/external/chromium_org/net/quic/crypto/ |
H A D | cert_compressor.cc | 624 uint32 cert_len; local 625 memcpy(&cert_len, uncompressed.data(), sizeof(cert_len)); 627 if (uncompressed.size() < cert_len) { 630 (*out_certs)[i] = uncompressed.substr(0, cert_len).as_string(); 631 uncompressed.remove_prefix(cert_len);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 295 size_t left, len, list_len, cert_len, idx; local 394 cert_len = WPA_GET_BE24(pos); 397 if ((size_t) (end - pos) < cert_len) { 399 (unsigned long) cert_len, 408 (unsigned long) idx, (unsigned long) cert_len); 412 if (tls_parse_cert(pos, cert_len, 422 cert = x509_certificate_parse(pos, cert_len); 438 pos += cert_len;
|
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 295 size_t left, len, list_len, cert_len, idx; local 394 cert_len = WPA_GET_BE24(pos); 397 if ((size_t) (end - pos) < cert_len) { 399 (unsigned long) cert_len, 408 (unsigned long) idx, (unsigned long) cert_len); 412 if (tls_parse_cert(pos, cert_len, 422 cert = x509_certificate_parse(pos, cert_len); 438 pos += cert_len;
|
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 295 size_t left, len, list_len, cert_len, idx; local 394 cert_len = WPA_GET_BE24(pos); 397 if ((size_t) (end - pos) < cert_len) { 399 (unsigned long) cert_len, 408 (unsigned long) idx, (unsigned long) cert_len); 412 if (tls_parse_cert(pos, cert_len, 422 cert = x509_certificate_parse(pos, cert_len); 438 pos += cert_len;
|
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 1320 int cert_len = i2d_X509(cert, NULL); local 1321 if (cert_len <= 0) 1324 buf = wpabuf_alloc(cert_len); 1328 tmp = wpabuf_put(buf, cert_len);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 1320 int cert_len = i2d_X509(cert, NULL); local 1321 if (cert_len <= 0) 1324 buf = wpabuf_alloc(cert_len); 1328 tmp = wpabuf_put(buf, cert_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 1320 int cert_len = i2d_X509(cert, NULL); local 1321 if (cert_len <= 0) 1324 buf = wpabuf_alloc(cert_len); 1328 tmp = wpabuf_put(buf, cert_len);
|