/third_party/gstreamer/gstplugins_good/gst/rtpmanager/ |
D | rtpsession.c | 127 static gboolean rtp_session_send_rtcp (RTPSession * sess, 129 static gboolean rtp_session_send_rtcp_with_deadline (RTPSession * sess, 136 static guint32 rtp_session_create_new_ssrc (RTPSession * sess); 137 static RTPSource *obtain_source (RTPSession * sess, guint32 ssrc, 139 static RTPSource *obtain_internal_source (RTPSession * sess, 141 static GstFlowReturn rtp_session_schedule_bye_locked (RTPSession * sess, 143 static GstClockTime calculate_rtcp_interval (RTPSession * sess, 656 rtp_session_init (RTPSession * sess) in rtp_session_init() argument 661 g_mutex_init (&sess->lock); in rtp_session_init() 662 sess->key = g_random_int (); in rtp_session_init() [all …]
|
D | rtpsession.h | 32 #define RTP_SESSION(sess) (G_TYPE_CHECK_INSTANCE_CAST((sess),RTP_TYPE_SESSION,RTPSession… argument 34 #define RTP_IS_SESSION(sess) (G_TYPE_CHECK_INSTANCE_TYPE((sess),RTP_TYPE_SESSION)) argument 36 #define RTP_SESSION_CAST(sess) ((RTPSession *)(sess)) argument 38 #define RTP_SESSION_LOCK(sess) (g_mutex_lock (&(sess)->lock)) argument 39 #define RTP_SESSION_UNLOCK(sess) (g_mutex_unlock (&(sess)->lock)) argument 54 typedef GstFlowReturn (*RTPSessionProcessRTP) (RTPSession *sess, RTPSource *src, GstBuffer *buffer,… 68 typedef GstFlowReturn (*RTPSessionSendRTP) (RTPSession *sess, RTPSource *src, gpointer data, gpoint… 83 typedef GstFlowReturn (*RTPSessionSendRTCP) (RTPSession *sess, RTPSource *src, GstBuffer *buffer, 97 typedef GstFlowReturn (*RTPSessionSyncRTCP) (RTPSession *sess, GstBuffer *buffer, gpointer user_dat… 109 typedef gint (*RTPSessionClockRate) (RTPSession *sess, guint8 payload, gpointer user_data); [all …]
|
D | gstrtpsession.h | 65 GstCaps* (*request_pt_map) (GstRtpSession *sess, guint pt); 66 void (*clear_pt_map) (GstRtpSession *sess); 68 void (*on_new_ssrc) (GstRtpSession *sess, guint32 ssrc); 69 void (*on_ssrc_collision) (GstRtpSession *sess, guint32 ssrc); 70 void (*on_ssrc_validated) (GstRtpSession *sess, guint32 ssrc); 71 void (*on_ssrc_active) (GstRtpSession *sess, guint32 ssrc); 72 void (*on_ssrc_sdes) (GstRtpSession *sess, guint32 ssrc); 73 void (*on_bye_ssrc) (GstRtpSession *sess, guint32 ssrc); 74 void (*on_bye_timeout) (GstRtpSession *sess, guint32 ssrc); 75 void (*on_timeout) (GstRtpSession *sess, guint32 ssrc); [all …]
|
D | gstrtpbin.c | 476 #define GST_RTP_SESSION_LOCK(sess) g_mutex_lock (&(sess)->lock) argument 477 #define GST_RTP_SESSION_UNLOCK(sess) g_mutex_unlock (&(sess)->lock) argument 561 GstRtpBinSession *sess = (GstRtpBinSession *) walk->data; in find_session_by_id() local 563 if (sess->id == id) in find_session_by_id() 564 return sess; in find_session_by_id() 582 GstRtpBinSession *sess = (GstRtpBinSession *) walk->data; in find_session_by_pad() local 584 if ((sess->recv_rtp_sink_ghost == pad) || in find_session_by_pad() 585 (sess->recv_rtcp_sink_ghost == pad) || in find_session_by_pad() 586 (sess->send_rtp_sink_ghost == pad) || in find_session_by_pad() 587 (sess->send_rtcp_src_ghost == pad) || pad_is_recv_fec (sess, pad)) in find_session_by_pad() [all …]
|
D | gstrtpsession.c | 249 #define GST_RTP_SESSION_LOCK(sess) g_mutex_lock (&(sess)->priv->lock) argument 250 #define GST_RTP_SESSION_UNLOCK(sess) g_mutex_unlock (&(sess)->priv->lock) argument 252 #define GST_RTP_SESSION_WAIT(sess) g_cond_wait (&(sess)->priv->cond, &(sess)->priv->lock) argument 253 #define GST_RTP_SESSION_SIGNAL(sess) g_cond_signal (&(sess)->priv->cond) argument 292 static GstFlowReturn gst_rtp_session_process_rtp (RTPSession * sess, 294 static GstFlowReturn gst_rtp_session_send_rtp (RTPSession * sess, 296 static GstFlowReturn gst_rtp_session_send_rtcp (RTPSession * sess, 298 static GstFlowReturn gst_rtp_session_sync_rtcp (RTPSession * sess, 300 static gint gst_rtp_session_clock_rate (RTPSession * sess, guint8 payload, 302 static void gst_rtp_session_reconsider (RTPSession * sess, gpointer user_data); [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_eke_common.c | 303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 319 temp, sess->prf_len); in eap_eke_derive_key() 329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret() [all …]
