Home
last modified time | relevance | path

Searched refs:id_len (Results 1 – 25 of 80) sorted by relevance

1234

/third_party/openssl/doc/man3/
DSSL_CTX_set_generate_session_id.pod14 unsigned int *id_len);
19 unsigned int id_len);
30 (of length B<id_len>) is already contained in the internal session cache
49 B<id> into and a pointer to the maximum allowed length B<id_len>. The
50 buffer at location B<id> is only guaranteed to have the size B<id_len>.
51 The callback is only allowed to generate a shorter id and reduce B<id_len>;
52 the callback B<must never> increase B<id_len> or write to the location
56 callback may only fill part of the possible length and leave B<id_len>
69 guarantee uniqueness, it is recommended to use the maximum B<id_len> and
102 unsigned int *id_len)
[all …]
/third_party/elfutils/libdwfl/
Ddwfl_build_id_find_elf.c42 const size_t id_len, const uint8_t *id) in __libdwfl_open_by_build_id() argument
48 if (id_len < MIN_BUILD_ID_BYTES || id_len > MAX_BUILD_ID_BYTES) in __libdwfl_open_by_build_id()
64 for (size_t i = 1; i < id_len; ++i) in __libdwfl_open_by_build_id()
72 strcpy (&id_name[sizeof "/.build-id/" - 1 + 3 + (id_len - 1) * 2], in __libdwfl_open_by_build_id()
136 const size_t id_len = mod->build_id_len; in __libdwfl_open_mod_by_build_id() local
139 return __libdwfl_open_by_build_id (mod, debug, file_name, id_len, id); in __libdwfl_open_mod_by_build_id()
/third_party/elfutils/libdw/
Ddwarf_getalt.c112 size_t id_len = build_id_len; in find_debug_altlink() local
122 if (id_len >= MIN_BUILD_ID_BYTES && id_len <= MAX_BUILD_ID_BYTES) in find_debug_altlink()
130 for (size_t i = 1; i < id_len; ++i) in find_debug_altlink()
134 + 3 + (id_len - 1) * 2], ".debug"); in find_debug_altlink()
/third_party/openssl/crypto/sm2/
Dsm2_sign.c27 const size_t id_len, in ossl_sm2_compute_z_digest() argument
73 if (id_len >= (UINT16_MAX / 8)) { in ossl_sm2_compute_z_digest()
79 entl = (uint16_t)(8 * id_len); in ossl_sm2_compute_z_digest()
92 if (id_len > 0 && !EVP_DigestUpdate(hash, id, id_len)) { in ossl_sm2_compute_z_digest()
144 const size_t id_len, in sm2_compute_msg_hash() argument
172 if (!ossl_sm2_compute_z_digest(z, fetched_digest, id, id_len, key)) { in sm2_compute_msg_hash()
394 const size_t id_len, in ossl_sm2_do_sign() argument
400 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign()
417 const size_t id_len, in ossl_sm2_do_verify() argument
423 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_verify()
/third_party/openssl/ohos_lite/include/crypto/
Dsm2.h26 const size_t id_len,
35 const size_t id_len,
42 const size_t id_len,
/third_party/ltp/lib/
Dtst_kconfig.c149 if (vars[i].id_len != var_len) in kconfig_parse_line()
405 vars[cnt].id_len = get_len(j->tok, j->tok_len); in populate_vars()
407 if (vars[cnt].id_len + 1 >= sizeof(vars[cnt].id)) in populate_vars()
410 strncpy(vars[cnt].id, j->tok, vars[cnt].id_len); in populate_vars()
411 vars[cnt].id[vars[cnt].id_len] = 0; in populate_vars()
547 var.id_len = strlen(confname); in tst_kconfig_get()
549 if (var.id_len >= sizeof(var.id)) in tst_kconfig_get()
/third_party/openssl/include/crypto/
Dsm2.h31 const size_t id_len,
40 const size_t id_len,
47 const size_t id_len,
/third_party/openssl/providers/implementations/signature/
Dsm2_sig.c90 size_t id_len; member
262 || !ossl_sm2_compute_z_digest(z, ctx->md, ctx->id, ctx->id_len, in sm2sig_compute_z_digest()
367 dstctx->id = OPENSSL_malloc(srcctx->id_len); in sm2sig_dupctx()
370 dstctx->id_len = srcctx->id_len; in sm2sig_dupctx()
371 memcpy(dstctx->id, srcctx->id, srcctx->id_len); in sm2sig_dupctx()
446 psm2ctx->id_len = tmp_idlen; in sm2sig_set_ctx_params()
/third_party/mbedtls/library/
Dssl_tls13_client.c728 MBEDTLS_SSL_CHK_BUF_PTR( p, end, ssl->session_negotiate->id_len + 1 ); in ssl_tls13_write_client_hello_body()
729 *p++ = (unsigned char)ssl->session_negotiate->id_len; in ssl_tls13_write_client_hello_body()
