/netbsd-current/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | resolve.h | 166 size_t cert_len; member in struct:rk_cert_record
|
H A D | resolve.c | 325 size_t cert_len; local 332 cert_len = size - 5; 333 rr->u.cert = malloc (sizeof(*rr->u.cert) + cert_len - 1); 342 rr->u.cert->cert_len = cert_len; 343 memcpy (rr->u.cert->cert_data, p + 5, cert_len);
|
/netbsd-current/external/bsd/wpa/dist/src/tls/ |
H A D | x509v3.h | 106 size_t cert_len; member in struct:x509_certificate
|
H A D | tlsv1_client_read.c | 295 cert->cert_len); 339 cert->cert_len); 350 size_t left, len, list_len, cert_len, idx; local 449 cert_len = WPA_GET_BE24(pos); 452 if ((size_t) (end - pos) < cert_len) { 455 (unsigned long) cert_len, 464 (unsigned long) idx, (unsigned long) cert_len); 468 if (tls_parse_cert(pos, cert_len, 479 cert = x509_certificate_parse(pos, cert_len); 498 pos += cert_len; [all...] |
H A D | tlsv1_server_read.c | 400 size_t left, len, list_len, cert_len, idx; local 499 cert_len = WPA_GET_BE24(pos); 502 if ((size_t) (end - pos) < cert_len) { 504 (unsigned long) cert_len, 513 (unsigned long) idx, (unsigned long) cert_len); 517 if (tls_parse_cert(pos, cert_len, 527 cert = x509_certificate_parse(pos, cert_len); 543 pos += cert_len;
|
H A D | tlsv1_client_write.c | 34 len += 3 + cert->cert_len; 297 if (3 + cert->cert_len > (size_t) (end - pos)) { 299 "for Certificate (cert_len=%lu left=%lu)", 300 (unsigned long) cert->cert_len, 306 WPA_PUT_BE24(pos, cert->cert_len); 308 os_memcpy(pos, cert->cert_start, cert->cert_len); 309 pos += cert->cert_len;
|
H A D | tlsv1_server_write.c | 31 len += 3 + cert->cert_len; 230 if (3 + cert->cert_len > (size_t) (end - pos)) { 232 "for Certificate (cert_len=%lu left=%lu)", 233 (unsigned long) cert->cert_len, 239 WPA_PUT_BE24(pos, cert->cert_len); 241 os_memcpy(pos, cert->cert_start, cert->cert_len); 242 pos += cert->cert_len;
|
H A D | x509v3.c | 1664 cert->cert_len = len;
|
/netbsd-current/external/bsd/wpa/dist/src/eap_peer/ |
H A D | ikev2.c | 490 const u8 *cert, size_t cert_len) 502 if (cert_len < 1) { 509 cert_len--; 512 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 637 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 489 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/netbsd-current/external/bsd/wpa/dist/src/eap_server/ |
H A D | ikev2.c | 558 const u8 *cert, size_t cert_len) 570 if (cert_len < 1) { 577 cert_len--; 580 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 703 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 557 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/netbsd-current/external/bsd/wpa/dist/src/eap_common/ |
H A D | ikev2_common.h | 305 size_t cert_len; member in struct:ikev2_payloads
|
H A D | ikev2_common.c | 307 payloads->cert_len = pdatalen;
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_clnt.c | 1824 unsigned long cert_list_len, cert_len; local 1849 if (!PACKET_get_net_3(pkt, &cert_len) 1850 || !PACKET_get_bytes(pkt, &certbytes, cert_len)) { 1858 x = d2i_X509(NULL, (const unsigned char **)&certbytes, cert_len); 1864 if (certbytes != (certstart + cert_len)) {
|
/netbsd-current/external/bsd/wpa/dist/src/crypto/ |
H A D | tls_wolfssl.c | 817 int cert_len; local 819 data = wolfSSL_X509_get_der(cert, &cert_len); 821 buf = wpabuf_alloc_copy(data, cert_len);
|
H A D | tls_openssl.c | 2129 int cert_len = i2d_X509(cert, NULL); local 2130 if (cert_len <= 0) 2133 buf = wpabuf_alloc(cert_len); 2137 tmp = wpabuf_put(buf, cert_len);
|
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_clnt.c | 1775 unsigned long cert_list_len, cert_len; local 1795 if (!PACKET_get_net_3(pkt, &cert_len) 1796 || !PACKET_get_bytes(pkt, &certbytes, cert_len)) { 1809 cert_len) == NULL) { 1814 if (certbytes != (certstart + cert_len)) {
|