/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_generate_session_id.pod | 14 unsigned int *id_len); 19 unsigned int id_len); 30 (of length B<id_len>) is already contained in the internal session cache 49 B<id> into and a pointer to the maximum allowed length B<id_len>. The 50 buffer at location B<id> is only guaranteed to have the size B<id_len>. 51 The callback is only allowed to generate a shorter id and reduce B<id_len>; 52 the callback B<must never> increase B<id_len> or write to the location 56 callback may only fill part of the possible length and leave B<id_len> 69 guarantee uniqueness, it is recommended to use the maximum B<id_len> and 102 unsigned int *id_len) [all …]
|
/third_party/elfutils/libdwfl/ |
D | dwfl_build_id_find_elf.c | 42 const size_t id_len, const uint8_t *id) in __libdwfl_open_by_build_id() argument 48 if (id_len < MIN_BUILD_ID_BYTES || id_len > MAX_BUILD_ID_BYTES) in __libdwfl_open_by_build_id() 64 for (size_t i = 1; i < id_len; ++i) in __libdwfl_open_by_build_id() 72 strcpy (&id_name[sizeof "/.build-id/" - 1 + 3 + (id_len - 1) * 2], in __libdwfl_open_by_build_id() 136 const size_t id_len = mod->build_id_len; in __libdwfl_open_mod_by_build_id() local 139 return __libdwfl_open_by_build_id (mod, debug, file_name, id_len, id); in __libdwfl_open_mod_by_build_id()
|
/third_party/elfutils/libdw/ |
D | dwarf_getalt.c | 112 size_t id_len = build_id_len; in find_debug_altlink() local 122 if (id_len >= MIN_BUILD_ID_BYTES && id_len <= MAX_BUILD_ID_BYTES) in find_debug_altlink() 130 for (size_t i = 1; i < id_len; ++i) in find_debug_altlink() 134 + 3 + (id_len - 1) * 2], ".debug"); in find_debug_altlink()
|
/third_party/openssl/crypto/sm2/ |
D | sm2_sign.c | 27 const size_t id_len, in ossl_sm2_compute_z_digest() argument 73 if (id_len >= (UINT16_MAX / 8)) { in ossl_sm2_compute_z_digest() 79 entl = (uint16_t)(8 * id_len); in ossl_sm2_compute_z_digest() 92 if (id_len > 0 && !EVP_DigestUpdate(hash, id, id_len)) { in ossl_sm2_compute_z_digest() 144 const size_t id_len, in sm2_compute_msg_hash() argument 172 if (!ossl_sm2_compute_z_digest(z, fetched_digest, id, id_len, key)) { in sm2_compute_msg_hash() 394 const size_t id_len, in ossl_sm2_do_sign() argument 400 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign() 417 const size_t id_len, in ossl_sm2_do_verify() argument 423 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_verify()
|
/third_party/openssl/ohos_lite/include/crypto/ |
D | sm2.h | 26 const size_t id_len, 35 const size_t id_len, 42 const size_t id_len,
|
/third_party/ltp/lib/ |
D | tst_kconfig.c | 149 if (vars[i].id_len != var_len) in kconfig_parse_line() 405 vars[cnt].id_len = get_len(j->tok, j->tok_len); in populate_vars() 407 if (vars[cnt].id_len + 1 >= sizeof(vars[cnt].id)) in populate_vars() 410 strncpy(vars[cnt].id, j->tok, vars[cnt].id_len); in populate_vars() 411 vars[cnt].id[vars[cnt].id_len] = 0; in populate_vars() 547 var.id_len = strlen(confname); in tst_kconfig_get() 549 if (var.id_len >= sizeof(var.id)) in tst_kconfig_get()
|
/third_party/openssl/include/crypto/ |
D | sm2.h | 31 const size_t id_len, 40 const size_t id_len, 47 const size_t id_len,
|
/third_party/openssl/providers/implementations/signature/ |
D | sm2_sig.c | 90 size_t id_len; member 262 || !ossl_sm2_compute_z_digest(z, ctx->md, ctx->id, ctx->id_len, in sm2sig_compute_z_digest() 367 dstctx->id = OPENSSL_malloc(srcctx->id_len); in sm2sig_dupctx() 370 dstctx->id_len = srcctx->id_len; in sm2sig_dupctx() 371 memcpy(dstctx->id, srcctx->id, srcctx->id_len); in sm2sig_dupctx() 446 psm2ctx->id_len = tmp_idlen; in sm2sig_set_ctx_params()
|
/third_party/mbedtls/library/ |