730 memcpy( p, ssl->session_negotiate->id, ssl->session_negotiate->id_len ); in ssl_tls13_write_client_hello_body()
731 p += ssl->session_negotiate->id_len; in ssl_tls13_write_client_hello_body()
734 ssl->session_negotiate->id_len ); in ssl_tls13_write_client_hello_body()
862 if( ssl->session_negotiate->id_len == 0 ) in ssl_tls13_prepare_client_hello()
871 ssl->session_negotiate->id_len = 32; in ssl_tls13_prepare_client_hello()
1015 if( ssl->session_negotiate->id_len != legacy_session_id_echo_len || in ssl_tls13_check_server_hello_session_id_echo()
1020 ssl->session_negotiate->id_len ); in ssl_tls13_check_server_hello_session_id_echo()
1034 ssl->session_negotiate->id_len ); in ssl_tls13_check_server_hello_session_id_echo()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_ttls.c92 u8 id_len; in eap_ttls_valid_session() local
95 id_len = sm->identity_len; in eap_ttls_valid_session()
97 id_len = 255; in eap_ttls_valid_session()
98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session()
99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session()
1204 u8 id_len; in eap_ttls_process() local
1235 id_len = *pos++; in eap_ttls_process()
1237 pos, id_len); in eap_ttls_process()
1239 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process()
1246 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process()
[all …]
Deap_server_peap.c117 u8 id_len; in eap_peap_valid_session() local
120 id_len = sm->identity_len; in eap_peap_valid_session()
122 id_len = 255; in eap_peap_valid_session()
123 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session()
124 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session()
1261 u8 id_len; in eap_peap_process() local
1293 id_len = *pos++; in eap_peap_process()
1295 pos, id_len); in eap_peap_process()
1297 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process()
1304 os_memcpy(sm->identity, pos, id_len); in eap_peap_process()
[all …]
Deap_server_gpsk.c28 size_t id_len; member
429 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2()
435 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2()
619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
622 *len = data->id_len; in eap_gpsk_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_peap.c117 u8 id_len; in eap_peap_valid_session() local
120 id_len = sm->identity_len; in eap_peap_valid_session()
122 id_len = 255; in eap_peap_valid_session()
123 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session()
124 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session()
1230 u8 id_len; in eap_peap_process() local
1262 id_len = *pos++; in eap_peap_process()
1264 pos, id_len); in eap_peap_process()
1266 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process()
1273 os_memcpy(sm->identity, pos, id_len); in eap_peap_process()
[all …]
Deap_server_ttls.c92 u8 id_len; in eap_ttls_valid_session() local
95 id_len = sm->identity_len; in eap_ttls_valid_session()
97 id_len = 255; in eap_ttls_valid_session()
98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session()
99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session()
1196 u8 id_len; in eap_ttls_process() local
1227 id_len = *pos++; in eap_ttls_process()
1229 pos, id_len); in eap_ttls_process()
1231 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process()
1238 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process()
[all …]
Deap_server_gpsk.c28 size_t id_len; member
428 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2()
434 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2()
618 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
621 *len = data->id_len; in eap_gpsk_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_tls.c25 size_t id_len; member
228 &data->id_len); in eap_tls_success()
231 data->session_id, data->id_len); in eap_tls_success()
414 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
418 *len = data->id_len; in eap_tls_get_session_id()
Deap_gpsk.c27 size_t id_len; member
