/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
H A D | tlsv1_client_write.c | 34 len += 3 + cert->cert_len; 157 if (pos + 3 + cert->cert_len > end) { 159 "for Certificate (cert_len=%lu left=%lu)", 160 (unsigned long) cert->cert_len, 166 WPA_PUT_BE24(pos, cert->cert_len); 168 os_memcpy(pos, cert->cert_start, cert->cert_len); 169 pos += cert->cert_len;
|
H A D | tlsv1_server_write.c | 31 len += 3 + cert->cert_len; 191 if (pos + 3 + cert->cert_len > end) { 193 "for Certificate (cert_len=%lu left=%lu)", 194 (unsigned long) cert->cert_len, 200 WPA_PUT_BE24(pos, cert->cert_len); 202 os_memcpy(pos, cert->cert_start, cert->cert_len); 203 pos += cert->cert_len;
|
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 295 size_t left, len, list_len, cert_len, idx; local 394 cert_len = WPA_GET_BE24(pos); 397 if ((size_t) (end - pos) < cert_len) { 399 (unsigned long) cert_len, 408 (unsigned long) idx, (unsigned long) cert_len); 412 if (tls_parse_cert(pos, cert_len, 422 cert = x509_certificate_parse(pos, cert_len); 438 pos += cert_len;
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
H A D | tlsv1_client_write.c | 34 len += 3 + cert->cert_len; 157 if (pos + 3 + cert->cert_len > end) { 159 "for Certificate (cert_len=%lu left=%lu)", 160 (unsigned long) cert->cert_len, 166 WPA_PUT_BE24(pos, cert->cert_len); 168 os_memcpy(pos, cert->cert_start, cert->cert_len); 169 pos += cert->cert_len;
|
H A D | tlsv1_server_write.c | 31 len += 3 + cert->cert_len; 191 if (pos + 3 + cert->cert_len > end) { 193 "for Certificate (cert_len=%lu left=%lu)", 194 (unsigned long) cert->cert_len, 200 WPA_PUT_BE24(pos, cert->cert_len); 202 os_memcpy(pos, cert->cert_start, cert->cert_len); 203 pos += cert->cert_len;
|
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 295 size_t left, len, list_len, cert_len, idx; local 394 cert_len = WPA_GET_BE24(pos); 397 if ((size_t) (end - pos) < cert_len) { 399 (unsigned long) cert_len, 408 (unsigned long) idx, (unsigned long) cert_len); 412 if (tls_parse_cert(pos, cert_len, 422 cert = x509_certificate_parse(pos, cert_len); 438 pos += cert_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | x509v3.h | 93 size_t cert_len; member in struct:x509_certificate
|
H A D | tlsv1_client_write.c | 34 len += 3 + cert->cert_len; 157 if (pos + 3 + cert->cert_len > end) { 159 "for Certificate (cert_len=%lu left=%lu)", 160 (unsigned long) cert->cert_len, 166 WPA_PUT_BE24(pos, cert->cert_len); 168 os_memcpy(pos, cert->cert_start, cert->cert_len); 169 pos += cert->cert_len;
|
H A D | tlsv1_server_write.c | 31 len += 3 + cert->cert_len; 191 if (pos + 3 + cert->cert_len > end) { 193 "for Certificate (cert_len=%lu left=%lu)", 194 (unsigned long) cert->cert_len, 200 WPA_PUT_BE24(pos, cert->cert_len); 202 os_memcpy(pos, cert->cert_start, cert->cert_len); 203 pos += cert->cert_len;
|
H A D | tlsv1_client_read.c | 218 size_t left, len, list_len, cert_len, idx; local 317 cert_len = WPA_GET_BE24(pos); 320 if ((size_t) (end - pos) < cert_len) { 323 (unsigned long) cert_len, 332 (unsigned long) idx, (unsigned long) cert_len); 336 if (tls_parse_cert(pos, cert_len, 347 cert = x509_certificate_parse(pos, cert_len); 364 pos += cert_len;
|
H A D | tlsv1_server_read.c | 295 size_t left, len, list_len, cert_len, idx; local 394 cert_len = WPA_GET_BE24(pos); 397 if ((size_t) (end - pos) < cert_len) { 399 (unsigned long) cert_len, 408 (unsigned long) idx, (unsigned long) cert_len); 412 if (tls_parse_cert(pos, cert_len, 422 cert = x509_certificate_parse(pos, cert_len); 438 pos += cert_len;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/chromium_org/net/quic/crypto/ |
H A D | cert_compressor.cc | 624 uint32 cert_len; local 625 memcpy(&cert_len, uncompressed.data(), sizeof(cert_len)); 627 if (uncompressed.size() < cert_len) { 630 (*out_certs)[i] = uncompressed.substr(0, cert_len).as_string(); 631 uncompressed.remove_prefix(cert_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|