/third_party/ffmpeg/libavformat/ |
H A D | oggenc.c | 65 unsigned serial_num; ///< serial number member 115 bytestream_put_le32(&ptr, oggstream->serial_num); in ogg_write_page() 482 unsigned serial_num = i + ogg->serial_offset; in ogg_init() local 515 serial_num = av_get_random_seed(); in ogg_init() 518 if (serial_num == sc->serial_num) in ogg_init() 522 oggstream->serial_num = serial_num; in ogg_init()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | authsrv.c | 178 wpa_printf(MSG_DEBUG, "authsrv: peer certificate: depth=%d serial_num=%s subject=%s", in authsrv_tls_event() 180 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl.c | 1646 char *serial_num; in tls_connection_peer_serial_num() local 1657 serial_num = os_malloc(len); in tls_connection_peer_serial_num() 1658 if (!serial_num) in tls_connection_peer_serial_num() 1660 wpa_snprintf_hex_uppercase(serial_num, len, in tls_connection_peer_serial_num() 1663 return serial_num; in tls_connection_peer_serial_num() 2209 char serial_num[128]; in openssl_tls_cert_event() local 2240 wpa_snprintf_hex_uppercase(serial_num, sizeof(serial_num), in openssl_tls_cert_event() 2243 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 5165 char serial_num[128]; openssl_debug_dump_certificate() local [all...] |
H A D | tls.h | 59 const char *serial_num; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_i.h | 162 char *serial_num; member
|
H A D | eap_server_tls.c | 208 if (sm->serial_num) { in eap_tls_buildReq() 213 sm->serial_num); in eap_tls_buildReq()
|
H A D | eap_server_tls_common.c | 362 if (!sm->serial_num && in eap_server_tls_phase1() 364 sm->serial_num = tls_connection_peer_serial_num(sm->ssl_ctx, in eap_server_tls_phase1()
|
H A D | eap_server.c | 1923 os_free(sm->serial_num); in eap_server_sm_deinit() 2002 return sm->serial_num; in eap_get_serial_num()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_i.h | 161 char *serial_num; member
|
H A D | eap_server_tls.c | 209 if (sm->serial_num) { in eap_tls_buildReq() 214 sm->serial_num); in eap_tls_buildReq()
|
H A D | eap_server_tls_common.c | 364 if (!sm->serial_num && in eap_server_tls_phase1() 366 sm->serial_num = tls_connection_peer_serial_num( in eap_server_tls_phase1()
|
H A D | eap_server.c | 1903 os_free(sm->serial_num); in eap_server_sm_deinit() 1979 return sm->serial_num; in eap_get_serial_num()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | authsrv.c | 158 wpa_printf(MSG_DEBUG, "authsrv: peer certificate: depth=%d serial_num=%s subject=%s", in authsrv_tls_event() 160 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_openssl.c | 1686 char *serial_num; in tls_connection_peer_serial_num() local 1697 serial_num = os_malloc(len); in tls_connection_peer_serial_num() 1698 if (!serial_num) in tls_connection_peer_serial_num() 1700 wpa_snprintf_hex_uppercase(serial_num, len, in tls_connection_peer_serial_num() 1703 return serial_num; in tls_connection_peer_serial_num() 2252 char serial_num[128]; in openssl_tls_cert_event() local 2283 wpa_snprintf_hex_uppercase(serial_num, sizeof(serial_num), in openssl_tls_cert_event() 2286 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 5478 char serial_num[128]; openssl_debug_dump_certificate() local [all...] |
H A D | tls.h | 59 const char *serial_num; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius_server.c | 910 const char *serial_num; in db_update_last_msk() local 915 serial_num = eap_get_serial_num(sess->eap); in db_update_last_msk() 916 if (serial_num) { in db_update_last_msk() 917 id_len = 5 + os_strlen(serial_num) + 1; in db_update_last_msk() 921 os_snprintf(id_str, id_len, "cert-%s", serial_num); in db_update_last_msk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius_server.c | 743 const char *serial_num; in db_update_last_msk() local 748 serial_num = eap_get_serial_num(sess->eap); in db_update_last_msk() 749 if (serial_num) { in db_update_last_msk() 750 id_len = 5 + os_strlen(serial_num) + 1; in db_update_last_msk() 754 os_snprintf(id_str, id_len, "cert-%s", serial_num); in db_update_last_msk()
|