| /freebsd/crypto/openssl/util/perl/TLSProxy/ |
| H A D | HelloVerifyRequest.pm | 44 $self->{cookie_len} = 0; 56 my $cookie_len = unpack('C', substr($self->data, $ptr)); 58 my $cookie = substr($self->data, $ptr, $cookie_len); 61 $self->cookie_len($cookie_len); 67 print " Cookie Len:".$cookie_len."\n"; 84 $data .= pack('C', $self->cookie_len); 99 sub cookie_len subroutine 103 $self->{cookie_len} = shift; 105 return $self->{cookie_len};
|
| /freebsd/sys/netinet/ |
| H A D | tcp_fastopen.c | 558 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) in tcp_fastopen_make_psk_cookie() argument 565 SipHash_Update(&ctx, cookie, cookie_len); in tcp_fastopen_make_psk_cookie() 879 if ((cce->cookie_len > 0) && in tcp_fastopen_connect() 885 cce->cookie, cce->cookie_len); in tcp_fastopen_connect() 887 tp->t_tfo_client_cookie_len = cce->cookie_len; in tcp_fastopen_connect() 889 cce->cookie_len); in tcp_fastopen_connect() 918 cce->cookie_len = 0; in tcp_fastopen_connect() 962 cce->cookie_len = 0; in tcp_fastopen_disable_path() 979 uint8_t cookie_len, uint8_t *cookie) in tcp_fastopen_update_cache() argument 987 if ((cookie_len >= TCP_FASTOPEN_MIN_COOKIE_LEN) && in tcp_fastopen_update_cache() [all …]
|
| H A D | tcp_fastopen.h | 59 uint8_t cookie_len; member
|
| H A D | sctp_input.c | 1333 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1349 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, in sctp_process_cookie_existing() argument 1740 sh, cookie, cookie_len, in sctp_process_cookie_existing() 1957 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, in sctp_process_cookie_new() argument 2014 initack_limit = offset + cookie_len; in sctp_process_cookie_new() 2254 unsigned int cookie_len; in sctp_handle_cookie_echo() local 2276 cookie_len = ntohs(cp->ch.chunk_length); in sctp_handle_cookie_echo() 2278 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) + in sctp_handle_cookie_echo() 2300 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE; in sctp_handle_cookie_echo() 2528 cookie_len -= SCTP_SIGNATURE_SIZE; in sctp_handle_cookie_echo() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 19 size_t *cookie_len)); 24 size_t cookie_len)); 31 *cookie_len)); 37 cookie_len)); 46 of bytes written to B<cookie_len>. If a cookie cannot be generated, a zero 52 length B<cookie_len>. A nonzero return value from verify_stateless_cookie_cb() 61 B<cookie>, and must write the number of bytes written to B<cookie_len>. If a 67 pointed to by B<cookie> and is of length B<cookie_len>. A nonzero return value
|
| /freebsd/crypto/openssl/test/ |
| H A D | dtlsv1listentest.c | 263 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument 269 *cookie_len = COOKIE_LEN; in cookie_gen() 275 unsigned int cookie_len) in cookie_verify() argument 279 if (cookie_len != COOKIE_LEN) in cookie_verify()
|
| H A D | dtlstest.c | 47 unsigned int *cookie_len) in generate_cookie_cb() argument 50 *cookie_len = sizeof(dummy_cookie); in generate_cookie_cb() 55 unsigned int cookie_len) in verify_cookie_cb() argument 57 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb()
|
| H A D | sslapitest.c | 5949 unsigned int *cookie_len) in generate_cookie_callback() argument 5956 *cookie_len = sizeof(cookie_magic_value) - 1; in generate_cookie_callback() 5962 unsigned int cookie_len) in verify_cookie_callback() argument 5964 if (cookie_len == sizeof(cookie_magic_value) - 1 in verify_cookie_callback() 5965 && memcmp(cookie, cookie_magic_value, cookie_len) == 0) in verify_cookie_callback() 5972 size_t *cookie_len) in generate_stateless_cookie_callback() argument 5976 *cookie_len = temp; in generate_stateless_cookie_callback() 5981 size_t cookie_len) in verify_stateless_cookie_callback() argument 5983 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
|
| /freebsd/contrib/tcpdump/ |
| H A D | print-juniper.c | 381 uint8_t cookie_len; /* cookie len */ member 428 uint8_t cookie_len; member 912 if (l2info.cookie_len == 0) { in juniper_mfr_if_print() 919 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { in juniper_mfr_if_print() 1279 l2info->cookie_len = 0; in juniper_parse_header() 1417 l2info->cookie_len += lp->cookie_len; in juniper_parse_header() 1422 l2info->cookie_len += 2; in juniper_parse_header() 1426 l2info->cookie_len = 8; in juniper_parse_header() 1439 l2info->cookie_len = 0; in juniper_parse_header() 1443 l2info->header_len += l2info->cookie_len; in juniper_parse_header() [all …]
