Searched refs:peer_len (Results 1 - 8 of 8) sorted by relevance
/third_party/mbedtls/library/ |
H A D | psa_crypto_pake.c | 159 size_t user_len = 0, peer_len = 0, password_len = 0; in mbedtls_psa_pake_setup() local 174 status = psa_crypto_driver_pake_get_peer_len(inputs, &peer_len); in mbedtls_psa_pake_setup() 196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup() 215 peer_len, &actual_peer_len); in mbedtls_psa_pake_setup()
|
H A D | psa_crypto.c | 8352 size_t *peer_len) in psa_crypto_driver_pake_get_peer_len() 8354 if (inputs->peer_len == 0) { in psa_crypto_driver_pake_get_peer_len() 8358 *peer_len = inputs->peer_len; in psa_crypto_driver_pake_get_peer_len() 8367 if (inputs->peer_len == 0) { in psa_crypto_driver_pake_get_peer() 8371 if (peer_id_size < inputs->peer_len) { in psa_crypto_driver_pake_get_peer() 8375 memcpy(peer_id, inputs->peer, inputs->peer_len); in psa_crypto_driver_pake_get_peer() 8376 *peer_id_length = inputs->peer_len; in psa_crypto_driver_pake_get_peer() 8549 if (operation->data.inputs.peer_len != 0) { in psa_pake_set_peer() 8563 operation->data.inputs.peer_len in psa_pake_set_peer() 8350 psa_crypto_driver_pake_get_peer_len( const psa_crypto_driver_pake_inputs_t *inputs, size_t *peer_len) psa_crypto_driver_pake_get_peer_len() argument [all...] |
H A D | ssl_tls.c | 1976 size_t peer_len = 0; in mbedtls_ssl_set_hs_ecjpake_password_common() local 1993 peer_len = sizeof(jpake_client_id); in mbedtls_ssl_set_hs_ecjpake_password_common() 1998 peer_len = sizeof(jpake_server_id); in mbedtls_ssl_set_hs_ecjpake_password_common() 2006 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
|
/third_party/libwebsockets/plugins/ |
H A D | protocol_lws_sshd_demo.c | 249 const uint8_t *peer, int peer_len) in ssh_ops_is_pubkey_authorized() 298 if (peer_len > len) { in ssh_ops_is_pubkey_authorized() 299 lwsl_notice("peer_len %d bigger than decoded len %d\n", in ssh_ops_is_pubkey_authorized() 300 peer_len, len); in ssh_ops_is_pubkey_authorized() 308 if (memcmp(peer, ps, (unsigned int)peer_len)) { in ssh_ops_is_pubkey_authorized() 248 ssh_ops_is_pubkey_authorized(const char *username, const char *type, const uint8_t *peer, int peer_len) ssh_ops_is_pubkey_authorized() argument
|
/third_party/libwebsockets/test-apps/ |
H A D | test-sshd.c | 289 const uint8_t *peer, int peer_len) in ssh_ops_is_pubkey_authorized() 339 if (peer_len > len) { in ssh_ops_is_pubkey_authorized() 340 lwsl_notice("peer_len %d bigger than decoded len %d\n", in ssh_ops_is_pubkey_authorized() 341 peer_len, len); in ssh_ops_is_pubkey_authorized() 350 if (lws_timingsafe_bcmp(peer, ps, (uint32_t)peer_len)) { in ssh_ops_is_pubkey_authorized() 288 ssh_ops_is_pubkey_authorized(const char *username, const char *type, const uint8_t *peer, int peer_len) ssh_ops_is_pubkey_authorized() argument
|
/third_party/libwebsockets/plugins/ssh-base/include/ |
H A D | lws-plugin-ssh.h | 322 * \param peer_len: length of Public key at peer 333 const char *type, const uint8_t *peer, int peer_len);
|
/third_party/mbedtls/include/psa/ |
H A D | crypto_extra.h | 1100 * \param[out] peer_len Peer id length. 1109 size_t *peer_len); 1785 size_t MBEDTLS_PRIVATE(peer_len);
|
/third_party/ffmpeg/libavformat/ |
H A D | rtsp.c | 1731 socklen_t peer_len = sizeof(peer); in ff_rtsp_connect() local 1909 if (!getpeername(tcp_fd, (struct sockaddr*) &peer, &peer_len)) { in ff_rtsp_connect() 1910 getnameinfo((struct sockaddr*) &peer, peer_len, host, sizeof(host), in ff_rtsp_connect()
|
Completed in 29 milliseconds