/third_party/node/src/ |
H A D | inspector_socket_server.h | 32 virtual void StartSession(int session_id, const std::string& target_id) = 0; 33 virtual void EndSession(int session_id) = 0; 34 virtual void MessageReceived(int session_id, const std::string& message) = 0; 62 void Send(int session_id, const std::string& message); 69 bool HandleGetRequest(int session_id, const std::string& host, 71 void SessionStarted(int session_id, const std::string& target_id, 73 void SessionTerminated(int session_id); 74 void MessageReceived(int session_id, const std::string& message) { in MessageReceived() argument 75 delegate_->MessageReceived(session_id, message); in MessageReceived() 77 SocketSession* Session(int session_id); [all...] |
H A D | inspector_io.cc | 67 int session_id, in RequestToServer() 70 session_id_(session_id), in RequestToServer() 111 void Post(int session_id, in Post() argument 116 messages_.emplace_back(action, session_id, std::move(message)); in Post() 174 void Post(int session_id, in Post() argument 179 data_->Post(session_id, action, std::move(message)); in Post() 217 void StartSession(int session_id, const std::string& target_id) override; 218 void MessageReceived(int session_id, const std::string& message) override; 219 void EndSession(int session_id) override; 337 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument 66 RequestToServer(TransportAction action, int session_id, std::unique_ptr<v8_inspector::StringBuffer> message) RequestToServer() argument 348 MessageReceived(int session_id, const std::string& message) MessageReceived() argument 355 EndSession(int session_id) EndSession() argument [all...] |
H A D | inspector_socket_server.cc | 184 Delegate(InspectorSocketServer* server, int session_id) in Delegate() argument 185 : server_(server), session_id_(session_id) { } in Delegate() 286 SocketSession* InspectorSocketServer::Session(int session_id) { in Session() argument 287 auto it = connected_sessions_.find(session_id); in Session() 291 void InspectorSocketServer::SessionStarted(int session_id, in SessionStarted() argument 294 SocketSession* session = Session(session_id); in SessionStarted() 299 connected_sessions_[session_id].first = id; in SessionStarted() 301 delegate_->StartSession(session_id, id); in SessionStarted() 304 void InspectorSocketServer::SessionTerminated(int session_id) { in SessionTerminated() argument 305 if (Session(session_id) in SessionTerminated() 329 HandleGetRequest(int session_id, const std::string& host, const std::string& path) HandleGetRequest() argument 496 Send(int session_id, const std::string& message) Send() argument [all...] |
H A D | js_native_api_v8_inspector.cc | 481 int session_id, in RequestToServer() 484 session_id_(session_id), in RequestToServer() 527 void Post(int session_id, in Post() argument 532 messages_.emplace_back(action, session_id, std::move(message)); in Post() 589 void Post(int session_id, in Post() argument 594 data_->Post(session_id, action, std::move(message)); in Post() 632 void StartSession(int session_id, const std::string& target_id) override; 633 void MessageReceived(int session_id, const std::string& message) override; 634 void EndSession(int session_id) override; 662 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument 480 RequestToServer(TransportAction action, int session_id, std::unique_ptr<v8_inspector::StringBuffer> message) RequestToServer() argument 673 MessageReceived(int session_id, const std::string& message) MessageReceived() argument 680 EndSession(int session_id) EndSession() argument 1013 SameThreadInspectorSession( int session_id, std::shared_ptr<InspectorClient> client) SameThreadInspectorSession() argument 1109 int session_id = next_session_id_++; connectFrontend() local 1117 disconnectFrontend(int session_id) disconnectFrontend() argument 1134 dispatchMessageFromFrontend(int session_id, const StringView& message) dispatchMessageFromFrontend() argument 1348 int session_id = client_->connectFrontend(std::move(delegate), Connect() local [all...] |
H A D | inspector_agent.cc | 344 int session_id, std::shared_ptr<NodeInspectorClient> client) in SameThreadInspectorSession() 345 : session_id_(session_id), client_(client) {} in SameThreadInspectorSession() 472 int session_id = next_session_id_++; in connectFrontend() local 473 channels_[session_id] = std::make_unique<ChannelImpl>(env_, in connectFrontend() 479 return session_id; in connectFrontend() 482 void disconnectFrontend(int session_id) { in disconnectFrontend() argument 483 auto it = channels_.find(session_id); in disconnectFrontend() 499 void dispatchMessageFromFrontend(int session_id, const StringView& message) { in dispatchMessageFromFrontend() argument 500 channels_[session_id]->dispatchProtocolMessage(message); in dispatchMessageFromFrontend() 788 int session_id in Connect() local 343 SameThreadInspectorSession( int session_id, std::shared_ptr<NodeInspectorClient> client) SameThreadInspectorSession() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
H A D | spp_client.c | 27 const char *session_id, 109 const char *session_id, in build_spp_post_dev_data() 126 if (session_id) in build_spp_post_dev_data() 128 session_id); in build_spp_post_dev_data() 328 const char *session_id, in hs20_spp_upload_mo() 353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo() 410 const char *session_id, in process_spp_user_input_response() 423 ctx, session_id, in process_spp_user_input_response() 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response() 438 const char *session_id) in hs20_spp_user_input_completed() 107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) build_spp_post_dev_data() argument 326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_upload_mo() argument 409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) process_spp_user_input_response() argument 437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) hs20_spp_user_input_completed() argument 472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_get_certificate() argument 511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) hs20_spp_exec() argument 606 char *session_id = NULL; process_spp_post_dev_data_response() local 827 char *status, *session_id; process_spp_exchange_complete() local 863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) build_spp_update_response() argument 891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) hs20_spp_update_response() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