|
| /freebsd/crypto/openssl/apps/include/ |
| H A D | s_apps.h | 54 unsigned int *cookie_len); 56 unsigned int cookie_len); 64 size_t *cookie_len); 66 size_t cookie_len);
|
| /freebsd/contrib/unbound/util/ |
| H A D | edns.c | 185 edns_cookie_server_validate(const uint8_t* cookie, size_t cookie_len, in edns_cookie_server_validate() 193 if(cookie_len != 24) in edns_cookie_server_validate() 304 cookie_secrets_server_validate(const uint8_t* cookie, size_t cookie_len, in cookie_secrets_server_validate() 320 cookie_len, in add_cookie_secret() 162 edns_cookie_server_validate(const uint8_t * cookie,size_t cookie_len,const uint8_t * secret,size_t secret_len,int v4,const uint8_t * hash_input,uint32_t now) edns_cookie_server_validate() argument 281 cookie_secrets_server_validate(const uint8_t * cookie,size_t cookie_len,struct cookie_secrets * cookie_secrets,int v4,const uint8_t * hash_input,uint32_t now) cookie_secrets_server_validate() argument
|
| H A D | edns.h | 196 * @param cookie_len: the length of the cookie data. 207 size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4, 234 * @param cookie_len: the length of the cookie data. 244 const uint8_t* cookie, size_t cookie_len,
|
| /freebsd/crypto/openssl/apps/lib/ |
| H A D | s_cb.c | 842 size_t *cookie_len) in generate_stateless_cookie_callback() argument 889 cookie, DTLS1_COOKIE_LENGTH, cookie_len) in generate_stateless_cookie_callback() 904 size_t cookie_len) in verify_stateless_cookie_callback() argument 913 && cookie_len == resultlength in verify_stateless_cookie_callback() 921 unsigned int *cookie_len) in generate_cookie_callback() argument 927 *cookie_len = (unsigned int)temp; in generate_cookie_callback() 932 unsigned int cookie_len) in verify_cookie_callback() argument 934 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); in verify_cookie_callback()
|
| /freebsd/usr.sbin/ypldap/ |
| H A D | aldap.h | 41 unsigned int cookie_len; member
|
| H A D | aldap.c | 229 page->cookie_len) == NULL) in aldap_create_page_control() 338 page->cookie_len = elm->be_sub->be_next->be_len; in aldap_parse_page_control() 340 if ((page->cookie = malloc(page->cookie_len)) == NULL) { in aldap_parse_page_control() 347 memcpy(page->cookie, s, page->cookie_len); in aldap_parse_page_control()
|
| H A D | ldapclient.c | 535 if (m->page != NULL && m->page->cookie_len != 0) in client_search_idm()
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | ssl_sess.c | 1416 unsigned int *cookie_len)) in SSL_CTX_set_cookie_generate_cb() argument 1424 unsigned int cookie_len)) in SSL_CTX_set_cookie_verify_cb() argument 1456 size_t *cookie_len)) in SSL_CTX_set_stateless_cookie_generate_cb() argument 1465 size_t cookie_len)) in SSL_CTX_set_stateless_cookie_verify_cb() argument
|
| H A D | d1_lib.c | 88 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new() 202 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
|
| H A D | ssl_local.h | 881 unsigned int *cookie_len); 885 unsigned int cookie_len); 889 size_t *cookie_len); 893 size_t cookie_len); 1954 size_t cookie_len; member 2747 size_t cookie_len);
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_clnt.c | 1303 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello() 1305 s->d1->cookie_len)) { in tls_construct_client_hello() 1364 size_t cookie_len; in dtls_process_hello_verify() local 1373 cookie_len = PACKET_remaining(&cookiepkt); in dtls_process_hello_verify() 1374 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify() 1379 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify() 1383 s->d1->cookie_len = cookie_len; in dtls_process_hello_verify()
|
| H A D | statem_srvr.c | 1383 size_t cookie_len) in dtls_raw_hello_verify_request() argument 1387 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request() 1407 s->d1->cookie_len = cookie_leni; in dtls_construct_hello_verify_request() 1410 s->d1->cookie_len)) { in dtls_construct_hello_verify_request() 1804 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len in tls_early_post_process_client_hello() 1806 s->d1->cookie_len) in tls_early_post_process_client_hello()
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | ssl.h | 784 *cookie_len)); 789 cookie_len)); 795 size_t *cookie_len)); 800 size_t cookie_len));
|
| H A D | ssl.h.in | 761 *cookie_len)); 766 cookie_len)); 772 size_t *cookie_len)); 777 size_t cookie_len));
|