| /hal_espressif-latest/components/newlib/ |
| D | random.c | 17 ssize_t getrandom(void *buf, size_t buflen, unsigned int flags) in getrandom() argument 23 ESP_LOGD(TAG, "getrandom(buf=0x%x, buflen=%d, flags=%u)", (int) buf, buflen, flags); in getrandom() 31 esp_fill_random(buf, buflen); in getrandom() 33 ESP_LOGD(TAG, "getrandom returns %d", buflen); in getrandom() 34 return buflen; in getrandom()
|
| /hal_espressif-latest/components/esp_common/src/ |
| D | esp_err_to_name.c.in | 55 const char *esp_err_to_name_r(esp_err_t code, char *buf, size_t buflen) argument 62 strlcpy(buf, esp_err_msg_table[i].msg, buflen); 68 if (strerror_r(code, buf, buflen) == 0) { 72 snprintf(buf, buflen, "%s 0x%x(%d)", esp_unknown_msg, code, code);
|
| D | esp_err_to_name.c | 881 const char *esp_err_to_name_r(esp_err_t code, char *buf, size_t buflen) in esp_err_to_name_r() argument 888 strlcpy(buf, esp_err_msg_table[i].msg, buflen); in esp_err_to_name_r() 894 if (strerror_r(code, buf, buflen) == 0) { in esp_err_to_name_r() 898 snprintf(buf, buflen, "%s 0x%x(%d)", esp_unknown_msg, code, code); in esp_err_to_name_r()
|
| /hal_espressif-latest/components/wpa_supplicant/src/tls/ |
| D | tlsv1_common.c | 424 size_t buflen; in tls_verify_signature() local 449 buflen = end - pos; in tls_verify_signature() 455 if (crypto_public_key_decrypt_pkcs1(pk, pos, end - pos, buf, &buflen) < in tls_verify_signature() 465 decrypted, buflen); in tls_verify_signature() 483 if (buflen >= 19 + 32 && in tls_verify_signature() 489 buflen -= 19; in tls_verify_signature() 490 } else if (buflen >= 19 + 48 && in tls_verify_signature() 496 buflen -= 19; in tls_verify_signature() 497 } else if (buflen >= 19 + 64 && in tls_verify_signature() 503 buflen -= 19; in tls_verify_signature() [all …]
|
| D | tlsv1_client.h | 35 size_t buflen); 61 size_t buflen);
|
| D | tlsv1_server.c | 28 int buflen; in tlsv1_server_log() local 31 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in tlsv1_server_log() 34 buf = os_malloc(buflen); in tlsv1_server_log() 38 vsnprintf(buf, buflen, fmt, ap); in tlsv1_server_log() 529 size_t buflen) in tlsv1_server_get_cipher() argument 601 if (os_strlcpy(buf, cipher, buflen) >= buflen) in tlsv1_server_get_cipher()
|
| D | tlsv1_client.c | 615 size_t buflen) in tlsv1_client_get_cipher() argument 687 if (os_strlcpy(buf, cipher, buflen) >= buflen) in tlsv1_client_get_cipher() 909 size_t buflen) in tlsv1_client_get_version() argument 915 os_strlcpy(buf, "TLSv1", buflen); in tlsv1_client_get_version() 918 os_strlcpy(buf, "TLSv1.1", buflen); in tlsv1_client_get_version() 921 os_strlcpy(buf, "TLSv1.2", buflen); in tlsv1_client_get_version()
|
| D | tlsv1_server.h | 33 size_t buflen);
|
| /hal_espressif-latest/components/wpa_supplicant/src/utils/ |
| D | json.c | 513 size_t buflen; in json_get_member_base64url() local 520 &buflen); in json_get_member_base64url() 523 ret = wpabuf_alloc_ext_data(buf, buflen); in json_get_member_base64url() 554 char *buf, size_t buflen) in json_print_token() argument 562 ret = os_snprintf(buf + len, buflen - len, "[%d:%s:%s]", in json_print_token() 565 if (os_snprintf_error(buflen - len, ret)) { in json_print_token() 569 json_print_token(token->child, depth + 1, buf, buflen); in json_print_token() 570 json_print_token(token->sibling, depth, buf, buflen); in json_print_token() 574 void json_print_tree(struct json_token *root, char *buf, size_t buflen) in json_print_tree() argument 577 json_print_token(root, 1, buf, buflen); in json_print_tree()
|
| D | json.h | 40 void json_print_tree(struct json_token *root, char *buf, size_t buflen);
|
| /hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
| D | crypto_mbedtls-bignum.c | 77 u8 *buf, size_t buflen, size_t padlen) in crypto_bignum_to_bin() argument 82 if (padlen > buflen) { in crypto_bignum_to_bin() 88 if ((size_t) num_bytes > buflen) { in crypto_bignum_to_bin() 271 u8 *buf, size_t buflen, size_t padlen) in crypto_bignum_to_string() argument 276 if (padlen > buflen) { in crypto_bignum_to_string()