H A D | spp_client.c | 27 const char *session_id, 109 const char *session_id, in build_spp_post_dev_data() 126 if (session_id) in build_spp_post_dev_data() 128 session_id); in build_spp_post_dev_data() 328 const char *session_id, in hs20_spp_upload_mo() 353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo() 410 const char *session_id, in process_spp_user_input_response() 423 ctx, session_id, in process_spp_user_input_response() 429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response() 438 const char *session_id) in hs20_spp_user_input_completed() 107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) build_spp_post_dev_data() argument 326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_upload_mo() argument 409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) process_spp_user_input_response() argument 437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) hs20_spp_user_input_completed() argument 472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_get_certificate() argument 511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) hs20_spp_exec() argument 606 char *session_id = NULL; process_spp_post_dev_data_response() local 827 char *status, *session_id; process_spp_exchange_complete() local 863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) build_spp_update_response() argument 891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) hs20_spp_update_response() argument [all...] |
/third_party/mbedtls/library/ |
H A D | ssl_cache.c | 38 unsigned char const *session_id, in ssl_cache_find_entry() 57 memcmp(session_id, cur->session_id, in ssl_cache_find_entry() 75 unsigned char const *session_id, in mbedtls_ssl_cache_get() 89 ret = ssl_cache_find_entry(cache, session_id, session_id_len, &entry); in mbedtls_ssl_cache_get() 131 unsigned char const *session_id, in ssl_cache_pick_writing_slot() 155 memcmp(session_id, cur->session_id, cur->session_id_len) == 0) { in ssl_cache_pick_writing_slot() 247 unsigned char const *session_id, in mbedtls_ssl_cache_set() 265 session_id, session_id_le in mbedtls_ssl_cache_set() 37 ssl_cache_find_entry(mbedtls_ssl_cache_context *cache, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_cache_entry **dst) ssl_cache_find_entry() argument 74 mbedtls_ssl_cache_get(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session) mbedtls_ssl_cache_get() argument 130 ssl_cache_pick_writing_slot(mbedtls_ssl_cache_context *cache, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_cache_entry **dst) ssl_cache_pick_writing_slot() argument 246 mbedtls_ssl_cache_set(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session) mbedtls_ssl_cache_set() argument 321 mbedtls_ssl_cache_remove(void *data, unsigned char const *session_id, size_t session_id_len) mbedtls_ssl_cache_remove() argument [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl_cache.h | 55 unsigned char MBEDTLS_PRIVATE(session_id)[32]; /*!< session ID */ 88 * \param session_id The pointer to the buffer holding the session ID 90 * \param session_id_len The length of \p session_id in bytes. 92 * associated with \p session_id, if present. 100 unsigned char const *session_id, 109 * \param session_id The pointer to the buffer holding the session ID 111 * \param session_id_len The length of \p session_id in bytes. 118 unsigned char const *session_id, 127 * \param session_id The pointer to the buffer holding the session ID 129 * \param session_id_len The length of \p session_id i [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_sake.c | 28 u8 session_id; member 133 sake->session_id = data->session_id; in eap_sake_build_msg() 379 u8 subtype, session_id, id; in eap_sake_process() local 391 session_id = req->session_id; in eap_sake_process() 395 "session_id %d", subtype, session_id); in eap_sake_process() 399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() [all...] |
H A D | eap_tls.c | 24 u8 *session_id; member 145 os_free(data->session_id); in eap_tls_deinit() 219 os_free(data->session_id); in eap_tls_success() 220 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 223 if (data->session_id) { in eap_tls_success() 225 data->session_id, data->id_len); in eap_tls_success() 343 os_free(data->session_id); in eap_tls_init_for_reauth() 344 data->session_id = NULL; in eap_tls_init_for_reauth() 409 if (data->session_id == NULL) in eap_tls_get_session_id() 412 id = os_memdup(data->session_id, dat in eap_tls_get_session_id() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_sake.c | 28 u8 session_id; member 133 sake->session_id = data->session_id; in eap_sake_build_msg() 379 u8 subtype, session_id, id; in eap_sake_process() local 391 session_id = req->session_id; in eap_sake_process() 395 "session_id %d", subtype, session_id); in eap_sake_process() 399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process() [all...] |
