/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
D | ieee802_1x_key.c | 41 int lab_len, ctx_len, ret_len, buf_len; in aes_kdf() local 48 ctx_len = (ctx_bits + 7) / 8; in aes_kdf() 50 buf_len = lab_len + ctx_len + 4; in aes_kdf() 63 os_memcpy(buf + lab_len + 2, context, ctx_len); in aes_kdf() 114 size_t ctx_len = sid_bytes + ETH_ALEN * 2; in ieee802_1x_ckn_aes_cmac() local 116 context = os_zalloc(ctx_len); in ieee802_1x_ckn_aes_cmac() 125 context, ctx_len * 8, 128, ckn); in ieee802_1x_ckn_aes_cmac()
|
D | ieee802_1x_kay.c | 2120 int ctx_len, ctx_offset; in ieee802_1x_kay_generate_new_sak() local 2159 ctx_len = key_len + sizeof(kay->dist_kn); in ieee802_1x_kay_generate_new_sak() 2162 ctx_len += sizeof(peer->mi); in ieee802_1x_kay_generate_new_sak() 2163 ctx_len += sizeof(participant->mi); in ieee802_1x_kay_generate_new_sak() 2165 context = os_zalloc(ctx_len); in ieee802_1x_kay_generate_new_sak() 2187 context, ctx_len, in ieee802_1x_kay_generate_new_sak()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
D | ieee802_1x_key.c | 41 int lab_len, ctx_len, ret_len, buf_len; in aes_kdf() local 48 ctx_len = (ctx_bits + 7) / 8; in aes_kdf() 50 buf_len = lab_len + ctx_len + 4; in aes_kdf() 63 os_memcpy(buf + lab_len + 2, context, ctx_len); in aes_kdf() 114 size_t ctx_len = sid_bytes + ETH_ALEN * 2; in ieee802_1x_ckn_aes_cmac() local 116 context = os_zalloc(ctx_len); in ieee802_1x_ckn_aes_cmac() 125 context, ctx_len * 8, 128, ckn); in ieee802_1x_ckn_aes_cmac()
|
D | ieee802_1x_kay.c | 2083 int ctx_len, ctx_offset; in ieee802_1x_kay_generate_new_sak() local 2122 ctx_len = key_len + sizeof(kay->dist_kn); in ieee802_1x_kay_generate_new_sak() 2125 ctx_len += sizeof(peer->mi); in ieee802_1x_kay_generate_new_sak() 2126 ctx_len += sizeof(participant->mi); in ieee802_1x_kay_generate_new_sak() 2128 context = os_zalloc(ctx_len); in ieee802_1x_kay_generate_new_sak() 2150 context, ctx_len, in ieee802_1x_kay_generate_new_sak()
|
/third_party/mbedtls/library/ |
D | ssl_tls13_keys.c | 99 const unsigned char *ctx, size_t ctx_len, in ssl_tls13_hkdf_encode_label() argument 105 SSL_TLS1_3_KEY_SCHEDULE_HKDF_LABEL_LEN( total_label_len, ctx_len ); in ssl_tls13_hkdf_encode_label() 128 *p++ = MBEDTLS_BYTE_0( ctx_len ); in ssl_tls13_hkdf_encode_label() 129 if( ctx_len != 0 ) in ssl_tls13_hkdf_encode_label() 130 memcpy( p, ctx, ctx_len ); in ssl_tls13_hkdf_encode_label() 140 const unsigned char *ctx, size_t ctx_len, in mbedtls_ssl_tls13_hkdf_expand_label() argument 155 if( ctx_len > MBEDTLS_SSL_TLS1_3_KEY_SCHEDULE_MAX_CONTEXT_LEN ) in mbedtls_ssl_tls13_hkdf_expand_label() 173 ctx, ctx_len, in mbedtls_ssl_tls13_hkdf_expand_label() 250 const unsigned char *ctx, size_t ctx_len, in mbedtls_ssl_tls13_derive_secret() argument 264 ret = mbedtls_md( md_info, ctx, ctx_len, hashed_context ); in mbedtls_ssl_tls13_derive_secret() [all …]
