/third_party/mbedtls/library/ |
D | ssl_cache.c | 49 unsigned char const *session_id, in ssl_cache_find_entry() argument 68 memcmp(session_id, cur->session_id, in ssl_cache_find_entry() 86 unsigned char const *session_id, in mbedtls_ssl_cache_get() argument 100 ret = ssl_cache_find_entry(cache, session_id, session_id_len, &entry); in mbedtls_ssl_cache_get() 143 unsigned char const *session_id, in ssl_cache_pick_writing_slot() argument 167 memcmp(session_id, cur->session_id, cur->session_id_len) == 0) { in ssl_cache_pick_writing_slot() 258 unsigned char const *session_id, in mbedtls_ssl_cache_set() argument 276 session_id, session_id_len, in mbedtls_ssl_cache_set() 305 if (session_id_len > sizeof(cur->session_id)) { in mbedtls_ssl_cache_set() 310 memcpy(cur->session_id, session_id, session_id_len); in mbedtls_ssl_cache_set() [all …]
|
/third_party/node/src/ |
D | inspector_socket_server.h | 32 virtual void StartSession(int session_id, const std::string& target_id) = 0; 33 virtual void EndSession(int session_id) = 0; 34 virtual void MessageReceived(int session_id, const std::string& message) = 0; 61 void Send(int session_id, const std::string& message); 68 bool HandleGetRequest(int session_id, const std::string& host, 70 void SessionStarted(int session_id, const std::string& target_id, 72 void SessionTerminated(int session_id); 73 void MessageReceived(int session_id, const std::string& message) { in MessageReceived() argument 74 delegate_->MessageReceived(session_id, message); in MessageReceived() 76 SocketSession* Session(int session_id);
|
D | inspector_io.cc | 67 int session_id, in RequestToServer() argument 70 session_id_(session_id), in RequestToServer() 111 void Post(int session_id, in Post() argument 116 messages_.emplace_back(action, session_id, std::move(message)); in Post() 174 void Post(int session_id, in Post() argument 179 data_->Post(session_id, action, std::move(message)); in Post() 217 void StartSession(int session_id, const std::string& target_id) override; 218 void MessageReceived(int session_id, const std::string& message) override; 219 void EndSession(int session_id) override; 337 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument [all …]
|
D | inspector_socket_server.cc | 180 Delegate(InspectorSocketServer* server, int session_id) in Delegate() argument 181 : server_(server), session_id_(session_id) { } in Delegate() 272 SocketSession* InspectorSocketServer::Session(int session_id) { in Session() argument 273 auto it = connected_sessions_.find(session_id); in Session() 277 void InspectorSocketServer::SessionStarted(int session_id, in SessionStarted() argument 280 SocketSession* session = Session(session_id); in SessionStarted() 285 connected_sessions_[session_id].first = id; in SessionStarted() 287 delegate_->StartSession(session_id, id); in SessionStarted() 290 void InspectorSocketServer::SessionTerminated(int session_id) { in SessionTerminated() argument 291 if (Session(session_id) == nullptr) { in SessionTerminated() [all …]
|
D | js_native_api_v8_inspector.cc | 481 int session_id, in RequestToServer() argument 484 session_id_(session_id), in RequestToServer() 527 void Post(int session_id, in Post() argument 532 messages_.emplace_back(action, session_id, std::move(message)); in Post() 589 void Post(int session_id, in Post() argument 594 data_->Post(session_id, action, std::move(message)); in Post() 632 void StartSession(int session_id, const std::string& target_id) override; 633 void MessageReceived(int session_id, const std::string& message) override; 634 void EndSession(int session_id) override; 662 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument [all …]
|
D | inspector_agent.cc | 343 int session_id, std::shared_ptr<NodeInspectorClient> client) in SameThreadInspectorSession() argument 344 : session_id_(session_id), client_(client) {} in SameThreadInspectorSession() 471 int session_id = next_session_id_++; in connectFrontend() local 472 channels_[session_id] = std::make_unique<ChannelImpl>(env_, in connectFrontend() 478 return session_id; in connectFrontend() 481 void disconnectFrontend(int session_id) { in disconnectFrontend() argument 482 auto it = channels_.find(session_id); in disconnectFrontend() 498 void dispatchMessageFromFrontend(int session_id, const StringView& message) { in dispatchMessageFromFrontend() argument 499 channels_[session_id]->dispatchProtocolMessage(message); in dispatchMessageFromFrontend() 787 int session_id = client_->connectFrontend(std::move(delegate), in Connect() local [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
D | spp_client.c | 27 const char *session_id, 109 const char *session_id, in build_spp_post_dev_data() argument 126 if (session_id) in build_spp_post_dev_data() 128 session_id); in build_spp_post_dev_data() 328 const char *session_id, in hs20_spp_upload_mo() argument 353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo() 410 const char *session_id, in process_spp_user_input_response() argument 423 ctx, session_id, in process_spp_user_input_response() 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response() 438 const char *session_id) in hs20_spp_user_input_completed() argument [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
D | spp_client.c | 27 const char *session_id, 109 const char *session_id, in build_spp_post_dev_data() argument 126 if (session_id) in build_spp_post_dev_data() 128 session_id); in build_spp_post_dev_data() 328 const char *session_id, in hs20_spp_upload_mo() argument 353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo() 410 const char *session_id, in process_spp_user_input_response() argument 423 ctx, session_id, in process_spp_user_input_response() 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response() 438 const char *session_id) in hs20_spp_user_input_completed() argument [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_sake.c | 28 u8 session_id; member 133 sake->session_id = data->session_id; in eap_sake_build_msg() 379 u8 subtype, session_id, id; in eap_sake_process() local 391 session_id = req->session_id; in eap_sake_process() 395 "session_id %d", subtype, session_id); in eap_sake_process() 399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() 401 session_id, data->session_id); in eap_sake_process() 405 data->session_id = session_id; in eap_sake_process()
