Home
last modified time | relevance | path

Searched refs:sid_len (Results 1 - 25 of 79) sorted by relevance

1234

/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dwpas_kay.c325 size_t sid_len = 128; in ieee802_1x_notify_create_actor() local
339 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor()
351 if (ieee802_1x_auth_get_session_id(wpa_s, wpa_s->bssid, sid, &sid_len)) in ieee802_1x_notify_create_actor()
371 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dwpas_kay.c325 size_t sid_len = 128; in ieee802_1x_notify_create_actor() local
339 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor()
351 if (ieee802_1x_auth_get_session_id(wpa_s, wpa_s->bssid, sid, &sid_len)) in ieee802_1x_notify_create_actor()
371 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_ikev2.c485 size_t sid_len; in eap_ikev2_get_session_id() local
491 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id()
492 sid = os_malloc(sid_len); in eap_ikev2_get_session_id()
502 *len = sid_len; in eap_ikev2_get_session_id()
504 sid, sid_len); in eap_ikev2_get_session_id()
H A Deap_eke.c748 size_t sid_len; in eap_eke_get_session_id() local
753 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id()
754 sid = os_malloc(sid_len); in eap_eke_get_session_id()
761 *len = sid_len; in eap_eke_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_ikev2.c523 size_t sid_len; in eap_ikev2_get_session_id() local
529 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id()
530 sid = os_malloc(sid_len); in eap_ikev2_get_session_id()
540 *len = sid_len; in eap_ikev2_get_session_id()
542 sid, sid_len); in eap_ikev2_get_session_id()
H A Deap_server_eke.c770 size_t sid_len; in eap_eke_get_session_id() local
775 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id()
776 sid = os_malloc(sid_len); in eap_eke_get_session_id()
783 *len = sid_len; in eap_eke_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_ikev2.c485 size_t sid_len; in eap_ikev2_get_session_id() local
491 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id()
492 sid = os_malloc(sid_len); in eap_ikev2_get_session_id()
502 *len = sid_len; in eap_ikev2_get_session_id()
504 sid, sid_len); in eap_ikev2_get_session_id()
H A Deap_eke.c748 size_t sid_len; in eap_eke_get_session_id() local
753 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id()
754 sid = os_malloc(sid_len); in eap_eke_get_session_id()
761 *len = sid_len; in eap_eke_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_ikev2.c523 size_t sid_len; in eap_ikev2_get_session_id() local
529 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id()
530 sid = os_malloc(sid_len); in eap_ikev2_get_session_id()
540 *len = sid_len; in eap_ikev2_get_session_id()
542 sid, sid_len); in eap_ikev2_get_session_id()
H A Deap_server_eke.c771 size_t sid_len; in eap_eke_get_session_id() local
776 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id()
777 sid = os_malloc(sid_len); in eap_eke_get_session_id()
784 *len = sid_len; in eap_eke_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth_kay.c413 size_t sid_len = 128; in ieee802_1x_notify_create_actor_hapd() local
427 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor_hapd()
439 if (ieee802_1x_auth_get_session_id(hapd, sta, sid, &sid_len)) in ieee802_1x_notify_create_actor_hapd()
461 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth_kay.c413 size_t sid_len = 128; in ieee802_1x_notify_create_actor_hapd() local
427 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor_hapd()
439 if (ieee802_1x_auth_get_session_id(hapd, sta, sid, &sid_len)) in ieee802_1x_notify_create_actor_hapd()
461 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_gpsk_common.h61 u8 method_type, u8 *sid, size_t *sid_len);
H A Deap_gpsk_common.c414 * @sid_len: Buffer for returning length of Session ID
422 u8 method_type, u8 *sid, size_t *sid_len) in eap_gpsk_derive_session_id()
468 *sid_len = 1 + sizeof(kdf_out); in eap_gpsk_derive_session_id()
417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) eap_gpsk_derive_session_id() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_gpsk_common.h61 u8 method_type, u8 *sid, size_t *sid_len);
H A Deap_gpsk_common.c414 * @sid_len: Buffer for returning length of Session ID
422 u8 method_type, u8 *sid, size_t *sid_len) in eap_gpsk_derive_session_id()
468 *sid_len = 1 + sizeof(kdf_out); in eap_gpsk_derive_session_id()
417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) eap_gpsk_derive_session_id() argument
/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_sess.c887 unsigned int sid_len) in SSL_SESSION_set1_id()
889 if (sid_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in SSL_SESSION_set1_id()
893 s->session_id_length = sid_len; in SSL_SESSION_set1_id()
895 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
886 SSL_SESSION_set1_id(SSL_SESSION *s, const unsigned char *sid, unsigned int sid_len) SSL_SESSION_set1_id() argument
/third_party/openssl/ssl/
H A Dssl_sess.c921 unsigned int sid_len) in SSL_SESSION_set1_id()
923 if (sid_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in SSL_SESSION_set1_id()
927 s->session_id_length = sid_len; in SSL_SESSION_set1_id()
929 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
920 SSL_SESSION_set1_id(SSL_SESSION *s, const unsigned char *sid, unsigned int sid_len) SSL_SESSION_set1_id() argument
/third_party/mbedtls/library/
H A Dssl_msg.c3478 size_t sid_len, cookie_len, epoch, fragment_offset; in mbedtls_ssl_check_dtls_clihlo_cookie() local
3501 * 59-xx SessionID session_id; 1 byte len + sid_len content in mbedtls_ssl_check_dtls_clihlo_cookie()
3527 sid_len = in[59]; in mbedtls_ssl_check_dtls_clihlo_cookie()
3528 if (59 + 1 + sid_len + 1 > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie()
3529 MBEDTLS_SSL_DEBUG_MSG(4, ("check cookie: sid_len=%u > %u", in mbedtls_ssl_check_dtls_clihlo_cookie()
3530 (unsigned) sid_len, in mbedtls_ssl_check_dtls_clihlo_cookie()
3535 in + 60, sid_len); in mbedtls_ssl_check_dtls_clihlo_cookie()
3537 cookie_len = in[60 + sid_len]; in mbedtls_ssl_check_dtls_clihlo_cookie()
3538 if (59 + 1 + sid_len + 1 + cookie_len > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie()
3541 (unsigned) (in_len - sid_len in mbedtls_ssl_check_dtls_clihlo_cookie()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/
H A Dieee802_1x_kay_i.h72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/
H A Dieee802_1x_kay_i.h72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
/third_party/openssl/ohos_lite/include/openssl/
H A Dssl.h1648 unsigned int sid_len);
/third_party/node/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/
H A Dssl.h1758 unsigned int sid_len);
/third_party/node/deps/openssl/config/archs/linux-elf/asm/include/openssl/
H A Dssl.h1758 unsigned int sid_len);
/third_party/node/deps/openssl/config/archs/linux-aarch64/asm/include/openssl/
H A Dssl.h1758 unsigned int sid_len);

Completed in 42 milliseconds

1234