/third_party/curl/lib/ |
H A D | noproxy.c | 177 size_t tokenlen = 0; in Curl_check_noproxy() local 188 tokenlen++; in Curl_check_noproxy() 191 if(tokenlen) { in Curl_check_noproxy() 195 if(token[tokenlen - 1] == '.') in Curl_check_noproxy() 196 tokenlen--; in Curl_check_noproxy() 198 if(tokenlen && (*token == '.')) { in Curl_check_noproxy() 201 tokenlen--; in Curl_check_noproxy() 207 if(tokenlen == namelen) in Curl_check_noproxy() 210 else if(tokenlen < namelen) { in Curl_check_noproxy() 212 match = (name[namelen - tokenlen in Curl_check_noproxy() [all...] |
/third_party/lwip/src/core/ |
H A D | def.c | 108 size_t tokenlen = strlen(token); in lwip_strnstr() local 109 if (tokenlen == 0) { in lwip_strnstr() 112 for (p = buffer; *p && (p + tokenlen <= buffer + n); p++) { in lwip_strnstr() 113 if ((*p == *token) && (strncmp(p, token, tokenlen) == 0)) { in lwip_strnstr()
|
/third_party/nghttp2/src/ |
H A D | shrpx_quic_connection_handler.cc | 174 size_t tokenlen = 0; in handle_packet() local 207 if (hd.tokenlen == 0) { in handle_packet() 229 if (verify_retry_token(odcid, hd.token, hd.tokenlen, hd.version, in handle_packet() 252 tokenlen = hd.tokenlen; in handle_packet() 264 if (hd.tokenlen != NGTCP2_CRYPTO_MAX_REGULAR_TOKENLEN + 1) { in handle_packet() 283 if (verify_token(hd.token, hd.tokenlen - 1, &remote_addr.su.sa, in handle_packet() 307 tokenlen = hd.tokenlen; in handle_packet() 348 token, tokenlen, token_typ in handle_packet() 367 handle_new_connection( const UpstreamAddr *faddr, const Address &remote_addr, const Address &local_addr, const ngtcp2_pkt_hd &hd, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, ngtcp2_token_type token_type) handle_new_connection() argument 487 size_t tokenlen; send_retry() local [all...] |
H A D | shrpx_quic.h | 111 int generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, 116 int verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, 121 int generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, 124 int verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa,
|
H A D | shrpx_quic.cc | 295 int generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, in generate_retry_token() argument 309 tokenlen = stokenlen; in generate_retry_token() 314 int verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, in verify_retry_token() argument 323 if (ngtcp2_crypto_verify_retry_token(&odcid, token, tokenlen, secret, in verify_retry_token() 332 int generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, in generate_token() argument 344 tokenlen = stokenlen; in generate_token() 349 int verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa, in verify_token() argument 355 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretlen, sa, in verify_token()
|
H A D | shrpx_quic_connection_handler.h | 123 size_t tokenlen, ngtcp2_token_type token_type);
|
H A D | shrpx_http3_upstream.cc | 525 size_t tokenlen; in send_new_token() local 532 if (generate_token(token.data(), tokenlen, remote_addr->addr, in send_new_token() 538 assert(tokenlen == NGTCP2_CRYPTO_MAX_REGULAR_TOKENLEN); in send_new_token() 540 token[tokenlen++] = qkm.id; in send_new_token() 542 auto rv = ngtcp2_conn_submit_new_token(conn_, token.data(), tokenlen); in send_new_token() 572 size_t tokenlen, ngtcp2_token_type token_type) { in init() 658 settings.tokenlen = tokenlen; in init() 568 init(const UpstreamAddr *faddr, const Address &remote_addr, const Address &local_addr, const ngtcp2_pkt_hd &initial_hd, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, ngtcp2_token_type token_type) init() argument
|
H A D | shrpx_http3_upstream.h | 92 const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen,
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/ |