|
| /hal_espressif-latest/components/wpa_supplicant/src/ap/ |
| D | wps_hostapd.h | 24 char *buf, size_t buflen); 60 char *buf, size_t buflen) in hostapd_wps_get_mib_sta() argument
|
| /hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
| D | sha1-pbkdf2.c | 73 int iterations, u8 *buf, size_t buflen) in pbkdf2_sha1() argument 77 size_t left = buflen, plen; in pbkdf2_sha1()
|
| D | sha1.h | 26 int iterations, u8 *buf, size_t buflen);
|
| D | tls_internal.c | 683 char *buf, size_t buflen) in tls_get_version() argument 689 return tlsv1_client_get_version(conn->client, buf, buflen); in tls_get_version() 696 char *buf, size_t buflen) in tls_get_cipher() argument 702 return tlsv1_client_get_cipher(conn->client, buf, buflen); in tls_get_cipher() 706 return tlsv1_server_get_cipher(conn->server, buf, buflen); in tls_get_cipher()
|
| D | tls.h | 550 char *buf, size_t buflen); 563 char *buf, size_t buflen);
|
| /hal_espressif-latest/components/newlib/platform_include/sys/ |
| D | random.h | 16 ssize_t getrandom(void *buf, size_t buflen, unsigned int flags);
|
| /hal_espressif-latest/components/esp_rom/include/esp32s2/rom/usb/ |
| D | cpio.h | 120 cpio_handle_t cpio_start(cpio_callback_t callback, void *cbarg, size_t buflen, void *memchunk, int …
|
| /hal_espressif-latest/components/esp_rom/include/esp32s3/rom/usb/ |
| D | cpio.h | 120 cpio_handle_t cpio_start(cpio_callback_t callback, void *cbarg, size_t buflen, void *memchunk, int …
|
| /hal_espressif-latest/components/esp_common/include/ |
| D | esp_err.h | 78 const char *esp_err_to_name_r(esp_err_t code, char *buf, size_t buflen);
|
| /hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
| D | eap_ttls.c | 1570 size_t buflen, int verbose) in eap_ttls_get_status() argument 1575 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); in eap_ttls_get_status() 1576 ret = snprintf(buf + len, buflen - len, in eap_ttls_get_status() 1579 if (ret < 0 || (size_t) ret >= buflen - len) in eap_ttls_get_status() 1584 ret = os_snprintf(buf + len, buflen - len, "EAP-%s\n", in eap_ttls_get_status() 1589 ret = snprintf(buf + len, buflen - len, "MSCHAPV2\n"); in eap_ttls_get_status() 1592 ret = os_snprintf(buf + len, buflen - len, "MSCHAP\n"); in eap_ttls_get_status() 1595 ret = os_snprintf(buf + len, buflen - len, "PAP\n"); in eap_ttls_get_status() 1598 ret = os_snprintf(buf + len, buflen - len, "CHAP\n"); in eap_ttls_get_status() 1604 if (ret < 0 || (size_t) ret >= buflen - len) in eap_ttls_get_status()
|
| D | eap_tls_common.h | 113 char *buf, size_t buflen, int verbose);
|
| /hal_espressif-latest/components/wpa_supplicant/src/eapol_auth/ |
| D | eapol_auth_sm.h | 76 size_t buflen);
|
| /hal_espressif-latest/components/esp_rom/include/esp32c6/rom/ |
| D | lldesc.h | 94 void lldesc_build_chain(uint8_t *descptr, uint32_t desclen, uint8_t *mblkptr, uint32_t buflen, uint…
|
| /hal_espressif-latest/components/mbedtls/port/mbedtls_rom/ |
| D | mbedtls_rom_osi.h | 99 int (*_rom_mbedtls_mpi_read_binary)( mbedtls_mpi *X, const unsigned char *buf, size_t buflen ); 100 int (*_rom_mbedtls_mpi_write_binary)( const mbedtls_mpi *X, unsigned char *buf, size_t buflen ); 189 …up *grp, const mbedtls_ecp_point *P, int format, size_t *olen, unsigned char *buf, size_t buflen ); 359 …om_mbedtls_x509_crt_parse_der)( mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen ); 451 int (*_rom_mbedtls_mpi_read_binary)(mbedtls_mpi *X, const unsigned char *buf, size_t buflen); 452 int (*_rom_mbedtls_mpi_write_binary)(const mbedtls_mpi *X, unsigned char *buf, size_t buflen); 545 …int (*_rom_mbedtls_mpi_write_string)(const mbedtls_mpi *X, int radix, char *buf, size_t buflen, si… 546 int (*_rom_mbedtls_mpi_read_binary_le)(mbedtls_mpi *X, const unsigned char *buf, size_t buflen); 547 … int (*_rom_mbedtls_mpi_write_binary_le)(const mbedtls_mpi *X, unsigned char *buf, size_t buflen); 574 …oup *grp, const mbedtls_ecp_point *P, int format, size_t *olen, unsigned char *buf, size_t buflen); [all …]
|