Home
last modified time | relevance | path

Searched refs:tokenlen (Results 1 - 15 of 15) sorted by relevance

/third_party/curl/lib/
H A Dnoproxy.c177 size_t tokenlen = 0; in Curl_check_noproxy() local
188 tokenlen++; in Curl_check_noproxy()
191 if(tokenlen) { in Curl_check_noproxy()
195 if(token[tokenlen - 1] == '.') in Curl_check_noproxy()
196 tokenlen--; in Curl_check_noproxy()
198 if(tokenlen && (*token == '.')) { in Curl_check_noproxy()
201 tokenlen--; in Curl_check_noproxy()
207 if(tokenlen == namelen) in Curl_check_noproxy()
210 else if(tokenlen < namelen) { in Curl_check_noproxy()
212 match = (name[namelen - tokenlen in Curl_check_noproxy()
[all...]
/third_party/lwip/src/core/
H A Ddef.c108 size_t tokenlen = strlen(token); in lwip_strnstr() local
109 if (tokenlen == 0) { in lwip_strnstr()
112 for (p = buffer; *p && (p + tokenlen <= buffer + n); p++) { in lwip_strnstr()
113 if ((*p == *token) && (strncmp(p, token, tokenlen) == 0)) { in lwip_strnstr()
/third_party/nghttp2/src/
H A Dshrpx_quic_connection_handler.cc174 size_t tokenlen = 0; in handle_packet() local
207 if (hd.tokenlen == 0) { in handle_packet()
229 if (verify_retry_token(odcid, hd.token, hd.tokenlen, hd.version, in handle_packet()
252 tokenlen = hd.tokenlen; in handle_packet()
264 if (hd.tokenlen != NGTCP2_CRYPTO_MAX_REGULAR_TOKENLEN + 1) { in handle_packet()
283 if (verify_token(hd.token, hd.tokenlen - 1, &remote_addr.su.sa, in handle_packet()
307 tokenlen = hd.tokenlen; in handle_packet()
348 token, tokenlen, token_typ in handle_packet()
367 handle_new_connection( const UpstreamAddr *faddr, const Address &remote_addr, const Address &local_addr, const ngtcp2_pkt_hd &hd, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, ngtcp2_token_type token_type) handle_new_connection() argument
487 size_t tokenlen; send_retry() local
[all...]
H A Dshrpx_quic.h111 int generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version,
116 int verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen,
121 int generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa,
124 int verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa,
H A Dshrpx_quic.cc295 int generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, in generate_retry_token() argument
309 tokenlen = stokenlen; in generate_retry_token()
314 int verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, in verify_retry_token() argument
323 if (ngtcp2_crypto_verify_retry_token(&odcid, token, tokenlen, secret, in verify_retry_token()
332 int generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, in generate_token() argument
344 tokenlen = stokenlen; in generate_token()
349 int verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa, in verify_token() argument
355 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretlen, sa, in verify_token()
H A Dshrpx_quic_connection_handler.h123 size_t tokenlen, ngtcp2_token_type token_type);
H A Dshrpx_http3_upstream.cc525 size_t tokenlen; in send_new_token() local
532 if (generate_token(token.data(), tokenlen, remote_addr->addr, in send_new_token()
538 assert(tokenlen == NGTCP2_CRYPTO_MAX_REGULAR_TOKENLEN); in send_new_token()
540 token[tokenlen++] = qkm.id; in send_new_token()
542 auto rv = ngtcp2_conn_submit_new_token(conn_, token.data(), tokenlen); in send_new_token()
572 size_t tokenlen, ngtcp2_token_type token_type) { in init()
658 settings.tokenlen = tokenlen; in init()
568 init(const UpstreamAddr *faddr, const Address &remote_addr, const Address &local_addr, const ngtcp2_pkt_hd &initial_hd, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, ngtcp2_token_type token_type) init() argument
H A Dshrpx_http3_upstream.h92 const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen,
/third_party/node/deps/ngtcp2/ngtcp2/crypto/
H A Dshared.c974 ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, in ngtcp2_crypto_verify_retry_token()
997 if (tokenlen != NGTCP2_CRYPTO_MAX_RETRY_TOKENLEN || in ngtcp2_crypto_verify_retry_token()
