Home
last modified time | relevance | path

Searched refs:session_id (Results 1 – 25 of 122) sorted by relevance

12345

/third_party/mbedtls/library/
Dssl_cache.c49 unsigned char const *session_id, in ssl_cache_find_entry() argument
68 memcmp(session_id, cur->session_id, in ssl_cache_find_entry()
86 unsigned char const *session_id, in mbedtls_ssl_cache_get() argument
100 ret = ssl_cache_find_entry(cache, session_id, session_id_len, &entry); in mbedtls_ssl_cache_get()
143 unsigned char const *session_id, in ssl_cache_pick_writing_slot() argument
167 memcmp(session_id, cur->session_id, cur->session_id_len) == 0) { in ssl_cache_pick_writing_slot()
258 unsigned char const *session_id, in mbedtls_ssl_cache_set() argument
276 session_id, session_id_len, in mbedtls_ssl_cache_set()
305 if (session_id_len > sizeof(cur->session_id)) { in mbedtls_ssl_cache_set()
310 memcpy(cur->session_id, session_id, session_id_len); in mbedtls_ssl_cache_set()
[all …]
/third_party/node/src/
Dinspector_socket_server.h32 virtual void StartSession(int session_id, const std::string& target_id) = 0;
33 virtual void EndSession(int session_id) = 0;
34 virtual void MessageReceived(int session_id, const std::string& message) = 0;
61 void Send(int session_id, const std::string& message);
68 bool HandleGetRequest(int session_id, const std::string& host,
70 void SessionStarted(int session_id, const std::string& target_id,
72 void SessionTerminated(int session_id);
73 void MessageReceived(int session_id, const std::string& message) { in MessageReceived() argument
74 delegate_->MessageReceived(session_id, message); in MessageReceived()
76 SocketSession* Session(int session_id);
Dinspector_io.cc67 int session_id, in RequestToServer() argument
70 session_id_(session_id), in RequestToServer()
111 void Post(int session_id, in Post() argument
116 messages_.emplace_back(action, session_id, std::move(message)); in Post()
174 void Post(int session_id, in Post() argument
179 data_->Post(session_id, action, std::move(message)); in Post()
217 void StartSession(int session_id, const std::string& target_id) override;
218 void MessageReceived(int session_id, const std::string& message) override;
219 void EndSession(int session_id) override;
337 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument
[all …]
Dinspector_socket_server.cc180 Delegate(InspectorSocketServer* server, int session_id) in Delegate() argument
181 : server_(server), session_id_(session_id) { } in Delegate()
272 SocketSession* InspectorSocketServer::Session(int session_id) { in Session() argument
273 auto it = connected_sessions_.find(session_id); in Session()
277 void InspectorSocketServer::SessionStarted(int session_id, in SessionStarted() argument
280 SocketSession* session = Session(session_id); in SessionStarted()
285 connected_sessions_[session_id].first = id; in SessionStarted()
287 delegate_->StartSession(session_id, id); in SessionStarted()
290 void InspectorSocketServer::SessionTerminated(int session_id) { in SessionTerminated() argument
291 if (Session(session_id) == nullptr) { in SessionTerminated()
[all …]
Djs_native_api_v8_inspector.cc481 int session_id, in RequestToServer() argument
484 session_id_(session_id), in RequestToServer()
527 void Post(int session_id, in Post() argument
532 messages_.emplace_back(action, session_id, std::move(message)); in Post()
589 void Post(int session_id, in Post() argument
594 data_->Post(session_id, action, std::move(message)); in Post()
632 void StartSession(int session_id, const std::string& target_id) override;
633 void MessageReceived(int session_id, const std::string& message) override;
634 void EndSession(int session_id) override;
662 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument
[all …]
Dinspector_agent.cc343 int session_id, std::shared_ptr<NodeInspectorClient> client) in SameThreadInspectorSession() argument
344 : session_id_(session_id), client_(client) {} in SameThreadInspectorSession()
471 int session_id = next_session_id_++; in connectFrontend() local
472 channels_[session_id] = std::make_unique<ChannelImpl>(env_, in connectFrontend()
478 return session_id; in connectFrontend()
481 void disconnectFrontend(int session_id) { in disconnectFrontend() argument
482 auto it = channels_.find(session_id); in disconnectFrontend()
498 void dispatchMessageFromFrontend(int session_id, const StringView& message) { in dispatchMessageFromFrontend() argument
499 channels_[session_id]->dispatchProtocolMessage(message); in dispatchMessageFromFrontend()
787 int session_id = client_->connectFrontend(std::move(delegate), in Connect() local
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
Dspp_client.c27 const char *session_id,
109 const char *session_id, in build_spp_post_dev_data() argument
126 if (session_id) in build_spp_post_dev_data()
128 session_id); in build_spp_post_dev_data()
328 const char *session_id, in hs20_spp_upload_mo() argument
353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo()
410 const char *session_id, in process_spp_user_input_response() argument
423 ctx, session_id, in process_spp_user_input_response()
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response()
438 const char *session_id) in hs20_spp_user_input_completed() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
Dspp_client.c27 const char *session_id,
109 const char *session_id, in build_spp_post_dev_data() argument
126 if (session_id) in build_spp_post_dev_data()
128 session_id); in build_spp_post_dev_data()
328 const char *session_id, in hs20_spp_upload_mo() argument
353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo()
410 const char *session_id, in process_spp_user_input_response() argument
423 ctx, session_id, in process_spp_user_input_response()
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response()
438 const char *session_id) in hs20_spp_user_input_completed() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_sake.c28 u8 session_id; member
133 sake->session_id = data->session_id; in eap_sake_build_msg()
379 u8 subtype, session_id, id; in eap_sake_process() local
391 session_id = req->session_id; in eap_sake_process()
395 "session_id %d", subtype, session_id); in eap_sake_process()
399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process()
401 session_id, data->session_id); in eap_sake_process()
405 data->session_id = session_id; in eap_sake_process()
Deap_tls.c24 u8 *session_id; member
151 os_free(data->session_id); in eap_tls_deinit()
225 os_free(data->session_id); in eap_tls_success()
226 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
229 if (data->session_id) { in eap_tls_success()
231 data->session_id, data->id_len); in eap_tls_success()
345 os_free(data->session_id); in eap_tls_init_for_reauth()
346 data->session_id = NULL; in eap_tls_init_for_reauth()
411 if (data->session_id == NULL) in eap_tls_get_session_id()
414 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/fst/
Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify()