D | ssl_tls13_client.c | 728 MBEDTLS_SSL_CHK_BUF_PTR( p, end, ssl->session_negotiate->id_len + 1 ); in ssl_tls13_write_client_hello_body() 729 *p++ = (unsigned char)ssl->session_negotiate->id_len; in ssl_tls13_write_client_hello_body() 730 memcpy( p, ssl->session_negotiate->id, ssl->session_negotiate->id_len ); in ssl_tls13_write_client_hello_body() 731 p += ssl->session_negotiate->id_len; in ssl_tls13_write_client_hello_body() 734 ssl->session_negotiate->id_len ); in ssl_tls13_write_client_hello_body() 862 if( ssl->session_negotiate->id_len == 0 ) in ssl_tls13_prepare_client_hello() 871 ssl->session_negotiate->id_len = 32; in ssl_tls13_prepare_client_hello() 1015 if( ssl->session_negotiate->id_len != legacy_session_id_echo_len || in ssl_tls13_check_server_hello_session_id_echo() 1020 ssl->session_negotiate->id_len ); in ssl_tls13_check_server_hello_session_id_echo() 1034 ssl->session_negotiate->id_len ); in ssl_tls13_check_server_hello_session_id_echo()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_ttls.c | 92 u8 id_len; in eap_ttls_valid_session() local 95 id_len = sm->identity_len; in eap_ttls_valid_session() 97 id_len = 255; in eap_ttls_valid_session() 98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 1204 u8 id_len; in eap_ttls_process() local 1235 id_len = *pos++; in eap_ttls_process() 1237 pos, id_len); in eap_ttls_process() 1239 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process() 1246 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process() [all …]
|
D | eap_server_peap.c | 117 u8 id_len; in eap_peap_valid_session() local 120 id_len = sm->identity_len; in eap_peap_valid_session() 122 id_len = 255; in eap_peap_valid_session() 123 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session() 124 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session() 1261 u8 id_len; in eap_peap_process() local 1293 id_len = *pos++; in eap_peap_process() 1295 pos, id_len); in eap_peap_process() 1297 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process() 1304 os_memcpy(sm->identity, pos, id_len); in eap_peap_process() [all …]
|
D | eap_server_gpsk.c | 28 size_t id_len; member 429 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2() 435 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2() 619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 622 *len = data->id_len; in eap_gpsk_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_peap.c | 117 u8 id_len; in eap_peap_valid_session() local 120 id_len = sm->identity_len; in eap_peap_valid_session() 122 id_len = 255; in eap_peap_valid_session() 123 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session() 124 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session() 1230 u8 id_len; in eap_peap_process() local 1262 id_len = *pos++; in eap_peap_process() 1264 pos, id_len); in eap_peap_process() 1266 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process() 1273 os_memcpy(sm->identity, pos, id_len); in eap_peap_process() [all …]
|
D | eap_server_ttls.c | 92 u8 id_len; in eap_ttls_valid_session() local 95 id_len = sm->identity_len; in eap_ttls_valid_session() 97 id_len = 255; in eap_ttls_valid_session() 98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 1196 u8 id_len; in eap_ttls_process() local 1227 id_len = *pos++; in eap_ttls_process() 1229 pos, id_len); in eap_ttls_process() 1231 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process() 1238 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process() [all …]
|
D | eap_server_gpsk.c | 28 size_t id_len; member 428 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2() 434 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2() 618 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 621 *len = data->id_len; in eap_gpsk_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_tls.c | 25 size_t id_len; member 228 &data->id_len); in eap_tls_success() 231 data->session_id, data->id_len); in eap_tls_success() 414 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id() 418 *len = data->id_len; in eap_tls_get_session_id()
|
