Home
last modified time | relevance | path

Searched refs:keyname_len (Results 1 – 7 of 7) sorted by relevance

/freebsd/contrib/wpa/src/eap_common/
H A Deap_common.h18 u8 keyname_len; member
H A Deap_common.c253 tlvs->keyname_len = tlv_len; in erp_parse_tlvs()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server.c855 parse.keyname, parse.keyname_len); in SM_STATE()
856 if (parse.keyname_len > 253) { in SM_STATE()
861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
862 nai[parse.keyname_len] = '\0'; in SM_STATE()
875 parse.keyname_len); in SM_STATE()
878 sm->identity_len = parse.keyname_len; in SM_STATE()
897 start = parse.keyname + parse.keyname_len; in SM_STATE()
2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity()
2036 sm->identity = os_malloc(parse.keyname_len); in eap_erp_update_identity()
2038 os_memcpy(sm->identity, parse.keyname, parse.keyname_len); in eap_erp_update_identity()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_session_ticket_cb.pod18 size_t keyname_len,
44 the session data. The B<keyname> and B<keyname_len> arguments identify the key
73 The B<keyname> and B<keyname_len> arguments to B<dec_cb> may be used to identify
/freebsd/contrib/wpa/src/eap_peer/
H A Deap.c1917 parse.keyname, parse.keyname_len); in eap_peer_finish()
1918 if (parse.keyname_len > 253) { in eap_peer_finish()
1923 os_memcpy(nai, parse.keyname, parse.keyname_len); in eap_peer_finish()
1924 nai[parse.keyname_len] = '\0'; in eap_peer_finish()
1934 start = parse.keyname + parse.keyname_len; in eap_peer_finish()
/freebsd/crypto/openssl/ssl/
H A Dt1_lib.c2013 size_t keyname_len = eticklen; in tls_decrypt_ticket() local
2016 if (keyname_len > TLSEXT_KEYNAME_LENGTH) in tls_decrypt_ticket()
2017 keyname_len = TLSEXT_KEYNAME_LENGTH; in tls_decrypt_ticket()
2018 retcb = s->session_ctx->decrypt_ticket_cb(s, sess, etick, keyname_len, in tls_decrypt_ticket()
/freebsd/crypto/openssl/test/helpers/
H A Dhandshake.c469 size_t keyname_len, in decrypt_session_ticket_cb() argument