Searched refs:serial_num (Results 1 – 12 of 12) sorted by relevance
/external/usrsctp/usrsctplib/netinet/ |
D | sctp_asconf.c | 631 uint32_t serial_num; in sctp_handle_asconf() local 651 serial_num = ntohl(cp->serial_number); in sctp_handle_asconf() 653 if (SCTP_TSN_GE(asoc->asconf_seq_in, serial_num)) { in sctp_handle_asconf() 657 serial_num); in sctp_handle_asconf() 659 } else if (serial_num != (asoc->asconf_seq_in + 1)) { in sctp_handle_asconf() 661 serial_num, asoc->asconf_seq_in + 1); in sctp_handle_asconf() 666 asoc->asconf_seq_in = serial_num; /* update sequence */ in sctp_handle_asconf() 671 asconf_limit, serial_num); in sctp_handle_asconf() 678 if (ack->serial_number == serial_num) in sctp_handle_asconf() 681 ack->serial_number, serial_num); in sctp_handle_asconf() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_i.h | 161 char *serial_num; member
|
D | eap_server_tls.c | 209 if (sm->serial_num) { in eap_tls_buildReq() 214 sm->serial_num); in eap_tls_buildReq()
|
D | eap_server_tls_common.c | 364 if (!sm->serial_num && in eap_server_tls_phase1() 366 sm->serial_num = tls_connection_peer_serial_num( in eap_server_tls_phase1()
|
D | eap_server.c | 1903 os_free(sm->serial_num); in eap_server_sm_deinit() 1979 return sm->serial_num; in eap_get_serial_num()
|
/external/wpa_supplicant_8/src/ap/ |
D | authsrv.c | 160 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl.c | 1677 char *serial_num; in tls_connection_peer_serial_num() local 1688 serial_num = os_malloc(len); in tls_connection_peer_serial_num() 1689 if (!serial_num) in tls_connection_peer_serial_num() 1691 wpa_snprintf_hex_uppercase(serial_num, len, in tls_connection_peer_serial_num() 1694 return serial_num; in tls_connection_peer_serial_num() 2247 char serial_num[128]; in openssl_tls_cert_event() local 2278 wpa_snprintf_hex_uppercase(serial_num, sizeof(serial_num), in openssl_tls_cert_event() 2281 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 5380 char serial_num[128]; in openssl_debug_dump_certificate() local 5389 wpa_snprintf_hex_uppercase(serial_num, sizeof(serial_num), in openssl_debug_dump_certificate() [all …]
|
D | tls.h | 59 const char *serial_num; member
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.c | 743 const char *serial_num; in db_update_last_msk() local 748 serial_num = eap_get_serial_num(sess->eap); in db_update_last_msk() 749 if (serial_num) { in db_update_last_msk() 750 id_len = 5 + os_strlen(serial_num) + 1; in db_update_last_msk() 754 os_snprintf(id_str, id_len, "cert-%s", serial_num); in db_update_last_msk()
|
/external/tcpdump/tests/ |
D | of10_pf5240-vv.out | 112 serial_num 'Y1252CFA0000S4068C8N004'
|
D | of10_p3295-vv.out | 634 serial_num 'None'
|
D | of10_s4810-vvvv.out | 873 serial_num '02132012'
|