/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
H A D | tlsv1_client_write.c | 34 len += 3 + cert->cert_len; 157 if (pos + 3 + cert->cert_len > end) { 159 "for Certificate (cert_len=%lu left=%lu)", 160 (unsigned long) cert->cert_len, 166 WPA_PUT_BE24(pos, cert->cert_len); 168 os_memcpy(pos, cert->cert_start, cert->cert_len); 169 pos += cert->cert_len;
|
H A D | tlsv1_server_write.c | 31 len += 3 + cert->cert_len; 192 if (pos + 3 + cert->cert_len > end) { 194 "for Certificate (cert_len=%lu left=%lu)", 195 (unsigned long) cert->cert_len, 201 WPA_PUT_BE24(pos, cert->cert_len); 203 os_memcpy(pos, cert->cert_start, cert->cert_len); 204 pos += cert->cert_len;
|
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 281 size_t left, len, list_len, cert_len, idx; local 386 cert_len = WPA_GET_BE24(pos); 389 if ((size_t) (end - pos) < cert_len) { 392 (unsigned long) cert_len, 401 (unsigned long) idx, (unsigned long) cert_len); 405 if (tls_parse_cert(pos, cert_len, 416 cert = x509_certificate_parse(pos, cert_len); 433 pos += cert_len;
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
H A D | tlsv1_client_write.c | 34 len += 3 + cert->cert_len; 157 if (pos + 3 + cert->cert_len > end) { 159 "for Certificate (cert_len=%lu left=%lu)", 160 (unsigned long) cert->cert_len, 166 WPA_PUT_BE24(pos, cert->cert_len); 168 os_memcpy(pos, cert->cert_start, cert->cert_len); 169 pos += cert->cert_len;
|
H A D | tlsv1_server_write.c | 31 len += 3 + cert->cert_len; 192 if (pos + 3 + cert->cert_len > end) { 194 "for Certificate (cert_len=%lu left=%lu)", 195 (unsigned long) cert->cert_len, 201 WPA_PUT_BE24(pos, cert->cert_len); 203 os_memcpy(pos, cert->cert_start, cert->cert_len); 204 pos += cert->cert_len;
|
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 281 size_t left, len, list_len, cert_len, idx; local 386 cert_len = WPA_GET_BE24(pos); 389 if ((size_t) (end - pos) < cert_len) { 392 (unsigned long) cert_len, 401 (unsigned long) idx, (unsigned long) cert_len); 405 if (tls_parse_cert(pos, cert_len, 416 cert = x509_certificate_parse(pos, cert_len); 433 pos += cert_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
H A D | tlsv1_client_write.c | 34 len += 3 + cert->cert_len; 157 if (pos + 3 + cert->cert_len > end) { 159 "for Certificate (cert_len=%lu left=%lu)", 160 (unsigned long) cert->cert_len, 166 WPA_PUT_BE24(pos, cert->cert_len); 168 os_memcpy(pos, cert->cert_start, cert->cert_len); 169 pos += cert->cert_len;
|
H A D | tlsv1_server_write.c | 31 len += 3 + cert->cert_len; 192 if (pos + 3 + cert->cert_len > end) { 194 "for Certificate (cert_len=%lu left=%lu)", 195 (unsigned long) cert->cert_len, 201 WPA_PUT_BE24(pos, cert->cert_len); 203 os_memcpy(pos, cert->cert_start, cert->cert_len); 204 pos += cert->cert_len;
|
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 281 size_t left, len, list_len, cert_len, idx; local 386 cert_len = WPA_GET_BE24(pos); 389 if ((size_t) (end - pos) < cert_len) { 392 (unsigned long) cert_len, 401 (unsigned long) idx, (unsigned long) cert_len); 405 if (tls_parse_cert(pos, cert_len, 416 cert = x509_certificate_parse(pos, cert_len); 433 pos += cert_len;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 525 const u8 *cert, size_t cert_len) 537 if (cert_len < 1) { 544 cert_len--; 547 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 672 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 524 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 525 const u8 *cert, size_t cert_len) 537 if (cert_len < 1) { 544 cert_len--; 547 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 672 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 524 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 525 const u8 *cert, size_t cert_len) 537 if (cert_len < 1) { 544 cert_len--; 547 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 672 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 524 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/chromium_org/net/quic/crypto/ |
H A D | cert_compressor.cc | 624 uint32 cert_len; local 625 memcpy(&cert_len, uncompressed.data(), sizeof(cert_len)); 627 if (uncompressed.size() < cert_len) { 630 (*out_certs)[i] = uncompressed.substr(0, cert_len).as_string(); 631 uncompressed.remove_prefix(cert_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.h | 309 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.h | 309 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.h | 309 size_t cert_len; member in struct:ikev2_payloads
|