|
D | ssl_tls13_keys.h | 120 const unsigned char *ctx, size_t ctx_len, 208 const unsigned char *ctx, size_t ctx_len,
|
/third_party/libnl/lib/xfrm/ |
D | sp.c | 124 len = sizeof (struct xfrmnl_user_sec_ctx) + src->sec_ctx->ctx_len; in xfrm_sp_clone() 163 (a->sec_ctx->ctx_len != b->sec_ctx->ctx_len) || in xfrm_sp_compare() 398 sp->sec_ctx->ctx_alg, sp->sec_ctx->ctx_doi, sp->sec_ctx->ctx_len); in xfrm_sp_dump_line() 603 len = sizeof (struct xfrmnl_user_sec_ctx) + ctx->ctx_len; in xfrmnl_sp_parse() 833 len = (sizeof (struct xfrm_user_sec_ctx)) + tmpl->sec_ctx->ctx_len; in build_xfrm_sp_message() 998 len = (sizeof (struct xfrm_user_sec_ctx)) + tmpl->sec_ctx->ctx_len; in build_xfrm_sp_delete_message() 1224 … unsigned int* exttype, unsigned int* alg, unsigned int* doi, unsigned int* ctx_len, char* ctx_str) in xfrmnl_sp_get_sec_ctx() argument 1229 *len = sizeof (struct xfrmnl_user_sec_ctx) + sp->sec_ctx->ctx_len; in xfrmnl_sp_get_sec_ctx() 1236 if (ctx_len) in xfrmnl_sp_get_sec_ctx() 1237 *ctx_len = sp->sec_ctx->ctx_len; in xfrmnl_sp_get_sec_ctx() [all …]
|
D | sa.c | 198 len = sizeof (*src->sec_ctx) + src->sec_ctx->ctx_len; in xfrm_sa_clone() 263 (a->sec_ctx->ctx_len != b->sec_ctx->ctx_len) || in xfrm_sa_compare() 511 sa->sec_ctx->ctx_alg, sa->sec_ctx->ctx_len, sa->sec_ctx->ctx); in xfrm_sa_dump_line() 875 len = sizeof (struct xfrmnl_user_sec_ctx) + sec_ctx->ctx_len; in xfrmnl_sa_parse() 1245 len = sizeof (struct xfrm_sec_ctx) + tmpl->sec_ctx->ctx_len; in build_xfrm_sa_message() 2000 *len = sa->sec_ctx->ctx_len; in xfrmnl_sa_get_sec_ctx() 2002 memcpy (ctx_str, sa->sec_ctx->ctx, sa->sec_ctx->ctx_len); in xfrmnl_sa_get_sec_ctx() 2035 b->ctx_len = len; in xfrmnl_sa_set_sec_ctx()
|
/third_party/openssl/apps/ |
D | sess_id.c | 105 size_t ctx_len = strlen(context); in sess_id_main() local 106 if (ctx_len > SSL_MAX_SID_CTX_LENGTH) { in sess_id_main() 111 ctx_len)) { in sess_id_main()
|
/third_party/ltp/tools/sparse/sparse-src/ |
D | semind.c | 602 int ctx_len; member 617 sqlite_bind_text(insert_rec_stmt, "@context", rec->context, rec->ctx_len); in insert_record() 728 rec.ctx_len = ctx->len; in r_symbol() 767 rec.ctx_len = ctx->len; in r_member()
|
/third_party/libnl/include/linux-private/linux/ |
D | xfrm.h | 34 __u16 ctx_len; member 233 __u16 ctx_len; member
|
/third_party/libnl/include/netlink-private/ |
D | types.h | 1289 uint16_t ctx_len; member
|