/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_common.h | 18 u8 keyname_len; member
|
H A D | eap_common.c | 253 tlvs->keyname_len = tlv_len; in erp_parse_tlvs()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_common.h | 18 u8 keyname_len; member
|
H A D | eap_common.c | 253 tlvs->keyname_len = tlv_len; in erp_parse_tlvs()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 846 parse.keyname, parse.keyname_len); in SM_STATE() 847 if (parse.keyname_len > 253) { in SM_STATE() 852 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE() 853 nai[parse.keyname_len] = '\0'; in SM_STATE() 866 parse.keyname_len); in SM_STATE() 869 sm->identity_len = parse.keyname_len; in SM_STATE() 888 start = parse.keyname + parse.keyname_len; in SM_STATE() 2057 parse.keyname, parse.keyname_len); in eap_erp_update_identity() 2059 sm->identity = os_malloc(parse.keyname_len); in eap_erp_update_identity() 2061 os_memcpy(sm->identity, parse.keyname, parse.keyname_len); in eap_erp_update_identity() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server.c | 855 parse.keyname, parse.keyname_len); in SM_STATE() 856 if (parse.keyname_len > 253) { in SM_STATE() 861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE() 862 nai[parse.keyname_len] = '\0'; in SM_STATE() 875 parse.keyname_len); in SM_STATE() 878 sm->identity_len = parse.keyname_len; in SM_STATE() 897 start = parse.keyname + parse.keyname_len; in SM_STATE() 2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity() 2036 sm->identity = os_malloc(parse.keyname_len); in eap_erp_update_identity() 2038 os_memcpy(sm->identity, parse.keyname, parse.keyname_len); in eap_erp_update_identity() [all...] |
/third_party/node/src/quic/ |
H A D | sessionticket.cc | 120 size_t keyname_len, in DecryptedCallback() 117 DecryptedCallback(SSL* ssl, SSL_SESSION* session, const unsigned char* keyname, size_t keyname_len, SSL_TICKET_STATUS status, void* arg) DecryptedCallback() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap.c | 1847 parse.keyname, parse.keyname_len); in eap_peer_finish() 1848 if (parse.keyname_len > 253) { in eap_peer_finish() 1853 os_memcpy(nai, parse.keyname, parse.keyname_len); in eap_peer_finish() 1854 nai[parse.keyname_len] = '\0'; in eap_peer_finish() 1864 start = parse.keyname + parse.keyname_len; in eap_peer_finish()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap.c | 1892 parse.keyname, parse.keyname_len); in eap_peer_finish() 1893 if (parse.keyname_len > 253) { in eap_peer_finish() 1898 os_memcpy(nai, parse.keyname, parse.keyname_len); in eap_peer_finish() 1899 nai[parse.keyname_len] = '\0'; in eap_peer_finish() 1909 start = parse.keyname + parse.keyname_len; in eap_peer_finish()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_lib.c | 2012 size_t keyname_len = eticklen; in tls_decrypt_ticket() local 2015 if (keyname_len > TLSEXT_KEYNAME_LENGTH) in tls_decrypt_ticket() 2016 keyname_len = TLSEXT_KEYNAME_LENGTH; in tls_decrypt_ticket() 2017 retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len, in tls_decrypt_ticket()
|
/third_party/openssl/ssl/ |
H A D | t1_lib.c | 1992 size_t keyname_len = eticklen; in tls_decrypt_ticket() local 1995 if (keyname_len > TLSEXT_KEYNAME_LENGTH) in tls_decrypt_ticket() 1996 keyname_len = TLSEXT_KEYNAME_LENGTH; in tls_decrypt_ticket() 1997 retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len, in tls_decrypt_ticket()
|
/third_party/openssl/test/helpers/ |
H A D | handshake.c | 463 size_t keyname_len, in decrypt_session_ticket_cb() 461 decrypt_session_ticket_cb(SSL *s, SSL_SESSION *ss, const unsigned char *keyname, size_t keyname_len, SSL_TICKET_STATUS status, void *arg) decrypt_session_ticket_cb() argument
|