Home
last modified time | relevance | path

Searched refs:session_id (Results 1 - 25 of 115) sorted by relevance

12345

/third_party/node/src/
H A Dinspector_socket_server.h32 virtual void StartSession(int session_id, const std::string& target_id) = 0;
33 virtual void EndSession(int session_id) = 0;
34 virtual void MessageReceived(int session_id, const std::string& message) = 0;
62 void Send(int session_id, const std::string& message);
69 bool HandleGetRequest(int session_id, const std::string& host,
71 void SessionStarted(int session_id, const std::string& target_id,
73 void SessionTerminated(int session_id);
74 void MessageReceived(int session_id, const std::string& message) { in MessageReceived() argument
75 delegate_->MessageReceived(session_id, message); in MessageReceived()
77 SocketSession* Session(int session_id);
[all...]
H A Dinspector_io.cc67 int session_id, in RequestToServer()
70 session_id_(session_id), in RequestToServer()
111 void Post(int session_id, in Post() argument
116 messages_.emplace_back(action, session_id, std::move(message)); in Post()
174 void Post(int session_id, in Post() argument
179 data_->Post(session_id, action, std::move(message)); in Post()
217 void StartSession(int session_id, const std::string& target_id) override;
218 void MessageReceived(int session_id, const std::string& message) override;
219 void EndSession(int session_id) override;
337 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument
66 RequestToServer(TransportAction action, int session_id, std::unique_ptr<v8_inspector::StringBuffer> message) RequestToServer() argument
348 MessageReceived(int session_id, const std::string& message) MessageReceived() argument
355 EndSession(int session_id) EndSession() argument
[all...]
H A Dinspector_socket_server.cc184 Delegate(InspectorSocketServer* server, int session_id) in Delegate() argument
185 : server_(server), session_id_(session_id) { } in Delegate()
286 SocketSession* InspectorSocketServer::Session(int session_id) { in Session() argument
287 auto it = connected_sessions_.find(session_id); in Session()
291 void InspectorSocketServer::SessionStarted(int session_id, in SessionStarted() argument
294 SocketSession* session = Session(session_id); in SessionStarted()
299 connected_sessions_[session_id].first = id; in SessionStarted()
301 delegate_->StartSession(session_id, id); in SessionStarted()
304 void InspectorSocketServer::SessionTerminated(int session_id) { in SessionTerminated() argument
305 if (Session(session_id) in SessionTerminated()
329 HandleGetRequest(int session_id, const std::string& host, const std::string& path) HandleGetRequest() argument
496 Send(int session_id, const std::string& message) Send() argument
[all...]
H A Djs_native_api_v8_inspector.cc481 int session_id, in RequestToServer()
484 session_id_(session_id), in RequestToServer()
527 void Post(int session_id, in Post() argument
532 messages_.emplace_back(action, session_id, std::move(message)); in Post()
589 void Post(int session_id, in Post() argument
594 data_->Post(session_id, action, std::move(message)); in Post()
632 void StartSession(int session_id, const std::string& target_id) override;
633 void MessageReceived(int session_id, const std::string& message) override;
634 void EndSession(int session_id) override;
662 void InspectorIoDelegate::StartSession(int session_id, in StartSession() argument
480 RequestToServer(TransportAction action, int session_id, std::unique_ptr<v8_inspector::StringBuffer> message) RequestToServer() argument
673 MessageReceived(int session_id, const std::string& message) MessageReceived() argument
680 EndSession(int session_id) EndSession() argument
1013 SameThreadInspectorSession( int session_id, std::shared_ptr<InspectorClient> client) SameThreadInspectorSession() argument
1109 int session_id = next_session_id_++; connectFrontend() local
1117 disconnectFrontend(int session_id) disconnectFrontend() argument
1134 dispatchMessageFromFrontend(int session_id, const StringView& message) dispatchMessageFromFrontend() argument
1348 int session_id = client_->connectFrontend(std::move(delegate), Connect() local
[all...]