H A D | shared.c | 974 ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, in ngtcp2_crypto_verify_retry_token() 997 if (tokenlen != NGTCP2_CRYPTO_MAX_RETRY_TOKENLEN || in ngtcp2_crypto_verify_retry_token() 1002 rand_data = token + tokenlen - NGTCP2_CRYPTO_TOKEN_RAND_DATALEN; in ngtcp2_crypto_verify_retry_token() 1004 ciphertextlen = tokenlen - 1 - NGTCP2_CRYPTO_TOKEN_RAND_DATALEN; in ngtcp2_crypto_verify_retry_token() 1150 int ngtcp2_crypto_verify_regular_token(const uint8_t *token, size_t tokenlen, in ngtcp2_crypto_verify_regular_token() argument 1173 if (tokenlen != NGTCP2_CRYPTO_MAX_REGULAR_TOKENLEN || in ngtcp2_crypto_verify_regular_token() 1178 rand_data = token + tokenlen - NGTCP2_CRYPTO_TOKEN_RAND_DATALEN; in ngtcp2_crypto_verify_regular_token() 1180 ciphertextlen = tokenlen - 1 - NGTCP2_CRYPTO_TOKEN_RAND_DATALEN; in ngtcp2_crypto_verify_regular_token() 1279 const uint8_t *token, size_t tokenlen) { in ngtcp2_crypto_write_retry() 1308 token, tokenlen, ngtcp2_crypto_encrypt_c in ngtcp2_crypto_write_retry() 973 ngtcp2_crypto_verify_retry_token( ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *dcid, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_retry_token() argument 1275 ngtcp2_crypto_write_retry(uint8_t *dest, size_t destlen, uint32_t version, const ngtcp2_cid *dcid, const ngtcp2_cid *scid, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen) ngtcp2_crypto_write_retry() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/includes/ngtcp2/ |
H A D | ngtcp2_crypto.h | 666 * the buffer pointed by |token| of length |tokenlen|. |secret| of 681 ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, 712 * stored in the buffer pointed by |token| of length |tokenlen|. 721 const uint8_t *token, size_t tokenlen, const uint8_t *secret, 755 * |tokenlen| specifies its length. 764 size_t tokenlen);
|
/third_party/node/deps/ngtcp2/ngtcp2/lib/ |
H A D | ngtcp2_pkt.c | 177 size_t tokenlen = 0; in ngtcp2_pkt_decode_hd_long() local 268 tokenlen = (size_t)vi; in ngtcp2_pkt_decode_hd_long() 269 len += tokenlen; in ngtcp2_pkt_decode_hd_long() 273 if (tokenlen) { in ngtcp2_pkt_decode_hd_long() 277 p += tokenlen; in ngtcp2_pkt_decode_hd_long() 312 dest->token.len = tokenlen; in ngtcp2_pkt_decode_hd_long() 313 p += ntokenlen + tokenlen; in ngtcp2_pkt_decode_hd_long() 2253 size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, in ngtcp2_pkt_write_retry() 2265 assert(tokenlen > 0); in ngtcp2_pkt_write_retry() 2281 /* unused = */ 0, odcid, token, tokenlen); in ngtcp2_pkt_write_retry() 2250 ngtcp2_pkt_write_retry( uint8_t *dest, size_t destlen, uint32_t version, const ngtcp2_cid *dcid, const ngtcp2_cid *scid, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx) ngtcp2_pkt_write_retry() argument 2319 ngtcp2_pkt_encode_pseudo_retry( uint8_t *dest, size_t destlen, const ngtcp2_pkt_hd *hd, uint8_t unused, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen) ngtcp2_pkt_encode_pseudo_retry() argument [all...] |
H A D | ngtcp2_pkt.h | 1203 const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen);
|
H A D | ngtcp2_conn.c | 12868 size_t tokenlen) { in ngtcp2_conn_submit_new_token() 12871 ngtcp2_vec tokenv = {(uint8_t *)token, tokenlen}; in ngtcp2_conn_submit_new_token() 12875 assert(tokenlen); in ngtcp2_conn_submit_new_token() 12867 ngtcp2_conn_submit_new_token(ngtcp2_conn *conn, const uint8_t *token, size_t tokenlen) ngtcp2_conn_submit_new_token() argument
|
/third_party/libcoap/examples/ |
H A D | coap-client.c | 209 track_new_token(size_t tokenlen, uint8_t *token) { in track_new_token() argument 217 tracked_tokens[tracked_tokens_count].token = coap_new_binary(tokenlen); in track_new_token() 220 memcpy(tracked_tokens[tracked_tokens_count].token->s, token, tokenlen); in track_new_token() 268 size_t tokenlen; in coap_new_request() local 282 coap_session_new_token(session, &tokenlen, token); in coap_new_request() 284 memcpy(&the_token.s[the_token.length - tokenlen], token, tokenlen); in coap_new_request()
|
/third_party/node/deps/ngtcp2/ngtcp2/lib/includes/ngtcp2/ |
H A D | ngtcp2.h | 3621 * specifies Retry Token, and |tokenlen| specifies its length. |aead| 3639 size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, 4858 * |tokenlen| must not be 0. 4861 * length |tokenlen|. 4871 size_t tokenlen);
|