Home
last modified time | relevance | path

Searched refs:keyname_len (Results 1 - 12 of 12) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_common.h18 u8 keyname_len; member
H A Deap_common.c253 tlvs->keyname_len = tlv_len; in erp_parse_tlvs()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_common.h18 u8 keyname_len; member
H A Deap_common.c253 tlvs->keyname_len = tlv_len; in erp_parse_tlvs()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server.c846 parse.keyname, parse.keyname_len); in SM_STATE()
847 if (parse.keyname_len > 253) { in SM_STATE()
852 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
853 nai[parse.keyname_len] = '\0'; in SM_STATE()
866 parse.keyname_len); in SM_STATE()
869 sm->identity_len = parse.keyname_len; in SM_STATE()
888 start = parse.keyname + parse.keyname_len; in SM_STATE()
2057 parse.keyname, parse.keyname_len); in eap_erp_update_identity()
2059 sm->identity = os_malloc(parse.keyname_len); in eap_erp_update_identity()
2061 os_memcpy(sm->identity, parse.keyname, parse.keyname_len); in eap_erp_update_identity()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server.c855 parse.keyname, parse.keyname_len); in SM_STATE()
856 if (parse.keyname_len > 253) { in SM_STATE()
861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
862 nai[parse.keyname_len] = '\0'; in SM_STATE()
875 parse.keyname_len); in SM_STATE()
878 sm->identity_len = parse.keyname_len; in SM_STATE()
897 start = parse.keyname + parse.keyname_len; in SM_STATE()
2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity()
2036 sm->identity = os_malloc(parse.keyname_len); in eap_erp_update_identity()
2038 os_memcpy(sm->identity, parse.keyname, parse.keyname_len); in eap_erp_update_identity()
[all...]
/third_party/node/src/quic/
H A Dsessionticket.cc120 size_t keyname_len, in DecryptedCallback()
117 DecryptedCallback(SSL* ssl, SSL_SESSION* session, const unsigned char* keyname, size_t keyname_len, SSL_TICKET_STATUS status, void* arg) DecryptedCallback() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap.c1847 parse.keyname, parse.keyname_len); in eap_peer_finish()
1848 if (parse.keyname_len > 253) { in eap_peer_finish()
1853 os_memcpy(nai, parse.keyname, parse.keyname_len); in eap_peer_finish()
1854 nai[parse.keyname_len] = '\0'; in eap_peer_finish()
1864 start = parse.keyname + parse.keyname_len; in eap_peer_finish()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap.c1892 parse.keyname, parse.keyname_len); in eap_peer_finish()
1893 if (parse.keyname_len > 253) { in eap_peer_finish()
1898 os_memcpy(nai, parse.keyname, parse.keyname_len); in eap_peer_finish()
1899 nai[parse.keyname_len] = '\0'; in eap_peer_finish()
1909 start = parse.keyname + parse.keyname_len; in eap_peer_finish()
/third_party/node/deps/openssl/openssl/ssl/
H A Dt1_lib.c2012 size_t keyname_len = eticklen; in tls_decrypt_ticket() local
2015 if (keyname_len > TLSEXT_KEYNAME_LENGTH) in tls_decrypt_ticket()
2016 keyname_len = TLSEXT_KEYNAME_LENGTH; in tls_decrypt_ticket()
2017 retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len, in tls_decrypt_ticket()
/third_party/openssl/ssl/
H A Dt1_lib.c1992 size_t keyname_len = eticklen; in tls_decrypt_ticket() local
1995 if (keyname_len > TLSEXT_KEYNAME_LENGTH) in tls_decrypt_ticket()
1996 keyname_len = TLSEXT_KEYNAME_LENGTH; in tls_decrypt_ticket()
1997 retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len, in tls_decrypt_ticket()
/third_party/openssl/test/helpers/
H A Dhandshake.c463 size_t keyname_len, in decrypt_session_ticket_cb()
461 decrypt_session_ticket_cb(SSL *s, SSL_SESSION *ss, const unsigned char *keyname, size_t keyname_len, SSL_TICKET_STATUS status, void *arg) decrypt_session_ticket_cb() argument

Completed in 23 milliseconds