|
D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_eke_common.c | 303 int eap_eke_derive_key(struct eap_eke_session *sess, in eap_eke_derive_key() argument 314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 319 temp, sess->prf_len); in eap_eke_derive_key() 329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 342 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, in eap_eke_dhcomp() argument 349 dh_len = eap_eke_dh_len(sess->dhgroup); in eap_eke_dhcomp() 359 if (sess->encr != EAP_EKE_ENCR_AES128_CBC) in eap_eke_dhcomp() 377 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, in eap_eke_shared_secret() argument 386 dh = eap_eke_dh_group(sess->dhgroup); in eap_eke_shared_secret() [all …]
|
D | eap_eke_common.h | 81 int eap_eke_session_init(struct eap_eke_session *sess, u8 dhgroup, u8 encr, 83 void eap_eke_session_clean(struct eap_eke_session *sess); 85 int eap_eke_derive_key(struct eap_eke_session *sess, 89 int eap_eke_dhcomp(struct eap_eke_session *sess, const u8 *key, const u8 *dhpub, 91 int eap_eke_shared_secret(struct eap_eke_session *sess, const u8 *key, 93 int eap_eke_derive_ke_ki(struct eap_eke_session *sess, 96 int eap_eke_derive_ka(struct eap_eke_session *sess, 100 int eap_eke_derive_msk(struct eap_eke_session *sess, 105 int eap_eke_prot(struct eap_eke_session *sess, 108 int eap_eke_decrypt_prot(struct eap_eke_session *sess, [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 284 void srv_log(struct radius_session *sess, const char *fmt, ...) 287 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 304 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 307 if (sess->server->db) { in srv_log() 314 sess->sess_id, sess->nas_ip, in srv_log() 315 sess->username, buf); in srv_log() 317 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 320 sqlite3_errmsg(sess->server->db)); in srv_log() 373 struct radius_session *sess = client->sessions; in radius_server_get_session() local 375 while (sess) { in radius_server_get_session() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 427 void srv_log(struct radius_session *sess, const char *fmt, ...) 430 void srv_log(struct radius_session *sess, const char *fmt, ...) in srv_log() argument 447 RADIUS_DEBUG("[0x%x %s] %s", sess->sess_id, sess->nas_ip, buf); in srv_log() 450 if (sess->server->db) { in srv_log() 457 sess->sess_id, sess->nas_ip, in srv_log() 458 sess->username, buf); in srv_log() 460 if (sqlite3_exec(sess->server->db, sql, NULL, NULL, in srv_log() 463 sqlite3_errmsg(sess->server->db)); in srv_log() 516 struct radius_session *sess = client->sessions; in radius_server_get_session() local 518 while (sess) { in radius_server_get_session() [all …]
|
/third_party/openssl/crypto/modes/ |
D | ocb128.c | 233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 255 ocb_block_lshift(stretch + (bottom / 8), shift, ctx->sess.offset.c); in CRYPTO_ocb128_setiv() 258 ctx->sess.offset.c[15] |= in CRYPTO_ocb128_setiv() 277 all_num_blocks = num_blocks + ctx->sess.blocks_hashed; in CRYPTO_ocb128_aad() 280 for (i = ctx->sess.blocks_hashed + 1; i <= all_num_blocks; i++) { in CRYPTO_ocb128_aad() 287 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() 293 ocb_block16_xor(&ctx->sess.offset_aad, &tmp, &tmp); in CRYPTO_ocb128_aad() 295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 306 ocb_block16_xor(&ctx->sess.offset_aad, &ctx->l_star, in CRYPTO_ocb128_aad() 307 &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/modes/ |
