/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server_read.c | 372 size_t left, len, list_len, cert_len, idx; local 471 cert_len = WPA_GET_BE24(pos); 474 if ((size_t) (end - pos) < cert_len) { 476 (unsigned long) cert_len, 485 (unsigned long) idx, (unsigned long) cert_len); 489 if (tls_parse_cert(pos, cert_len, 499 cert = x509_certificate_parse(pos, cert_len); 515 pos += cert_len;
|
H A D | tlsv1_client_read.c | 295 cert->cert_len); 339 cert->cert_len); 350 size_t left, len, list_len, cert_len, idx; local 449 cert_len = WPA_GET_BE24(pos); 452 if ((size_t) (end - pos) < cert_len) { 455 (unsigned long) cert_len, 464 (unsigned long) idx, (unsigned long) cert_len); 468 if (tls_parse_cert(pos, cert_len, 479 cert = x509_certificate_parse(pos, cert_len); 498 pos += cert_len; [all...] |
H A D | x509v3.h | 106 size_t cert_len; member in struct:x509_certificate
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server_read.c | 372 size_t left, len, list_len, cert_len, idx; local 471 cert_len = WPA_GET_BE24(pos); 474 if ((size_t) (end - pos) < cert_len) { 476 (unsigned long) cert_len, 485 (unsigned long) idx, (unsigned long) cert_len); 489 if (tls_parse_cert(pos, cert_len, 499 cert = x509_certificate_parse(pos, cert_len); 515 pos += cert_len;
|
H A D | tlsv1_client_read.c | 295 cert->cert_len); 339 cert->cert_len); 350 size_t left, len, list_len, cert_len, idx; local 449 cert_len = WPA_GET_BE24(pos); 452 if ((size_t) (end - pos) < cert_len) { 455 (unsigned long) cert_len, 464 (unsigned long) idx, (unsigned long) cert_len); 468 if (tls_parse_cert(pos, cert_len, 479 cert = x509_certificate_parse(pos, cert_len); 498 pos += cert_len; [all...] |
H A D | x509v3.h | 106 size_t cert_len; member in struct:x509_certificate
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_read.c | 372 size_t left, len, list_len, cert_len, idx; local 471 cert_len = WPA_GET_BE24(pos); 474 if ((size_t) (end - pos) < cert_len) { 476 (unsigned long) cert_len, 485 (unsigned long) idx, (unsigned long) cert_len); 489 if (tls_parse_cert(pos, cert_len, 499 cert = x509_certificate_parse(pos, cert_len); 515 pos += cert_len;
|
H A D | tlsv1_client_read.c | 295 cert->cert_len); 339 cert->cert_len); 350 size_t left, len, list_len, cert_len, idx; local 449 cert_len = WPA_GET_BE24(pos); 452 if ((size_t) (end - pos) < cert_len) { 455 (unsigned long) cert_len, 464 (unsigned long) idx, (unsigned long) cert_len); 468 if (tls_parse_cert(pos, cert_len, 479 cert = x509_certificate_parse(pos, cert_len); 498 pos += cert_len; [all...] |
H A D | x509v3.h | 106 size_t cert_len; member in struct:x509_certificate
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 503 if (cert_len < 1) { 510 cert_len--; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 571 if (cert_len < 1) { 578 cert_len--; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 1627 int cert_len = i2d_X509(cert, NULL); local 1628 if (cert_len <= 0) 1631 buf = wpabuf_alloc(cert_len); 1635 tmp = wpabuf_put(buf, cert_len);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 1627 int cert_len = i2d_X509(cert, NULL); local 1628 if (cert_len <= 0) 1631 buf = wpabuf_alloc(cert_len); 1635 tmp = wpabuf_put(buf, cert_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 1627 int cert_len = i2d_X509(cert, NULL); local 1628 if (cert_len <= 0) 1631 buf = wpabuf_alloc(cert_len); 1635 tmp = wpabuf_put(buf, cert_len);
|