161 session_id, in fst_ctrl_iface_notify()
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
178 id = strtoul(session_id, NULL, 0); in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
217 id = strtoul(session_id, &p, 0); in session_set()
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
279 id = strtoul(session_id, NULL, 0); in session_remove()
297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/fst/
Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify()
161 session_id, in fst_ctrl_iface_notify()
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
178 id = strtoul(session_id, NULL, 0); in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
217 id = strtoul(session_id, &p, 0); in session_set()
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
279 id = strtoul(session_id, NULL, 0); in session_remove()
297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument
[all …]
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
Dsshkdf.c38 const unsigned char *session_id, size_t session_id_len,
49 unsigned char *session_id; member
85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset()
121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive()
131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive()
158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params()
230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument
255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
/third_party/openssl/providers/implementations/kdfs/
Dsshkdf.c38 const unsigned char *session_id, size_t session_id_len,
49 unsigned char *session_id; member
85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset()
121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive()
131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive()
158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params()
230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument
255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_sake.c28 u8 session_id; member
133 sake->session_id = data->session_id; in eap_sake_build_msg()
379 u8 subtype, session_id, id; in eap_sake_process() local
391 session_id = req->session_id; in eap_sake_process()
395 "session_id %d", subtype, session_id); in eap_sake_process()
399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process()
401 session_id, data->session_id); in eap_sake_process()
405 data->session_id = session_id; in eap_sake_process()
Deap_tls.c24 u8 *session_id; member
145 os_free(data->session_id); in eap_tls_deinit()
219 os_free(data->session_id); in eap_tls_success()
220 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
223 if (data->session_id) { in eap_tls_success()
225 data->session_id, data->id_len); in eap_tls_success()
343 os_free(data->session_id); in eap_tls_init_for_reauth()
344 data->session_id = NULL; in eap_tls_init_for_reauth()
409 if (data->session_id == NULL) in eap_tls_get_session_id()
412 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
/third_party/mbedtls/include/mbedtls/
Dssl_cache.h67 unsigned char MBEDTLS_PRIVATE(session_id)[32]; /*!< session ID */
107 unsigned char const *session_id,
122 unsigned char const *session_id,
140 unsigned char const *session_id,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_sake.c27 u8 session_id; member
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
76 data->session_id); in eap_sake_init()
109 sake->session_id = data->session_id; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
252 session_id = resp->session_id; in eap_sake_check()
260 if (session_id != data->session_id) { in eap_sake_check()
262 session_id, data->session_id); in eap_sake_check()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_sake.c27 u8 session_id; member
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
76 data->session_id); in eap_sake_init()
109 sake->session_id = data->session_id; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
252 session_id = resp->session_id; in eap_sake_check()
260 if (session_id != data->session_id) { in eap_sake_check()
262 session_id, data->session_id); in eap_sake_check()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/
Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs()
373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp()
406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument
421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov()
463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req()
566 u32 session_id = 0; in p2p_process_prov_disc_req() local
652 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req()
825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
857 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
887 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/
Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs()
373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp()
406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument
421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov()
463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req()
566 u32 session_id = 0; in p2p_process_prov_disc_req() local
652 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req()
825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
857 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
887 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req()
[all …]
/third_party/openssl/test/
Dbad_dtls_test.c53 static unsigned char session_id[32]; variable
110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session()
157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello()
261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello()
475 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
/third_party/openssl/ssl/
Dssl_asn1.c23 ASN1_OCTET_STRING *session_id; member
53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING),
113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local
160 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION()
161 in->session_id, in->session_id_length); in i2d_SSL_SESSION()
294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION()
295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION()
/third_party/node/deps/openssl/openssl/ssl/
Dssl_asn1.c23 ASN1_OCTET_STRING *session_id; member
53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING),
113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local
160 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION()
161 in->session_id, in->session_id_length); in i2d_SSL_SESSION()
294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION()
295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION()
/third_party/node/src/inspector/
Dworker_inspector.cc88 void WorkerManager::WorkerFinished(uint64_t session_id) { in WorkerFinished() argument
89 children_.erase(session_id); in WorkerFinished()
92 void WorkerManager::WorkerStarted(uint64_t session_id, in WorkerStarted() argument
97 children_.emplace(session_id, info); in WorkerStarted()

12345