384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2()
391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2()
756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
759 *len = data->id_len; in eap_gpsk_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_tls.c25 size_t id_len; member
222 &data->id_len); in eap_tls_success()
225 data->session_id, data->id_len); in eap_tls_success()
412 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
416 *len = data->id_len; in eap_tls_get_session_id()
Deap_gpsk.c27 size_t id_len; member
384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2()
391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2()
756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
759 *len = data->id_len; in eap_gpsk_get_session_id()
/third_party/libcoap/src/
Dcoap_tinydtls.c201 const uint8_t *id, size_t id_len, in get_psk_info() argument
235 temp.length = id_len; in get_psk_info()
238 coap_log(LOG_DEBUG, "got psk_identity_hint: '%.*s'\n", (int)id_len, id ? (const char*)id : ""); in get_psk_info()
242 lhint.length = id_len; in get_psk_info()
271 …psk_len = coap_context->get_client_psk(coap_session, (const uint8_t*)id, id_len, (uint8_t*)result,… in get_psk_info()
285 …psk_len = coap_context->get_client_psk(coap_session, (const uint8_t*)id, id_len, psk, &identity_le… in get_psk_info()
302 coap_session->psk_identity = coap_new_bin_const(id, id_len); in get_psk_info()
305 (int)id_len, id); in get_psk_info()
309 lidentity.length = id_len; in get_psk_info()
325 …return (int)coap_context->get_server_psk(coap_session, (const uint8_t*)id, id_len, (uint8_t*)resul… in get_psk_info()
/third_party/elfutils/src/
Dstack.c159 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in module_callback() local
160 if (id_len > 0) in module_callback()
165 while (--id_len > 0); in module_callback()
261 int id_len = dwfl_module_build_id (mod, &id, &id_vaddr); in print_frame() local
262 if (id_len > 0) in print_frame()
267 while (--id_len > 0); in print_frame()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
Dradius_server.c564 size_t user_len, id_len; in radius_server_get_new_session() local
628 &id_len, NULL) == 0) { in radius_server_get_new_session()
632 if (id_len >= sizeof(buf)) in radius_server_get_new_session()
633 id_len = sizeof(buf) - 1; in radius_server_get_new_session()
634 os_memcpy(buf, id, id_len); in radius_server_get_new_session()
671 size_t id_len; in radius_srv_hs20_t_c_pending() local
679 id = eap_get_identity(sess->eap, &id_len); in radius_srv_hs20_t_c_pending()
682 id_str = os_malloc(id_len + 1); in radius_srv_hs20_t_c_pending()
685 os_memcpy(id_str, id, id_len); in radius_srv_hs20_t_c_pending()
686 id_str[id_len] = '\0'; in radius_srv_hs20_t_c_pending()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
Dradius_server.c707 size_t user_len, id_len; in radius_server_get_new_session() local
771 &id_len, NULL) == 0) { in radius_server_get_new_session()
775 if (id_len >= sizeof(buf)) in radius_server_get_new_session()
776 id_len = sizeof(buf) - 1; in radius_server_get_new_session()
777 os_memcpy(buf, id, id_len); in radius_server_get_new_session()
838 size_t id_len; in radius_srv_hs20_t_c_pending() local
846 id = eap_get_identity(sess->eap, &id_len); in radius_srv_hs20_t_c_pending()
849 id_str = os_malloc(id_len + 1); in radius_srv_hs20_t_c_pending()
852 os_memcpy(id_str, id, id_len); in radius_srv_hs20_t_c_pending()
853 id_str[id_len] = '\0'; in radius_srv_hs20_t_c_pending()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dwpas_kay.c270 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local
272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id()
280 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dwpas_kay.c270 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local
272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id()
280 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()

1234