D | ocb128.c | 233 memset(&ctx->sess, 0, sizeof(ctx->sess)); in CRYPTO_ocb128_setiv() 255 ocb_block_lshift(stretch + (bottom / 8), shift, ctx->sess.offset.c); in CRYPTO_ocb128_setiv() 258 ctx->sess.offset.c[15] |= in CRYPTO_ocb128_setiv() 277 all_num_blocks = num_blocks + ctx->sess.blocks_hashed; in CRYPTO_ocb128_aad() 280 for (i = ctx->sess.blocks_hashed + 1; i <= all_num_blocks; i++) { in CRYPTO_ocb128_aad() 287 ocb_block16_xor(&ctx->sess.offset_aad, lookup, &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() 293 ocb_block16_xor(&ctx->sess.offset_aad, &tmp, &tmp); in CRYPTO_ocb128_aad() 295 ocb_block16_xor(&tmp, &ctx->sess.sum, &ctx->sess.sum); in CRYPTO_ocb128_aad() 306 ocb_block16_xor(&ctx->sess.offset_aad, &ctx->l_star, in CRYPTO_ocb128_aad() 307 &ctx->sess.offset_aad); in CRYPTO_ocb128_aad() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_eke.c | 29 struct eap_eke_session sess; member 104 eap_eke_session_clean(&data->sess); in eap_eke_reset() 253 if (eap_eke_derive_key(&data->sess, sm->user->password, in eap_eke_build_commit() 262 msg = eap_eke_build_msg(data, id, data->sess.dhcomp_len, in eap_eke_build_commit() 277 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_build_commit() 283 if (eap_eke_dhcomp(&data->sess, data->key, pub, in eap_eke_build_commit() 284 wpabuf_put(msg, data->sess.dhcomp_len)) in eap_eke_build_commit() 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_eke.c | 27 struct eap_eke_session sess; member 136 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 394 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 396 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_eke.c | 27 struct eap_eke_session sess; member 136 eap_eke_session_clean(&data->sess); in eap_eke_deinit() 209 eap_eke_session_clean(&data->sess); in eap_eke_build_fail() 283 if (eap_eke_session_init(&data->sess, prop[0], prop[1], prop[2], in eap_eke_process_id() 387 if (pos + data->sess.dhcomp_len > end) { in eap_eke_process_commit() 394 pos, data->sess.dhcomp_len); in eap_eke_process_commit() 396 pos += data->sess.dhcomp_len; in eap_eke_process_commit() 403 if (eap_eke_derive_key(&data->sess, password, password_len, in eap_eke_process_commit() 415 if (eap_eke_dh_init(data->sess.dhgroup, data->dh_priv, pub) < 0) { in eap_eke_process_commit() 422 if (eap_eke_shared_secret(&data->sess, key, data->dh_priv, dhcomp) < 0) in eap_eke_process_commit() [all …]
|
/third_party/openssl/engines/ |
D | e_devcrypto.c | 86 static int clean_devcrypto_session(session_op_t *sess) { in clean_devcrypto_session() argument 87 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { in clean_devcrypto_session() 91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 106 session_op_t sess; member 214 if (cipher_ctx->sess.ses != 0 && in cipher_init() 215 clean_devcrypto_session(&cipher_ctx->sess) == 0) in cipher_init() 218 cipher_ctx->sess.cipher = cipher_d->devcryptoid; in cipher_init() 219 cipher_ctx->sess.keylen = cipher_d->keylen; in cipher_init() 220 cipher_ctx->sess.key = (void *)key; in cipher_init() 225 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? in cipher_init() [all …]
|
/third_party/node/deps/openssl/openssl/engines/ |
D | e_devcrypto.c | 86 static int clean_devcrypto_session(session_op_t *sess) { in clean_devcrypto_session() argument 87 if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { in clean_devcrypto_session() 91 memset(sess, 0, sizeof(*sess)); in clean_devcrypto_session() 106 session_op_t sess; member 214 if (cipher_ctx->sess.ses != 0 && in cipher_init() 215 clean_devcrypto_session(&cipher_ctx->sess) == 0) in cipher_init() 218 cipher_ctx->sess.cipher = cipher_d->devcryptoid; in cipher_init() 219 cipher_ctx->sess.keylen = cipher_d->keylen; in cipher_init() 220 cipher_ctx->sess.key = (void *)key; in cipher_init() 225 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? in cipher_init() [all …]