|
D | eap_tls.c | 24 u8 *session_id; member 151 os_free(data->session_id); in eap_tls_deinit() 225 os_free(data->session_id); in eap_tls_success() 226 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 229 if (data->session_id) { in eap_tls_success() 231 data->session_id, data->id_len); in eap_tls_success() 345 os_free(data->session_id); in eap_tls_init_for_reauth() 346 data->session_id = NULL; in eap_tls_init_for_reauth() 411 if (data->session_id == NULL) in eap_tls_get_session_id() 414 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/fst/ |
D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() 161 session_id, in fst_ctrl_iface_notify() 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 178 id = strtoul(session_id, NULL, 0); in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 217 id = strtoul(session_id, &p, 0); in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 279 id = strtoul(session_id, NULL, 0); in session_remove() 297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/fst/ |
D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() 161 session_id, in fst_ctrl_iface_notify() 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 178 id = strtoul(session_id, NULL, 0); in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 217 id = strtoul(session_id, &p, 0); in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 279 id = strtoul(session_id, NULL, 0); in session_remove() 297 static int session_initiate(const char *session_id, char *buf, size_t buflen) in session_initiate() argument [all …]
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 49 unsigned char *session_id; member 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive() 131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument 255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
|
/third_party/openssl/providers/implementations/kdfs/ |
D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 49 unsigned char *session_id; member 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive() 131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() argument 255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_sake.c | 28 u8 session_id; member 133 sake->session_id = data->session_id; in eap_sake_build_msg() 379 u8 subtype, session_id, id; in eap_sake_process() local 391 session_id = req->session_id; in eap_sake_process() 395 "session_id %d", subtype, session_id); in eap_sake_process() 399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() 401 session_id, data->session_id); in eap_sake_process() 405 data->session_id = session_id; in eap_sake_process()
|
D | eap_tls.c | 24 u8 *session_id; member 145 os_free(data->session_id); in eap_tls_deinit() 219 os_free(data->session_id); in eap_tls_success() 220 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 223 if (data->session_id) { in eap_tls_success() 225 data->session_id, data->id_len); in eap_tls_success() 343 os_free(data->session_id); in eap_tls_init_for_reauth() 344 data->session_id = NULL; in eap_tls_init_for_reauth() 409 if (data->session_id == NULL) in eap_tls_get_session_id() 412 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
|
/third_party/mbedtls/include/mbedtls/ |
D | ssl_cache.h | 67 unsigned char MBEDTLS_PRIVATE(session_id)[32]; /*!< session ID */ 107 unsigned char const *session_id, 122 unsigned char const *session_id, 140 unsigned char const *session_id,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() 262 session_id, data->session_id); in eap_sake_check()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() 262 session_id, data->session_id); in eap_sake_check()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/ |
D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs() 373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp() 406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument 421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 652 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 857 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 887 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/ |
D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs() 373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp() 406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() argument 421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 652 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 857 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 887 if (p2p->p2ps_prov->session_id != session_id || in p2p_process_prov_disc_req() [all …]
|
/third_party/openssl/test/ |
D | bad_dtls_test.c | 53 static unsigned char session_id[32]; variable 110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session() 157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello() 261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello() 475 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
|
/third_party/openssl/ssl/ |
D | ssl_asn1.c | 23 ASN1_OCTET_STRING *session_id; member 53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 160 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION() 161 in->session_id, in->session_id_length); in i2d_SSL_SESSION() 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION() 295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION()
|
/third_party/node/deps/openssl/openssl/ssl/ |
D | ssl_asn1.c | 23 ASN1_OCTET_STRING *session_id; member 53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; in i2d_SSL_SESSION() local 160 ssl_session_oinit(&as.session_id, &session_id, in i2d_SSL_SESSION() 161 in->session_id, in->session_id_length); in i2d_SSL_SESSION() 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, in d2i_SSL_SESSION() 295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH)) in d2i_SSL_SESSION()
|
/third_party/node/src/inspector/ |
D | worker_inspector.cc | 88 void WorkerManager::WorkerFinished(uint64_t session_id) { in WorkerFinished() argument 89 children_.erase(session_id); in WorkerFinished() 92 void WorkerManager::WorkerStarted(uint64_t session_id, in WorkerStarted() argument 97 children_.emplace(session_id, info); in WorkerStarted()
|