTPSession * sess, gpointer user_data);
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_eke_common.c303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument
314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key()
315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key()
319 temp, sess->prf_len); in eap_eke_derive_key()
329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key()
342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument
349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp()
359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp()
377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument
386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret()
[all …]
Deap_eke_common.h81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
83 void eap_eke_session_clean(struct eap_eke_session *sess);
85 int eap_eke_derive_key(struct eap_eke_session *sess,
89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub,
91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key,
93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess,
96 int eap_eke_derive_ka(struct eap_eke_session *sess,
100 int eap_eke_derive_msk(struct eap_eke_session *sess,
105 int eap_eke_prot(struct eap_eke_session *sess,
108 int eap_eke_decrypt_prot(struct eap_eke_session *sess,
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_eke_common.c303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument
314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key()
315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key()
319 temp, sess->prf_len); in eap_eke_derive_key()
329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key()
342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument
349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp()
359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp()
377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument
386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret()
[all …]
Deap_eke_common.h81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr,
83 void eap_eke_session_clean(struct eap_eke_session *sess);
85 int eap_eke_derive_key(struct eap_eke_session *sess,
89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub,
91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key,
93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess,
96 int eap_eke_derive_ka(struct eap_eke_session *sess,
100 int eap_eke_derive_msk(struct eap_eke_session *sess,
105 int eap_eke_prot(struct eap_eke_session *sess,
108 int eap_eke_decrypt_prot(struct eap_eke_session *sess,
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
Dradius_server.c284 void srv_log(struct radius_session *sess, const char *fmt, ...)
287 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument
304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log()
307 if (sess->server->db) { in srv_log()
314 sess->sess_id, sess->nas_ip, in srv_log()
315 sess->username, buf); in srv_log()
317 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log()
320 sqlite3_errmsg(sess->server->db)); in srv_log()
373 struct radius_session *sess = client->sessions; in radius_server_get_session() local
375 while (sess) { in radius_server_get_session()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
Dradius_server.c427 void srv_log(struct radius_session *sess, const char *fmt, ...)
430 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument
447 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log()
450 if (sess->server->db) { in srv_log()
457 sess->sess_id, sess->nas_ip, in srv_log()
458 sess->username, buf); in srv_log()
460 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log()
463 sqlite3_errmsg(sess->server->db)); in srv_log()
516 struct radius_session *sess = client->sessions; in radius_server_get_session() local
518 while (sess) { in radius_server_get_session()
[all …]
/third_party/openssl/crypto/modes/
Docb128.c233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv()
255 ocb_block_lshift(stretch + (bottom / 8), shift, ctx->sess.offset.c); in CRYPTO_ocb128_setiv()
258 ctx->sess.offset.c[15] |= in CRYPTO_ocb128_setiv()
277 all_num_blocks = num_blocks + ctx->sess.blocks_hashed; in CRYPTO_ocb128_aad()
280 for (i = ctx->sess.blocks_hashed + 1; i <= all_num_blocks; i++) { in CRYPTO_ocb128_aad()
287 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad()
293 ocb_block16_xor(&ctx->sess.offset_aad, &tmp, &tmp); in CRYPTO_ocb128_aad()
295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad()
306 ocb_block16_xor(&ctx->sess.offset_aad, &ctx->l_star, in CRYPTO_ocb128_aad()
307 &ctx->sess.offset_aad); in CRYPTO_ocb128_aad()
[all …]
/third_party/node/deps/openssl/openssl/crypto/modes/
Docb128.c233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv()
255 ocb_block_lshift(stretch + (bottom / 8), shift, ctx->sess.offset.c); in CRYPTO_ocb128_setiv()
258 ctx->sess.offset.c[15] |= in CRYPTO_ocb128_setiv()
277 all_num_blocks = num_blocks + ctx->sess.blocks_hashed; in CRYPTO_ocb128_aad()
280 for (i = ctx->sess.blocks_hashed + 1; i <= all_num_blocks; i++) { in CRYPTO_ocb128_aad()
287 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad()
293 ocb_block16_xor(&ctx->sess.offset_aad, &tmp, &tmp); in CRYPTO_ocb128_aad()
295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad()
306 ocb_block16_xor(&ctx->sess.offset_aad, &ctx->l_star, in CRYPTO_ocb128_aad()
307 &ctx->sess.offset_aad); in CRYPTO_ocb128_aad()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_eke.c29 struct eap_eke_session sess; member
104 eap_eke_session_clean(&data->sess); in eap_eke_reset()
253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit()
262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit()
277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit()
283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit()
284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit()
313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm()
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm()
326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_eke.c29 struct eap_eke_session sess; member
104 eap_eke_session_clean(&data->sess); in eap_eke_reset()
253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit()
262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit()
277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit()
283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit()
284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit()
313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm()
