/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_pax.c | 42 size_t cid_len; member 154 (u8 *) data->cid, data->cid_len, NULL, 0, pos) < 0) { in eap_pax_build_std_3() 310 size_t len, left, cid_len; in eap_pax_process_std_2() local 343 cid_len = WPA_GET_BE16(pos); in eap_pax_process_std_2() 344 if (cid_len > 1500) { in eap_pax_process_std_2() 348 data->cid_len = cid_len; in eap_pax_process_std_2() 350 data->cid = os_memdup(pos + 2, data->cid_len); in eap_pax_process_std_2() 356 pos += 2 + data->cid_len; in eap_pax_process_std_2() 357 left -= 2 + data->cid_len; in eap_pax_process_std_2() 359 (u8 *) data->cid, data->cid_len); in eap_pax_process_std_2() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_pax.c | 42 size_t cid_len; member 154 (u8 *) data->cid, data->cid_len, NULL, 0, pos) < 0) { in eap_pax_build_std_3() 310 size_t len, left, cid_len; in eap_pax_process_std_2() local 343 cid_len = WPA_GET_BE16(pos); in eap_pax_process_std_2() 344 if (cid_len > 1500) { in eap_pax_process_std_2() 348 data->cid_len = cid_len; in eap_pax_process_std_2() 350 data->cid = os_memdup(pos + 2, data->cid_len); in eap_pax_process_std_2() 356 pos += 2 + data->cid_len; in eap_pax_process_std_2() 357 left -= 2 + data->cid_len; in eap_pax_process_std_2() 359 (u8 *) data->cid, data->cid_len); in eap_pax_process_std_2() [all …]
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_context_info.c | 900 uint8_t cid_len; in print_deserialized_ssl_context() local 903 cid_len = *ssl++; in print_deserialized_ssl_context() 904 printf_dbg( "In CID length %u\n", (uint32_t) cid_len ); in print_deserialized_ssl_context() 907 if( cid_len > 0 ) in print_deserialized_ssl_context() 909 CHECK_SSL_END( cid_len ); in print_deserialized_ssl_context() 910 print_hex( ssl, cid_len, 20, "\t" ); in print_deserialized_ssl_context() 911 ssl += cid_len; in print_deserialized_ssl_context() 919 cid_len = *ssl++; in print_deserialized_ssl_context() 920 printf_dbg( "Out CID length %u\n", (uint32_t) cid_len ); in print_deserialized_ssl_context() 923 if( cid_len > 0 ) in print_deserialized_ssl_context() [all …]
|
D | ssl_client2.c | 671 size_t cid_len = 0; in main() local 1428 opt.cid_val, &cid_len ) != 0 ) in main() 1746 cid_len != cid_renego_len ) in main() 1753 ret = mbedtls_ssl_conf_cid( &conf, cid_len, in main() 2023 cid, cid_len ) ) != 0 ) in main()
|
D | ssl_server2.c | 1359 size_t cid_len = 0; in main() local 2151 opt.cid_val, &cid_len ) != 0 ) in main() 2608 cid_len != cid_renego_len ) in main() 2615 ret = mbedtls_ssl_conf_cid( &conf, cid_len, in main() 3035 cid, cid_len ) ) != 0 ) in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_pax.c | 36 size_t cid_len; member 77 data->cid_len = identity_len; in eap_pax_init() 189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + in eap_pax_process_std_1() 200 wpabuf_put_be16(resp, data->cid_len); in eap_pax_process_std_1() 201 wpabuf_put_data(resp, data->cid, data->cid_len); in eap_pax_process_std_1() 203 (u8 *) data->cid, data->cid_len); in eap_pax_process_std_1() 210 (u8 *) data->cid, data->cid_len, rpos); in eap_pax_process_std_1() 280 (u8 *) data->cid, data->cid_len, NULL, 0, mac) < 0) { in eap_pax_process_std_3()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_pax.c | 36 size_t cid_len; member 77 data->cid_len = identity_len; in eap_pax_init() 189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + in eap_pax_process_std_1() 200 wpabuf_put_be16(resp, data->cid_len); in eap_pax_process_std_1() 201 wpabuf_put_data(resp, data->cid, data->cid_len); in eap_pax_process_std_1() 203 (u8 *) data->cid, data->cid_len); in eap_pax_process_std_1() 210 (u8 *) data->cid, data->cid_len, rpos); in eap_pax_process_std_1() 280 (u8 *) data->cid, data->cid_len, NULL, 0, mac) < 0) { in eap_pax_process_std_3()
|
/third_party/mbedtls/library/ |
D | ssl_msg.c | 447 if( rec->cid_len != 0 ) in ssl_extract_add_data_from_record() 449 memcpy( cur, rec->cid, rec->cid_len ); in ssl_extract_add_data_from_record() 450 cur += rec->cid_len; in ssl_extract_add_data_from_record() 452 *cur = rec->cid_len; in ssl_extract_add_data_from_record() 558 || rec->cid_len != 0 in mbedtls_ssl_encrypt_buf() 617 rec->cid_len = transform->out_cid_len; in mbedtls_ssl_encrypt_buf() 619 MBEDTLS_SSL_DEBUG_BUF( 3, "CID", rec->cid, rec->cid_len ); in mbedtls_ssl_encrypt_buf() 621 if( rec->cid_len != 0 ) in mbedtls_ssl_encrypt_buf() 1031 if( rec->cid_len != transform->in_cid_len || in mbedtls_ssl_decrypt_buf() 1032 memcmp( rec->cid, transform->in_cid, rec->cid_len ) != 0 ) in mbedtls_ssl_decrypt_buf() [all …]
|
D | ssl_misc.h | 1009 uint8_t cid_len; /* Length of the CID (0 if not present) */ member
|
D | ssl_tls.c | 74 conf->cid_len = len; in mbedtls_ssl_conf_cid() 95 if( own_cid_len != ssl->conf->cid_len ) in mbedtls_ssl_set_cid() 99 (unsigned) ssl->conf->cid_len ) ); in mbedtls_ssl_set_cid()
|
/third_party/mbedtls/include/mbedtls/ |
D | ssl.h | 1337 size_t MBEDTLS_PRIVATE(cid_len); /*!< The length of CIDs for incoming DTLS records. */
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ssl.function | 3223 rec.cid_len = 0; 3248 if( rec.cid_len != 0 ) 3363 rec.cid_len = 0; 3412 if( rec.cid_len != 0 ) 3540 rec.cid_len = 0; 4020 rec.cid_len = 0;
|