H A Dinspector_agent.cc344 int session_id, std::shared_ptr<NodeInspectorClient> client) in SameThreadInspectorSession()
345 : session_id_(session_id), client_(client) {} in SameThreadInspectorSession()
472 int session_id = next_session_id_++; in connectFrontend() local
473 channels_[session_id] = std::make_unique<ChannelImpl>(env_, in connectFrontend()
479 return session_id; in connectFrontend()
482 void disconnectFrontend(int session_id) { in disconnectFrontend() argument
483 auto it = channels_.find(session_id); in disconnectFrontend()
499 void dispatchMessageFromFrontend(int session_id, const StringView& message) { in dispatchMessageFromFrontend() argument
500 channels_[session_id]->dispatchProtocolMessage(message); in dispatchMessageFromFrontend()
788 int session_id in Connect() local
343 SameThreadInspectorSession( int session_id, std::shared_ptr<NodeInspectorClient> client) SameThreadInspectorSession() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
H A Dspp_client.c27 const char *session_id,
109 const char *session_id, in build_spp_post_dev_data()
126 if (session_id) in build_spp_post_dev_data()
128 session_id); in build_spp_post_dev_data()
328 const char *session_id, in hs20_spp_upload_mo()
353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo()
410 const char *session_id, in process_spp_user_input_response()
423 ctx, session_id, in process_spp_user_input_response()
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response()
438 const char *session_id) in hs20_spp_user_input_completed()
107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) build_spp_post_dev_data() argument
326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_upload_mo() argument
409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) process_spp_user_input_response() argument
437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) hs20_spp_user_input_completed() argument
472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_get_certificate() argument
511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) hs20_spp_exec() argument
606 char *session_id = NULL; process_spp_post_dev_data_response() local
827 char *status, *session_id; process_spp_exchange_complete() local
863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) build_spp_update_response() argument
891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) hs20_spp_update_response() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
H A Dspp_client.c27 const char *session_id,
109 const char *session_id, in build_spp_post_dev_data()
126 if (session_id) in build_spp_post_dev_data()
128 session_id); in build_spp_post_dev_data()
328 const char *session_id, in hs20_spp_upload_mo()
353 node = build_spp_post_dev_data(ctx, &ns, session_id, in hs20_spp_upload_mo()
410 const char *session_id, in process_spp_user_input_response()
423 ctx, session_id, in process_spp_user_input_response()
429 ret = hs20_spp_update_response(ctx, session_id, "OK", NULL); in process_spp_user_input_response()
438 const char *session_id) in hs20_spp_user_input_completed()
107 build_spp_post_dev_data(struct hs20_osu_client *ctx, xml_namespace_t **ret_ns, const char *session_id, const char *reason) build_spp_post_dev_data() argument
326 hs20_spp_upload_mo(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_upload_mo() argument
409 process_spp_user_input_response(struct hs20_osu_client *ctx, const char *session_id, xml_node_t *add_mo) process_spp_user_input_response() argument
437 hs20_spp_user_input_completed(struct hs20_osu_client *ctx, const char *session_id) hs20_spp_user_input_completed() argument
472 hs20_spp_get_certificate(struct hs20_osu_client *ctx, xml_node_t *cmd, const char *session_id, const char *pps_fname) hs20_spp_get_certificate() argument
511 hs20_spp_exec(struct hs20_osu_client *ctx, xml_node_t *exec, const char *session_id, const char *pps_fname, xml_node_t *pps, xml_node_t **ret_node) hs20_spp_exec() argument
606 char *session_id = NULL; process_spp_post_dev_data_response() local
827 char *status, *session_id; process_spp_exchange_complete() local
863 build_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) build_spp_update_response() argument
891 hs20_spp_update_response(struct hs20_osu_client *ctx, const char *session_id, const char *spp_status, const char *error_code) hs20_spp_update_response() argument
[all...]
/third_party/mbedtls/library/
H A Dssl_cache.c38 unsigned char const *session_id, in ssl_cache_find_entry()
57 memcmp(session_id, cur->session_id, in ssl_cache_find_entry()
75 unsigned char const *session_id, in mbedtls_ssl_cache_get()
89 ret = ssl_cache_find_entry(cache, session_id, session_id_len, &entry); in mbedtls_ssl_cache_get()
131 unsigned char const *session_id, in ssl_cache_pick_writing_slot()
155 memcmp(session_id, cur->session_id, cur->session_id_len) == 0) { in ssl_cache_pick_writing_slot()
247 unsigned char const *session_id, in mbedtls_ssl_cache_set()
265 session_id, session_id_le in mbedtls_ssl_cache_set()
37 ssl_cache_find_entry(mbedtls_ssl_cache_context *cache, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_cache_entry **dst) ssl_cache_find_entry() argument
74 mbedtls_ssl_cache_get(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session) mbedtls_ssl_cache_get() argument
130 ssl_cache_pick_writing_slot(mbedtls_ssl_cache_context *cache, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_cache_entry **dst) ssl_cache_pick_writing_slot() argument
246 mbedtls_ssl_cache_set(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session) mbedtls_ssl_cache_set() argument
321 mbedtls_ssl_cache_remove(void *data, unsigned char const *session_id, size_t session_id_len) mbedtls_ssl_cache_remove() argument
[all...]