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm()
326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_eke.c27 struct eap_eke_session sess; member
136 eap_eke_session_clean(&data->sess); in eap_eke_deinit()
209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail()
283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id()
387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit()
394 pos, data->sess.dhcomp_len); in eap_eke_process_commit()
396 pos += data->sess.dhcomp_len; in eap_eke_process_commit()
403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit()
415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit()
422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_eke.c27 struct eap_eke_session sess; member
136 eap_eke_session_clean(&data->sess); in eap_eke_deinit()
209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail()
283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id()
387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit()
394 pos, data->sess.dhcomp_len); in eap_eke_process_commit()
396 pos += data->sess.dhcomp_len; in eap_eke_process_commit()
403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit()
415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit()
422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit()
[all …]
/third_party/openssl/engines/
De_devcrypto.c86 static int clean_devcrypto_session(session_op_t *sess) { in clean_devcrypto_session() argument
87 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { in clean_devcrypto_session()
91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session()
106 session_op_t sess; member
214 if (cipher_ctx->sess.ses != 0 && in cipher_init()
215 clean_devcrypto_session(&cipher_ctx->sess) == 0) in cipher_init()
218 cipher_ctx->sess.cipher = cipher_d->devcryptoid; in cipher_init()
219 cipher_ctx->sess.keylen = cipher_d->keylen; in cipher_init()
220 cipher_ctx->sess.key = (void *)key; in cipher_init()
225 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? in cipher_init()
[all …]
/third_party/node/deps/openssl/openssl/engines/
De_devcrypto.c86 static int clean_devcrypto_session(session_op_t *sess) { in clean_devcrypto_session() argument
87 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { in clean_devcrypto_session()
91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session()
106 session_op_t sess; member
214 if (cipher_ctx->sess.ses != 0 && in cipher_init()
215 clean_devcrypto_session(&cipher_ctx->sess) == 0) in cipher_init()
218 cipher_ctx->sess.cipher = cipher_d->devcryptoid; in cipher_init()
219 cipher_ctx->sess.keylen = cipher_d->keylen; in cipher_init()
220 cipher_ctx->sess.key = (void *)key; in cipher_init()
225 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? in cipher_init()
[all …]
/third_party/libwebsockets/lib/tls/openssl/
Dopenssl-session.c206 lws_tls_session_new_cb(SSL *ssl, SSL_SESSION *sess) in lws_tls_session_new_cb() argument
233 ttl = SSL_SESSION_get_timeout(sess); in lws_tls_session_new_cb()
272 ts->session = sess; in lws_tls_session_new_cb()
278 sess, wsi->lc.gutag, disposition, tag, ttl, vh->name, in lws_tls_session_new_cb()
315 SSL_SESSION *sess; in lws_sess_cache_synth_cb() local
320 sess = SSL_get1_session(tls->ssl); in lws_sess_cache_synth_cb()
321 if (!sess) in lws_sess_cache_synth_cb()
324 if (!SSL_SESSION_is_resumable(sess) || /* not worth caching, or... */ in lws_sess_cache_synth_cb()
325 !lws_tls_session_new_cb(tls->ssl, sess)) { /* ...cb didn't keep it */ in lws_sess_cache_synth_cb()
331 SSL_SESSION_free(sess); in lws_sess_cache_synth_cb()
[all …]
/third_party/openssl/test/
Dclienthellotest.c73 SSL_SESSION *sess = NULL; in test_client_hello() local
158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); in test_client_hello()
159 if (!TEST_ptr(sess)) { in test_client_hello()
167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) in test_client_hello()
168 || !TEST_true(SSL_set_session(con, sess))) in test_client_hello()
249 SSL_SESSION_free(sess); in test_client_hello()
/third_party/node/deps/openssl/openssl/apps/
Ds_server.c192 size_t identity_len, SSL_SESSION **sess) in psk_find_session_cb() argument
201 *sess = NULL; in psk_find_session_cb()
207 *sess = psksess; in psk_find_session_cb()
236 *sess = tmpsess; in psk_find_session_cb()
3694 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() local
3697 SSL_SESSION_get_id(session, &sess->idlen); in add_session()
3698 sess->derlen = i2d_SSL_SESSION(session, NULL); in add_session()
3699 if (sess->derlen < 0) { in add_session()
3701 OPENSSL_free(sess); in add_session()
3705 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session()
[all …]
/third_party/openssl/apps/
Ds_server.c192 size_t identity_len, SSL_SESSION **sess) in psk_find_session_cb() argument
201 *sess = NULL; in psk_find_session_cb()
207 *sess = psksess; in psk_find_session_cb()
236 *sess = tmpsess; in psk_find_session_cb()
3694 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() local
3697 SSL_SESSION_get_id(session, &sess->idlen); in add_session()
3698 sess->derlen = i2d_SSL_SESSION(session, NULL); in add_session()
3699 if (sess->derlen < 0) { in add_session()
3701 OPENSSL_free(sess); in add_session()
3705 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session()
[all …]
/third_party/openssl/ssl/statem/
Dextensions_srvr.c957 SSL_SESSION **sess) in tls_get_stateful_ticket() argument
980 *sess = tmpsess; in tls_get_stateful_ticket()
989 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local
1021 &sess)) { in tls_parse_ctos_psk()
1027 if(sess == NULL in tls_parse_ctos_psk()
1059 sess = SSL_SESSION_new(); in tls_parse_ctos_psk()
1060 if (sess == NULL in tls_parse_ctos_psk()
1061 || !SSL_SESSION_set1_master_key(sess, pskdata, in tls_parse_ctos_psk()
1063 || !SSL_SESSION_set_cipher(sess, cipher) in tls_parse_ctos_psk()
1064 || !SSL_SESSION_set_protocol_version(sess, in tls_parse_ctos_psk()
[all …]
/third_party/node/deps/openssl/openssl/ssl/statem/
Dextensions_srvr.c957 SSL_SESSION **sess) in tls_get_stateful_ticket() argument
980 *sess = tmpsess; in tls_get_stateful_ticket()
989 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local
1021 &sess)) { in tls_parse_ctos_psk()
1027 if(sess == NULL in tls_parse_ctos_psk()
1059 sess = SSL_SESSION_new(); in tls_parse_ctos_psk()
1060 if (sess == NULL in tls_parse_ctos_psk()
1061 || !SSL_SESSION_set1_master_key(sess, pskdata, in tls_parse_ctos_psk()
1063 || !SSL_SESSION_set_cipher(sess, cipher) in tls_parse_ctos_psk()
1064 || !SSL_SESSION_set_protocol_version(sess, in tls_parse_ctos_psk()
[all …]

123456