D | eap_gpsk.c | 27 size_t id_len; member 384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2() 391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2() 756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 759 *len = data->id_len; in eap_gpsk_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_tls.c | 25 size_t id_len; member 222 &data->id_len); in eap_tls_success() 225 data->session_id, data->id_len); in eap_tls_success() 412 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id() 416 *len = data->id_len; in eap_tls_get_session_id()
|
D | eap_gpsk.c | 27 size_t id_len; member 384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2() 391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2() 756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 759 *len = data->id_len; in eap_gpsk_get_session_id()
|
/third_party/libcoap/src/ |
D | coap_tinydtls.c | 201 const uint8_t *id, size_t id_len, in get_psk_info() argument 235 temp.length = id_len; in get_psk_info() 238 coap_log(LOG_DEBUG, "got psk_identity_hint: '%.*s'\n", (int)id_len, id ? (const char*)id : ""); in get_psk_info() 242 lhint.length = id_len; in get_psk_info() 271 …psk_len = coap_context->get_client_psk(coap_session, (const uint8_t*)id, id_len, (uint8_t*)result,… in get_psk_info() 285 …psk_len = coap_context->get_client_psk(coap_session, (const uint8_t*)id, id_len, psk, &identity_le… in get_psk_info() 302 coap_session->psk_identity = coap_new_bin_const(id, id_len); in get_psk_info() 305 (int)id_len, id); in get_psk_info() 309 lidentity.length = id_len; in get_psk_info() 325 …return (int)coap_context->get_server_psk(coap_session, (const uint8_t*)id, id_len, (uint8_t*)resul… in get_psk_info()
|
/third_party/elfutils/src/ |
D | stack.c | 159 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in module_callback() local 160 if (id_len > 0) in module_callback() 165 while (--id_len > 0); in module_callback() 261 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in print_frame() local 262 if (id_len > 0) in print_frame() 267 while (--id_len > 0); in print_frame()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_server.c | 564 size_t user_len, id_len; in radius_server_get_new_session() local 628 &id_len, NULL) == 0) { in radius_server_get_new_session() 632 if (id_len >= sizeof(buf)) in radius_server_get_new_session() 633 id_len = sizeof(buf) - 1; in radius_server_get_new_session() 634 os_memcpy(buf, id, id_len); in radius_server_get_new_session() 671 size_t id_len; in radius_srv_hs20_t_c_pending() local 679 id = eap_get_identity(sess->eap, &id_len); in radius_srv_hs20_t_c_pending() 682 id_str = os_malloc(id_len + 1); in radius_srv_hs20_t_c_pending() 685 os_memcpy(id_str, id, id_len); in radius_srv_hs20_t_c_pending() 686 id_str[id_len] = '\0'; in radius_srv_hs20_t_c_pending() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_server.c | 707 size_t user_len, id_len; in radius_server_get_new_session() local 771 &id_len, NULL) == 0) { in radius_server_get_new_session() 775 if (id_len >= sizeof(buf)) in radius_server_get_new_session() 776 id_len = sizeof(buf) - 1; in radius_server_get_new_session() 777 os_memcpy(buf, id, id_len); in radius_server_get_new_session() 838 size_t id_len; in radius_srv_hs20_t_c_pending() local 846 id = eap_get_identity(sess->eap, &id_len); in radius_srv_hs20_t_c_pending() 849 id_str = os_malloc(id_len + 1); in radius_srv_hs20_t_c_pending() 852 os_memcpy(id_str, id, id_len); in radius_srv_hs20_t_c_pending() 853 id_str[id_len] = '\0'; in radius_srv_hs20_t_c_pending() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | wpas_kay.c | 270 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id() 280 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | wpas_kay.c | 270 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id() 280 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()
|