H A D | eap_tls.c | 24 u8 *session_id; member 151 os_free(data->session_id); in eap_tls_deinit() 225 os_free(data->session_id); in eap_tls_success() 226 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success() 229 if (data->session_id) { in eap_tls_success() 231 data->session_id, data->id_len); in eap_tls_success() 345 os_free(data->session_id); in eap_tls_init_for_reauth() 346 data->session_id = NULL; in eap_tls_init_for_reauth() 411 if (data->session_id == NULL) in eap_tls_get_session_id() 414 id = os_memdup(data->session_id, dat in eap_tls_get_session_id() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_sake.c | 27 u8 session_id; member 70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init() 76 data->session_id); in eap_sake_init() 109 sake->session_id = data->session_id; in eap_sake_build_msg() 241 u8 version, session_id, subtype; in eap_sake_check() local 252 session_id = resp->session_id; in eap_sake_check() 260 if (session_id != data->session_id) { in eap_sake_check() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() local 161 session_id, in fst_ctrl_iface_notify() local 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 178 id = strtoul(session_id, NULL, 0); in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 217 id = strtoul(session_id, &p, 0); in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 279 id = strtoul(session_id, NULL, 0); in session_remove() 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) session_respond() argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) session_transfer() argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) session_teardown() argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; fst_ctrl_iface_on_event() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/fst/ |
H A D | fst_ctrl_iface.c | 81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument 149 session_id, in fst_ctrl_iface_notify() local 161 session_id, in fst_ctrl_iface_notify() local 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 178 id = strtoul(session_id, NULL, 0); in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 217 id = strtoul(session_id, &p, 0); in session_set() 273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument 279 id = strtoul(session_id, NULL, 0); in session_remove() 297 static int session_initiate(const char *session_id, cha argument 320 session_respond(const char *session_id, char *buf, size_t buflen) session_respond() argument 363 session_transfer(const char *session_id, char *buf, size_t buflen) session_transfer() argument 387 session_teardown(const char *session_id, char *buf, size_t buflen) session_teardown() argument 728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; fst_ctrl_iface_on_event() local [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 49 unsigned char *session_id; member 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive() 131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() 255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF() 227 SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) SSHKDF() argument
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 38 const unsigned char *session_id, size_t session_id_len, 49 unsigned char *session_id; member 85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset() 121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive() 131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive() 158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params() 230 const unsigned char *session_id, size_t session_id_len, in SSHKDF() 255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF() 227 SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) SSHKDF() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/ |
H A D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs() 373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp() 406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() 421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 652 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) p2ps_setup_p2ps_prov() argument 1199 u32 session_id; p2p_validate_p2ps_pd_resp() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/ |
H A D | p2p_pd.c | 162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs() 373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp() 406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov() 421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov() 463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req() 566 u32 session_id = 0; in p2p_process_prov_disc_req() local 652 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req() 825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req() 405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) p2ps_setup_p2ps_prov() argument 1199 u32 session_id; p2p_validate_p2ps_pd_resp() local [all...] |
/third_party/node/src/inspector/ |
H A D | worker_inspector.cc | 88 void WorkerManager::WorkerFinished(uint64_t session_id) { in WorkerFinished() argument 89 children_.erase(session_id); in WorkerFinished() 92 void WorkerManager::WorkerStarted(uint64_t session_id, in WorkerStarted() argument 97 children_.emplace(session_id, info); in WorkerStarted()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_asn1.c | 23 ASN1_OCTET_STRING *session_id; member 53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; 160 ssl_session_oinit(&as.session_id, &session_id, 161 in->session_id, in->session_id_length); 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, 295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH))
|
/third_party/openssl/ssl/ |
H A D | ssl_asn1.c | 23 ASN1_OCTET_STRING *session_id; member 53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING), 113 ASN1_OCTET_STRING master_key, session_id, sid_ctx; 160 ssl_session_oinit(&as.session_id, &session_id, 161 in->session_id, in->session_id_length); 294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length, 295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH))
|
/third_party/openssl/test/ |
H A D | bad_dtls_test.c | 53 static unsigned char session_id[32]; variable 110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session() 157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello() 261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello() 475 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
|