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | openssl-session.c | 206 lws_tls_session_new_cb(SSL *ssl, SSL_SESSION *sess) in lws_tls_session_new_cb() argument 233 ttl = SSL_SESSION_get_timeout(sess); in lws_tls_session_new_cb() 272 ts->session = sess; in lws_tls_session_new_cb() 278 sess, wsi->lc.gutag, disposition, tag, ttl, vh->name, in lws_tls_session_new_cb() 315 SSL_SESSION *sess; in lws_sess_cache_synth_cb() local 320 sess = SSL_get1_session(tls->ssl); in lws_sess_cache_synth_cb() 321 if (!sess) in lws_sess_cache_synth_cb() 324 if (!SSL_SESSION_is_resumable(sess) || /* not worth caching, or... */ in lws_sess_cache_synth_cb() 325 !lws_tls_session_new_cb(tls->ssl, sess)) { /* ...cb didn't keep it */ in lws_sess_cache_synth_cb() 331 SSL_SESSION_free(sess); in lws_sess_cache_synth_cb() [all …]
|
/third_party/openssl/test/ |
D | clienthellotest.c | 73 SSL_SESSION *sess = NULL; in test_client_hello() local 158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); in test_client_hello() 159 if (!TEST_ptr(sess)) { in test_client_hello() 167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) in test_client_hello() 168 || !TEST_true(SSL_set_session(con, sess))) in test_client_hello() 249 SSL_SESSION_free(sess); in test_client_hello()
|
/third_party/node/deps/openssl/openssl/apps/ |
D | s_server.c | 192 size_t identity_len, SSL_SESSION **sess) in psk_find_session_cb() argument 201 *sess = NULL; in psk_find_session_cb() 207 *sess = psksess; in psk_find_session_cb() 236 *sess = tmpsess; in psk_find_session_cb() 3694 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() local 3697 SSL_SESSION_get_id(session, &sess->idlen); in add_session() 3698 sess->derlen = i2d_SSL_SESSION(session, NULL); in add_session() 3699 if (sess->derlen < 0) { in add_session() 3701 OPENSSL_free(sess); in add_session() 3705 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session() [all …]
|
/third_party/openssl/apps/ |
D | s_server.c | 192 size_t identity_len, SSL_SESSION **sess) in psk_find_session_cb() argument 201 *sess = NULL; in psk_find_session_cb() 207 *sess = psksess; in psk_find_session_cb() 236 *sess = tmpsess; in psk_find_session_cb() 3694 simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session"); in add_session() local 3697 SSL_SESSION_get_id(session, &sess->idlen); in add_session() 3698 sess->derlen = i2d_SSL_SESSION(session, NULL); in add_session() 3699 if (sess->derlen < 0) { in add_session() 3701 OPENSSL_free(sess); in add_session() 3705 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session() [all …]
|
/third_party/openssl/ssl/statem/ |
D | extensions_srvr.c | 957 SSL_SESSION **sess) in tls_get_stateful_ticket() argument 980 *sess = tmpsess; in tls_get_stateful_ticket() 989 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local 1021 &sess)) { in tls_parse_ctos_psk() 1027 if(sess == NULL in tls_parse_ctos_psk() 1059 sess = SSL_SESSION_new(); in tls_parse_ctos_psk() 1060 if (sess == NULL in tls_parse_ctos_psk() 1061 || !SSL_SESSION_set1_master_key(sess, pskdata, in tls_parse_ctos_psk() 1063 || !SSL_SESSION_set_cipher(sess, cipher) in tls_parse_ctos_psk() 1064 || !SSL_SESSION_set_protocol_version(sess, in tls_parse_ctos_psk() [all …]
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | extensions_srvr.c | 957 SSL_SESSION **sess) in tls_get_stateful_ticket() argument 980 *sess = tmpsess; in tls_get_stateful_ticket() 989 SSL_SESSION *sess = NULL; in tls_parse_ctos_psk() local 1021 &sess)) { in tls_parse_ctos_psk() 1027 if(sess == NULL in tls_parse_ctos_psk() 1059 sess = SSL_SESSION_new(); in tls_parse_ctos_psk() 1060 if (sess == NULL in tls_parse_ctos_psk() 1061 || !SSL_SESSION_set1_master_key(sess, pskdata, in tls_parse_ctos_psk() 1063 || !SSL_SESSION_set_cipher(sess, cipher) in tls_parse_ctos_psk() 1064 || !SSL_SESSION_set_protocol_version(sess, in tls_parse_ctos_psk() [all …]
|