/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() 180 if (*res_len < 8) { in milenage_generate() 181 *res_len = 0; in milenage_generate() 186 *res_len = 0; in milenage_generate() 189 *res_len = 8; in milenage_generate() 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() 284 *res_len = 8; in milenage_check() 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); in milenage_check() 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) milenage_generate() argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) milenage_check() argument [all...] |
H A D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
H A D | tls_internal.c | 490 size_t res_len, ad_len; in tls_connection_handshake2() local 500 &res_len, &ad, &ad_len, need_more_data); in tls_connection_handshake2() 503 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_handshake2() 533 size_t res_len; in tls_connection_server_handshake() local 543 wpabuf_len(in_data), &res_len); in tls_connection_server_handshake() 548 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_server_handshake()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() 180 if (*res_len < 8) { in milenage_generate() 181 *res_len = 0; in milenage_generate() 186 *res_len = 0; in milenage_generate() 189 *res_len = 8; in milenage_generate() 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() 284 *res_len = 8; in milenage_check() 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); in milenage_check() 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) milenage_generate() argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) milenage_check() argument [all...] |
H A D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
H A D | tls_internal.c | 490 size_t res_len, ad_len; in tls_connection_handshake2() local 500 &res_len, &ad, &ad_len, need_more_data); in tls_connection_handshake2() 503 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_handshake2() 533 size_t res_len; in tls_connection_server_handshake() local 543 wpabuf_len(in_data), &res_len); in tls_connection_server_handshake() 548 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_server_handshake()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | hlr_auc_gw.c | 90 size_t res_len; member 130 " res_len INTEGER" in db_table_create_milenage() 197 if (os_strcmp(col[i], "res_len") == 0 && argv[i]) { in get_milenage_cb() 198 m->res_len = atoi(argv[i]); in get_milenage_cb() 473 m->res_len = atoi(pos); in read_milenage() 474 if (m->res_len && in read_milenage() 475 (m->res_len < EAP_AKA_RES_MIN_LEN || in read_milenage() 476 m->res_len > EAP_AKA_RES_MAX_LEN)) { in read_milenage() 743 size_t res_len; in aka_req_auth() local 752 res_len in aka_req_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | hlr_auc_gw.c | 90 size_t res_len; member 130 " res_len INTEGER" in db_table_create_milenage() 197 if (os_strcmp(col[i], "res_len") == 0 && argv[i]) { in get_milenage_cb() 198 m->res_len = atoi(argv[i]); in get_milenage_cb() 473 m->res_len = atoi(pos); in read_milenage() 474 if (m->res_len && in read_milenage() 475 (m->res_len < EAP_AKA_RES_MIN_LEN || in read_milenage() 476 m->res_len > EAP_AKA_RES_MAX_LEN)) { in read_milenage() 743 size_t res_len; in aka_req_auth() local 752 res_len in aka_req_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | utils_module_tests.c | 299 size_t res_len; in base64_tests() local 303 res = base64_encode((const unsigned char *) "", ~0, &res_len); in base64_tests() 309 res = base64_encode((const unsigned char *) "=", 1, &res_len); in base64_tests() 310 if (!res || res_len != 5 || res[0] != 'P' || res[1] != 'Q' || in base64_tests() 321 res = base64_decode((const unsigned char *) "", 0, &res_len); in base64_tests() 327 res = base64_decode((const unsigned char *) "a", 1, &res_len); in base64_tests() 333 res = base64_decode((const unsigned char *) "====", 4, &res_len); in base64_tests() 339 res = base64_decode((const unsigned char *) "PQ==", 4, &res_len); in base64_tests() 340 if (!res || res_len != 1 || res[0] != '=') in base64_tests() 344 res = base64_decode((const unsigned char *) "P.Q-=!=*", 8, &res_len); in base64_tests() [all...] |
H A D | common.c | 733 size_t merge_byte_arrays(u8 *res, size_t res_len, in merge_byte_arrays() argument 739 os_memset(res, 0, res_len); in merge_byte_arrays() 742 if (src1_len >= res_len) { in merge_byte_arrays() 743 os_memcpy(res, src1, res_len); in merge_byte_arrays() 744 return res_len; in merge_byte_arrays() 752 if (len + src2_len >= res_len) { in merge_byte_arrays() 753 os_memcpy(res + len, src2, res_len - len); in merge_byte_arrays() 754 return res_len; in merge_byte_arrays()
|
H A D | pcsc_funcs.h | 23 unsigned char *res, size_t *res_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | utils_module_tests.c | 300 size_t res_len; in base64_tests() local 304 res2 = base64_encode("", ~0, &res_len); in base64_tests() 310 res2 = base64_encode("=", 1, &res_len); in base64_tests() 311 if (!res2 || res_len != 5 || res2[0] != 'P' || res2[1] != 'Q' || in base64_tests() 322 res = base64_decode("", 0, &res_len); in base64_tests() 328 res = base64_decode("a", 1, &res_len); in base64_tests() 334 res = base64_decode("====", 4, &res_len); in base64_tests() 340 res = base64_decode("PQ==", 4, &res_len); in base64_tests() 341 if (!res || res_len != 1 || res[0] != '=') in base64_tests() 345 res = base64_decode("P.Q-=!=*", 8, &res_len); in base64_tests() [all...] |
H A D | common.c | 775 size_t merge_byte_arrays(u8 *res, size_t res_len, in merge_byte_arrays() argument 781 os_memset(res, 0, res_len); in merge_byte_arrays() 784 if (src1_len >= res_len) { in merge_byte_arrays() 785 os_memcpy(res, src1, res_len); in merge_byte_arrays() 786 return res_len; in merge_byte_arrays() 794 if (len + src2_len >= res_len) { in merge_byte_arrays() 795 os_memcpy(res + len, src2, res_len - len); in merge_byte_arrays() 796 return res_len; in merge_byte_arrays()