/third_party/mbedtls/include/mbedtls/
H A Dssl_cache.h55 unsigned char MBEDTLS_PRIVATE(session_id)[32]; /*!< session ID */
88 * \param session_id The pointer to the buffer holding the session ID
90 * \param session_id_len The length of \p session_id in bytes.
92 * associated with \p session_id, if present.
100 unsigned char const *session_id,
109 * \param session_id The pointer to the buffer holding the session ID
111 * \param session_id_len The length of \p session_id in bytes.
118 unsigned char const *session_id,
127 * \param session_id The pointer to the buffer holding the session ID
129 * \param session_id_len The length of \p session_id i
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_sake.c28 u8 session_id; member
133 sake->session_id = data->session_id; in eap_sake_build_msg()
379 u8 subtype, session_id, id; in eap_sake_process() local
391 session_id = req->session_id; in eap_sake_process()
395 "session_id %d", subtype, session_id); in eap_sake_process()
399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process()
[all...]
H A Deap_tls.c24 u8 *session_id; member
145 os_free(data->session_id); in eap_tls_deinit()
219 os_free(data->session_id); in eap_tls_success()
220 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
223 if (data->session_id) { in eap_tls_success()
225 data->session_id, data->id_len); in eap_tls_success()
343 os_free(data->session_id); in eap_tls_init_for_reauth()
344 data->session_id = NULL; in eap_tls_init_for_reauth()
409 if (data->session_id == NULL) in eap_tls_get_session_id()
412 id = os_memdup(data->session_id, dat in eap_tls_get_session_id()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_sake.c28 u8 session_id; member
133 sake->session_id = data->session_id; in eap_sake_build_msg()
379 u8 subtype, session_id, id; in eap_sake_process() local
391 session_id = req->session_id; in eap_sake_process()
395 "session_id %d", subtype, session_id); in eap_sake_process()
399 if (data->session_id_set && data->session_id != session_id) { in eap_sake_process()
[all...]
H A Deap_tls.c24 u8 *session_id; member
151 os_free(data->session_id); in eap_tls_deinit()
225 os_free(data->session_id); in eap_tls_success()
226 data->session_id = eap_peer_tls_derive_session_id(sm, &data->ssl, in eap_tls_success()
229 if (data->session_id) { in eap_tls_success()
231 data->session_id, data->id_len); in eap_tls_success()
345 os_free(data->session_id); in eap_tls_init_for_reauth()
346 data->session_id = NULL; in eap_tls_init_for_reauth()
411 if (data->session_id == NULL) in eap_tls_get_session_id()
414 id = os_memdup(data->session_id, dat in eap_tls_get_session_id()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
76 data->session_id); in eap_sake_init()
109 sake->session_id = data->session_id; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
252 session_id = resp->session_id; in eap_sake_check()
260 if (session_id != data->session_id) { in eap_sake_check()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_sake.c27 u8 session_id; member
70 if (os_get_random(&data->session_id, 1)) { in eap_sake_init()
76 data->session_id); in eap_sake_init()
109 sake->session_id = data->session_id; in eap_sake_build_msg()
241 u8 version, session_id, subtype; in eap_sake_check() local
252 session_id = resp->session_id; in eap_sake_check()
260 if (session_id != data->session_id) { in eap_sake_check()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify() local
161 session_id, in fst_ctrl_iface_notify() local
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
178 id = strtoul(session_id, NULL, 0); in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
217 id = strtoul(session_id, &p, 0); in session_set()
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
279 id = strtoul(session_id, NULL, 0); in session_remove()
297 static int session_initiate(const char *session_id, cha argument
320 session_respond(const char *session_id, char *buf, size_t buflen) session_respond() argument
363 session_transfer(const char *session_id, char *buf, size_t buflen) session_transfer() argument
387 session_teardown(const char *session_id, char *buf, size_t buflen) session_teardown() argument
728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; fst_ctrl_iface_on_event() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/fst/
H A Dfst_ctrl_iface.c81 static void fst_ctrl_iface_notify(struct fst_iface *f, u32 session_id, in fst_ctrl_iface_notify() argument
149 session_id, in fst_ctrl_iface_notify() local
161 session_id, in fst_ctrl_iface_notify() local
171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
178 id = strtoul(session_id, NULL, 0); in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
217 id = strtoul(session_id, &p, 0); in session_set()
273 static int session_remove(const char *session_id, char *buf, size_t buflen) in session_remove() argument
279 id = strtoul(session_id, NULL, 0); in session_remove()
297 static int session_initiate(const char *session_id, cha argument
320 session_respond(const char *session_id, char *buf, size_t buflen) session_respond() argument
363 session_transfer(const char *session_id, char *buf, size_t buflen) session_transfer() argument
387 session_teardown(const char *session_id, char *buf, size_t buflen) session_teardown() argument
728 u32 session_id = s ? fst_session_get_id(s) : FST_INVALID_SESSION_ID; fst_ctrl_iface_on_event() local
[all...]
