/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | wpas_kay.c | 325 size_t sid_len = 128; in ieee802_1x_notify_create_actor() local 339 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor() 351 if (ieee802_1x_auth_get_session_id(wpa_s, wpa_s->bssid, sid, &sid_len)) in ieee802_1x_notify_create_actor() 371 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | wpas_kay.c | 325 size_t sid_len = 128; in ieee802_1x_notify_create_actor() local 339 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor() 351 if (ieee802_1x_auth_get_session_id(wpa_s, wpa_s->bssid, sid, &sid_len)) in ieee802_1x_notify_create_actor() 371 peer_addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_ikev2.c | 485 size_t sid_len; in eap_ikev2_get_session_id() local 491 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id() 492 sid = os_malloc(sid_len); in eap_ikev2_get_session_id() 502 *len = sid_len; in eap_ikev2_get_session_id() 504 sid, sid_len); in eap_ikev2_get_session_id()
|
D | eap_eke.c | 748 size_t sid_len; in eap_eke_get_session_id() local 753 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 754 sid = os_malloc(sid_len); in eap_eke_get_session_id() 761 *len = sid_len; in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_ikev2.c | 485 size_t sid_len; in eap_ikev2_get_session_id() local 491 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id() 492 sid = os_malloc(sid_len); in eap_ikev2_get_session_id() 502 *len = sid_len; in eap_ikev2_get_session_id() 504 sid, sid_len); in eap_ikev2_get_session_id()
|
D | eap_eke.c | 748 size_t sid_len; in eap_eke_get_session_id() local 753 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 754 sid = os_malloc(sid_len); in eap_eke_get_session_id() 761 *len = sid_len; in eap_eke_get_session_id()
|
/third_party/openssl/doc/man3/ |
D | SSL_SESSION_set1_id.pod | 16 unsigned int sid_len); 25 to B<sid> of length B<sid_len>.
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_ikev2.c | 523 size_t sid_len; in eap_ikev2_get_session_id() local 529 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id() 530 sid = os_malloc(sid_len); in eap_ikev2_get_session_id() 540 *len = sid_len; in eap_ikev2_get_session_id() 542 sid, sid_len); in eap_ikev2_get_session_id()
|
D | eap_server_eke.c | 771 size_t sid_len; in eap_eke_get_session_id() local 776 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 777 sid = os_malloc(sid_len); in eap_eke_get_session_id() 784 *len = sid_len; in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_ikev2.c | 523 size_t sid_len; in eap_ikev2_get_session_id() local 529 sid_len = 1 + data->ikev2.i_nonce_len + data->ikev2.r_nonce_len; in eap_ikev2_get_session_id() 530 sid = os_malloc(sid_len); in eap_ikev2_get_session_id() 540 *len = sid_len; in eap_ikev2_get_session_id() 542 sid, sid_len); in eap_ikev2_get_session_id()
|
D | eap_server_eke.c | 770 size_t sid_len; in eap_eke_get_session_id() local 775 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 776 sid = os_malloc(sid_len); in eap_eke_get_session_id() 783 *len = sid_len; in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth_kay.c | 413 size_t sid_len = 128; in ieee802_1x_notify_create_actor_hapd() local 427 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor_hapd() 439 if (ieee802_1x_auth_get_session_id(hapd, sta, sid, &sid_len)) in ieee802_1x_notify_create_actor_hapd() 461 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth_kay.c | 413 size_t sid_len = 128; in ieee802_1x_notify_create_actor_hapd() local 427 sid = os_zalloc(sid_len); in ieee802_1x_notify_create_actor_hapd() 439 if (ieee802_1x_auth_get_session_id(hapd, sta, sid, &sid_len)) in ieee802_1x_notify_create_actor_hapd() 461 sta->addr, sid, sid_len, ckn->name)) { in ieee802_1x_notify_create_actor_hapd()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_gpsk_common.h | 61 u8 method_type, u8 *sid, size_t *sid_len);
|
D | eap_gpsk_common.c | 422 u8 method_type, u8 *sid, size_t *sid_len) in eap_gpsk_derive_session_id() argument 468 *sid_len = 1 + sizeof(kdf_out); in eap_gpsk_derive_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_gpsk_common.h | 61 u8 method_type, u8 *sid, size_t *sid_len);
|
D | eap_gpsk_common.c | 422 u8 method_type, u8 *sid, size_t *sid_len) in eap_gpsk_derive_session_id() argument 468 *sid_len = 1 + sizeof(kdf_out); in eap_gpsk_derive_session_id()
|
/third_party/openssl/ssl/ |
D | ssl_sess.c | 884 unsigned int sid_len) in SSL_SESSION_set1_id() argument 886 if (sid_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in SSL_SESSION_set1_id() 890 s->session_id_length = sid_len; in SSL_SESSION_set1_id() 892 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
|
/third_party/node/deps/openssl/openssl/ssl/ |
D | ssl_sess.c | 884 unsigned int sid_len) in SSL_SESSION_set1_id() argument 886 if (sid_len > SSL_MAX_SSL_SESSION_ID_LENGTH) { in SSL_SESSION_set1_id() 890 s->session_id_length = sid_len; in SSL_SESSION_set1_id() 892 memcpy(s->session_id, sid, sid_len); in SSL_SESSION_set1_id()
|
/third_party/mbedtls/library/ |
D | ssl_msg.c | 3266 size_t sid_len, cookie_len, epoch, fragment_offset; in mbedtls_ssl_check_dtls_clihlo_cookie() local 3315 sid_len = in[59]; in mbedtls_ssl_check_dtls_clihlo_cookie() 3316 if (59 + 1 + sid_len + 1 > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie() 3318 (unsigned) sid_len, in mbedtls_ssl_check_dtls_clihlo_cookie() 3323 in + 60, sid_len); in mbedtls_ssl_check_dtls_clihlo_cookie() 3325 cookie_len = in[60 + sid_len]; in mbedtls_ssl_check_dtls_clihlo_cookie() 3326 if (59 + 1 + sid_len + 1 + cookie_len > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie() 3329 (unsigned) (in_len - sid_len - 61))); in mbedtls_ssl_check_dtls_clihlo_cookie() 3334 in + sid_len + 61, cookie_len); in mbedtls_ssl_check_dtls_clihlo_cookie() 3336 in + sid_len + 61, cookie_len, in mbedtls_ssl_check_dtls_clihlo_cookie()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
D | ieee802_1x_kay_i.h | 72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
D | ieee802_1x_kay_i.h | 72 const u8 *mac2, const u8 *sid, size_t sid_len, u8 *ckn);
|
/third_party/openssl/ohos_lite/include/openssl/ |
D | ssl.h | 1648 unsigned int sid_len);
|
/third_party/node/deps/openssl/config/archs/linux32-s390x/asm_avx2/include/openssl/ |
D | ssl.h | 1758 unsigned int sid_len);
|
/third_party/node/deps/openssl/config/archs/linux64-s390x/no-asm/include/openssl/ |
D | ssl.h | 1758 unsigned int sid_len);
|