|
H A D | pcsc_funcs.h | 23 unsigned char *res, size_t *res_len,
|
/third_party/ffmpeg/libavfilter/ |
H A D | avfilter.h | 378 int (*process_command)(AVFilterContext *, const char *cmd, const char *arg, char *res, int res_len, int flags); 756 int avfilter_process_command(AVFilterContext *filter, const char *cmd, const char *arg, char *res, int res_len, int flags); 1142 int avfilter_graph_send_command(AVFilterGraph *graph, const char *target, const char *cmd, const char *arg, char *res, int res_len, int flags);
|
H A D | af_compensationdelay.c | 149 char *res, int res_len, int flags) in process_command() 155 ret = ff_filter_process_command(ctx, cmd, args, res, res_len, flags); in process_command() 148 process_command(AVFilterContext *ctx, const char *cmd, const char *args, char *res, int res_len, int flags) process_command() argument
|
H A D | vf_lumakey.c | 155 char *res, int res_len, int flags) in process_command() 159 ret = ff_filter_process_command(ctx, cmd, args, res, res_len, flags); in process_command() 154 process_command(AVFilterContext *ctx, const char *cmd, const char *args, char *res, int res_len, int flags) process_command() argument
|
H A D | src_movie.c | 601 char *res, int res_len, int flags) in process_command() 626 if (!res || res_len <= 0) in process_command() 632 print_len = snprintf(res, res_len, "%"PRId64, movie->format_ctx->duration); in process_command() 633 if (print_len < 0 || print_len >= res_len) in process_command() 600 process_command(AVFilterContext *ctx, const char *cmd, const char *args, char *res, int res_len, int flags) process_command() argument
|
/third_party/jerryscript/jerry-core/api/ |
H A D | generate-bytecode.c | 52 int res_len = len1 + len2 + 1; // str1 + "/" + str2 in splice_path() local 54 char* res = (char*)OhosMalloc(MEM_TYPE_JERRY, (res_len + 1) * sizeof(char)); in splice_path() 58 if (memset_s(res, res_len + 1, 0, res_len + 1) != 0) { in splice_path() 69 || (strcat_s(res, res_len + 1, str2) != 0)) { in splice_path()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_aka.c | 34 size_t res_len; member 808 data->ck, data->res, &data->res_len, sm); in eap_aka_fullauth() 985 if (attr->res == NULL || attr->res_len < data->res_len || in eap_aka_process_challenge() 986 attr->res_len_bits != data->res_len * 8 || in eap_aka_process_challenge() 987 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { in eap_aka_process_challenge() 991 (unsigned long) attr->res_len, in eap_aka_process_challenge() 993 (unsigned long) data->res_len * 8); in eap_aka_process_challenge()
|
H A D | eap_sim_db.c | 55 size_t res_len; member 604 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth() 605 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth() 607 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth() 610 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth() 1378 * @res_len: Buffer for RES length 1395 u8 *res, size_t *res_len, void *cb_session_ctx) in eap_sim_db_get_aka_auth() 1436 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth() 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) eap_sim_db_get_aka_auth() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_aka.c | 34 size_t res_len; member 808 data->ck, data->res, &data->res_len, sm); in eap_aka_fullauth() 985 if (attr->res == NULL || attr->res_len < data->res_len || in eap_aka_process_challenge() 986 attr->res_len_bits != data->res_len * 8 || in eap_aka_process_challenge() 987 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { in eap_aka_process_challenge() 991 (unsigned long) attr->res_len, in eap_aka_process_challenge() 993 (unsigned long) data->res_len * 8); in eap_aka_process_challenge()
|
H A D | eap_sim_db.c | 55 size_t res_len; member 604 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth() 605 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth() 607 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth() 610 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth() 1378 * @res_len: Buffer for RES length 1395 u8 *res, size_t *res_len, void *cb_session_ctx) in eap_sim_db_get_aka_auth() 1436 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth() 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) eap_sim_db_get_aka_auth() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_aka.c | 24 size_t res_len; member 232 data->res_len = os_strlen(pos) / 2; in eap_aka_ext_sim_result() 233 if (data->res_len > EAP_AKA_RES_MAX_LEN) { in eap_aka_ext_sim_result() 234 data->res_len = 0; in eap_aka_ext_sim_result() 237 if (hexstr2bin(pos, data->res, data->res_len) < 0) in eap_aka_ext_sim_result() 239 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); in eap_aka_ext_sim_result() 270 data->autn, data->res, &data->res_len, in eap_aka_umts_auth() 305 data->res, &data->res_len, data->auts); in eap_aka_umts_auth() 316 data->res_len = EAP_AKA_RES_MAX_LEN; in eap_aka_umts_auth() 671 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * in eap_aka_response_challenge() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_aka.c | 24 size_t res_len; member 232 data->res_len = os_strlen(pos) / 2; in eap_aka_ext_sim_result() 233 if (data->res_len > EAP_AKA_RES_MAX_LEN) { in eap_aka_ext_sim_result() 234 data->res_len = 0; in eap_aka_ext_sim_result() 237 if (hexstr2bin(pos, data->res, data->res_len) < 0) in eap_aka_ext_sim_result() 239 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); in eap_aka_ext_sim_result() 270 data->autn, data->res, &data->res_len, in eap_aka_umts_auth() 305 data->res, &data->res_len, data->auts); in eap_aka_umts_auth() 316 data->res_len = EAP_AKA_RES_MAX_LEN; in eap_aka_umts_auth() 680 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * in eap_aka_response_challenge() [all...] |