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dsshkdf.c38 const unsigned char *session_id, size_t session_id_len,
49 unsigned char *session_id; member
85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset()
121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive()
131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive()
158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params()
230 const unsigned char *session_id, size_t session_id_len, in SSHKDF()
255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
227 SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) SSHKDF() argument
/third_party/openssl/providers/implementations/kdfs/
H A Dsshkdf.c38 const unsigned char *session_id, size_t session_id_len,
49 unsigned char *session_id; member
85 OPENSSL_clear_free(ctx->session_id, ctx->session_id_len); in kdf_sshkdf_reset()
121 if (ctx->session_id == NULL) { in kdf_sshkdf_derive()
131 ctx->session_id, ctx->session_id_len, in kdf_sshkdf_derive()
158 if (!sshkdf_set_membuf(&ctx->session_id, &ctx->session_id_len, p)) in kdf_sshkdf_set_ctx_params()
230 const unsigned char *session_id, size_t session_id_len, in SSHKDF()
255 if (!EVP_DigestUpdate(md, session_id, session_id_len)) in SSHKDF()
227 SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) SSHKDF() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/
H A Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs()
373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp()
406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov()
421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov()
463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req()
566 u32 session_id = 0; in p2p_process_prov_disc_req() local
652 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req()
825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) p2ps_setup_p2ps_prov() argument
1199 u32 session_id; p2p_validate_p2ps_pd_resp() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/
H A Dp2p_pd.c162 p2p_buf_add_session_id(buf, prov->session_id, prov->session_mac); in p2ps_add_pd_req_attrs()
373 p2p_buf_add_session_id(buf, prov->session_id, in p2p_build_prov_disc_resp()
406 u32 session_id, u16 method, in p2ps_setup_p2ps_prov()
421 tmp->session_id = session_id; in p2ps_setup_p2ps_prov()
463 P2PS_PD_REQ_CHECK(1, session_id); in p2ps_validate_pd_req()
566 u32 session_id = 0; in p2p_process_prov_disc_req() local
652 session_id = WPA_GET_LE32(msg.session_id); in p2p_process_prov_disc_req()
825 if (p2ps_setup_p2ps_prov(p2p, adv_id, session_id, in p2p_process_prov_disc_req()
405 p2ps_setup_p2ps_prov(struct p2p_data *p2p, u32 adv_id, u32 session_id, u16 method, const u8 *session_mac, const u8 *adv_mac) p2ps_setup_p2ps_prov() argument
1199 u32 session_id; p2p_validate_p2ps_pd_resp() local
[all...]
/third_party/node/src/inspector/
H A Dworker_inspector.cc88 void WorkerManager::WorkerFinished(uint64_t session_id) { in WorkerFinished() argument
89 children_.erase(session_id); in WorkerFinished()
92 void WorkerManager::WorkerStarted(uint64_t session_id, in WorkerStarted() argument
97 children_.emplace(session_id, info); in WorkerStarted()
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_asn1.c23 ASN1_OCTET_STRING *session_id; member
53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING),
113 ASN1_OCTET_STRING master_key, session_id, sid_ctx;
160 ssl_session_oinit(&as.session_id, &session_id,
161 in->session_id, in->session_id_length);
294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length,
295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH))
/third_party/openssl/ssl/
H A Dssl_asn1.c23 ASN1_OCTET_STRING *session_id; member
53 ASN1_SIMPLE(SSL_SESSION_ASN1, session_id, ASN1_OCTET_STRING),
113 ASN1_OCTET_STRING master_key, session_id, sid_ctx;
160 ssl_session_oinit(&as.session_id, &session_id,
161 in->session_id, in->session_id_length);
294 if (!ssl_session_memcpy(ret->session_id, &ret->session_id_length,
295 as->session_id, SSL3_MAX_SSL_SESSION_ID_LENGTH))
/third_party/openssl/test/
H A Dbad_dtls_test.c53 static unsigned char session_id[32]; variable
110 memcpy(session_asn1 + SS_SESSID_OFS, session_id, sizeof(session_id)); in client_session()
157 !PACKET_equal(&pkt2, session_id, sizeof(session_id))) in validate_client_hello()
261 memcpy(server_hello + SH_SESSID_OFS, session_id, sizeof(session_id)); in send_server_hello()
475 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()

Completed in 19 milliseconds

12345