1002 rand_data = token + tokenlen - NGTCP2_CRYPTO_TOKEN_RAND_DATALEN; in ngtcp2_crypto_verify_retry_token()
1004 ciphertextlen = tokenlen - 1 - NGTCP2_CRYPTO_TOKEN_RAND_DATALEN; in ngtcp2_crypto_verify_retry_token()
1150 int ngtcp2_crypto_verify_regular_token(const uint8_t *token, size_t tokenlen, in ngtcp2_crypto_verify_regular_token() argument
1173 if (tokenlen != NGTCP2_CRYPTO_MAX_REGULAR_TOKENLEN || in ngtcp2_crypto_verify_regular_token()
1178 rand_data = token + tokenlen - NGTCP2_CRYPTO_TOKEN_RAND_DATALEN; in ngtcp2_crypto_verify_regular_token()
1180 ciphertextlen = tokenlen - 1 - NGTCP2_CRYPTO_TOKEN_RAND_DATALEN; in ngtcp2_crypto_verify_regular_token()
1279 const uint8_t *token, size_t tokenlen) { in ngtcp2_crypto_write_retry()
1308 token, tokenlen, ngtcp2_crypto_encrypt_c in ngtcp2_crypto_write_retry()
973 ngtcp2_crypto_verify_retry_token( ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *dcid, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_retry_token() argument
1275 ngtcp2_crypto_write_retry(uint8_t *dest, size_t destlen, uint32_t version, const ngtcp2_cid *dcid, const ngtcp2_cid *scid, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen) ngtcp2_crypto_write_retry() argument
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/includes/ngtcp2/
H A Dngtcp2_crypto.h666 * the buffer pointed by |token| of length |tokenlen|. |secret| of
681 ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen,
712 * stored in the buffer pointed by |token| of length |tokenlen|.
721 const uint8_t *token, size_t tokenlen, const uint8_t *secret,
755 * |tokenlen| specifies its length.
764 size_t tokenlen);
/third_party/node/deps/ngtcp2/ngtcp2/lib/
H A Dngtcp2_pkt.c177 size_t tokenlen = 0; in ngtcp2_pkt_decode_hd_long() local
268 tokenlen = (size_t)vi; in ngtcp2_pkt_decode_hd_long()
269 len += tokenlen; in ngtcp2_pkt_decode_hd_long()
273 if (tokenlen) { in ngtcp2_pkt_decode_hd_long()
277 p += tokenlen; in ngtcp2_pkt_decode_hd_long()
312 dest->token.len = tokenlen; in ngtcp2_pkt_decode_hd_long()
313 p += ntokenlen + tokenlen; in ngtcp2_pkt_decode_hd_long()
2253 size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, in ngtcp2_pkt_write_retry()
2265 assert(tokenlen > 0); in ngtcp2_pkt_write_retry()
2281 /* unused = */ 0, odcid, token, tokenlen); in ngtcp2_pkt_write_retry()
2250 ngtcp2_pkt_write_retry( uint8_t *dest, size_t destlen, uint32_t version, const ngtcp2_cid *dcid, const ngtcp2_cid *scid, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx) ngtcp2_pkt_write_retry() argument
2319 ngtcp2_pkt_encode_pseudo_retry( uint8_t *dest, size_t destlen, const ngtcp2_pkt_hd *hd, uint8_t unused, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen) ngtcp2_pkt_encode_pseudo_retry() argument
[all...]
H A Dngtcp2_pkt.h1203 const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen);
H A Dngtcp2_conn.c12868 size_t tokenlen) { in ngtcp2_conn_submit_new_token()
12871 ngtcp2_vec tokenv = {(uint8_t *)token, tokenlen}; in ngtcp2_conn_submit_new_token()
12875 assert(tokenlen); in ngtcp2_conn_submit_new_token()
12867 ngtcp2_conn_submit_new_token(ngtcp2_conn *conn, const uint8_t *token, size_t tokenlen) ngtcp2_conn_submit_new_token() argument
/third_party/libcoap/examples/
H A Dcoap-client.c209 track_new_token(size_t tokenlen, uint8_t *token) { in track_new_token() argument
217 tracked_tokens[tracked_tokens_count].token = coap_new_binary(tokenlen); in track_new_token()
220 memcpy(tracked_tokens[tracked_tokens_count].token->s, token, tokenlen); in track_new_token()
268 size_t tokenlen; in coap_new_request() local
282 coap_session_new_token(session, &tokenlen, token); in coap_new_request()
284 memcpy(&the_token.s[the_token.length - tokenlen], token, tokenlen); in coap_new_request()
/third_party/node/deps/ngtcp2/ngtcp2/lib/includes/ngtcp2/
H A Dngtcp2.h3621 * specifies Retry Token, and |tokenlen| specifies its length. |aead|
3639 size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead,
4858 * |tokenlen| must not be 0.
4861 * length |tokenlen|.
4871 size_t tokenlen);

Completed in 40 milliseconds