/freebsd/sys/netinet/ |
H A D | tcp_fastopen.c | 559 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) in tcp_fastopen_make_psk_cookie() argument 566 SipHash_Update(&ctx, cookie, cookie_len); in tcp_fastopen_make_psk_cookie() 880 if ((cce->cookie_len > 0) && in tcp_fastopen_connect() 886 cce->cookie, cce->cookie_len); in tcp_fastopen_connect() 888 tp->t_tfo_client_cookie_len = cce->cookie_len; in tcp_fastopen_connect() 890 cce->cookie_len); in tcp_fastopen_connect() 919 cce->cookie_len = 0; in tcp_fastopen_connect() 963 cce->cookie_len = 0; in tcp_fastopen_disable_path() 980 uint8_t cookie_len, uint8_t *cookie) in tcp_fastopen_update_cache() argument 988 if ((cookie_len >= TCP_FASTOPEN_MIN_COOKIE_LEN) && in tcp_fastopen_update_cache() [all …]
|
H A D | tcp_fastopen.h | 59 uint8_t cookie_len; member
|
H A D | sctp_input.c | 1333 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1349 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, in sctp_process_cookie_existing() argument 1740 sh, cookie, cookie_len, in sctp_process_cookie_existing() 1957 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, in sctp_process_cookie_new() argument 2014 initack_limit = offset + cookie_len; in sctp_process_cookie_new() 2254 unsigned int cookie_len; in sctp_handle_cookie_echo() local 2276 cookie_len = ntohs(cp->ch.chunk_length); in sctp_handle_cookie_echo() 2278 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) + in sctp_handle_cookie_echo() 2300 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE; in sctp_handle_cookie_echo() 2528 cookie_len -= SCTP_SIGNATURE_SIZE; in sctp_handle_cookie_echo() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 19 size_t *cookie_len)); 24 size_t cookie_len)); 31 *cookie_len)); 37 cookie_len)); 46 of bytes written to B<cookie_len>. If a cookie cannot be generated, a zero 52 length B<cookie_len>. A nonzero return value from verify_stateless_cookie_cb() 61 B<cookie>, and must write the number of bytes written to B<cookie_len>. If a 67 pointed to by B<cookie> and is of length B<cookie_len>. A nonzero return value
|
/freebsd/crypto/openssl/test/ |
H A D | dtlsv1listentest.c | 262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument 268 *cookie_len = COOKIE_LEN; in cookie_gen() 274 unsigned int cookie_len) in cookie_verify() argument 278 if (cookie_len != COOKIE_LEN) in cookie_verify()
|
H A D | dtlstest.c | 48 unsigned int *cookie_len) in generate_cookie_cb() argument 51 *cookie_len = sizeof(dummy_cookie); in generate_cookie_cb() 56 unsigned int cookie_len) in verify_cookie_cb() argument 58 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb()
|
H A D | sslapitest.c | 5639 unsigned int *cookie_len) in generate_cookie_callback() argument 5646 *cookie_len = sizeof(cookie_magic_value) - 1; in generate_cookie_callback() 5652 unsigned int cookie_len) in verify_cookie_callback() argument 5654 if (cookie_len == sizeof(cookie_magic_value) - 1 in verify_cookie_callback() 5655 && memcmp(cookie, cookie_magic_value, cookie_len) == 0) in verify_cookie_callback() 5662 size_t *cookie_len) in generate_stateless_cookie_callback() argument 5666 *cookie_len = temp; in generate_stateless_cookie_callback() 5671 size_t cookie_len) in verify_stateless_cookie_callback() argument 5673 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
|
/freebsd/contrib/tcpdump/ |
H A D | print-juniper.c | 381 uint8_t cookie_len; /* cookie len */ member 428 uint8_t cookie_len; member 912 if (l2info.cookie_len == 0) { in juniper_mfr_if_print() 919 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { in juniper_mfr_if_print() 1279 l2info->cookie_len = 0; in juniper_parse_header() 1417 l2info->cookie_len += lp->cookie_len; in juniper_parse_header() 1422 l2info->cookie_len += 2; in juniper_parse_header() 1426 l2info->cookie_len = 8; in juniper_parse_header() 1439 l2info->cookie_len = 0; in juniper_parse_header() 1443 l2info->header_len += l2info->cookie_len; in juniper_parse_header() [all …]
|
/freebsd/crypto/openssl/apps/include/ |
H A D | s_apps.h | 49 unsigned int *cookie_len); 51 unsigned int cookie_len); 59 size_t *cookie_len); 61 size_t cookie_len);
|
/freebsd/contrib/unbound/util/ |
H A D | edns.c | 162 edns_cookie_server_validate(const uint8_t* cookie, size_t cookie_len, in edns_cookie_server_validate() argument 170 if(cookie_len != 24) in edns_cookie_server_validate() 281 cookie_secrets_server_validate(const uint8_t* cookie, size_t cookie_len, in cookie_secrets_server_validate() argument 297 cookie_len, in cookie_secrets_server_validate()
|
H A D | edns.h | 191 size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4, 228 const uint8_t* cookie, size_t cookie_len,
|
/freebsd/crypto/openssl/apps/lib/ |
H A D | s_cb.c | 776 size_t *cookie_len) in generate_stateless_cookie_callback() argument 822 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { in generate_stateless_cookie_callback() 836 size_t cookie_len) in verify_stateless_cookie_callback() argument 845 && cookie_len == resultlength in verify_stateless_cookie_callback() 853 unsigned int *cookie_len) in generate_cookie_callback() argument 859 *cookie_len = (unsigned int)temp; in generate_cookie_callback() 864 unsigned int cookie_len) in verify_cookie_callback() argument 866 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); in verify_cookie_callback()
|
/freebsd/usr.sbin/ypldap/ |
H A D | aldap.h | 41 unsigned int cookie_len; member
|
H A D | aldap.c | 229 page->cookie_len) == NULL) in aldap_create_page_control() 338 page->cookie_len = elm->be_sub->be_next->be_len; in aldap_parse_page_control() 340 if ((page->cookie = malloc(page->cookie_len)) == NULL) { in aldap_parse_page_control() 347 memcpy(page->cookie, s, page->cookie_len); in aldap_parse_page_control()
|
H A D | ldapclient.c | 535 if (m->page != NULL && m->page->cookie_len != 0) in client_search_idm()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 1382 unsigned int *cookie_len)) in SSL_CTX_set_cookie_generate_cb() argument 1390 unsigned int cookie_len)) in SSL_CTX_set_cookie_verify_cb() argument 1422 size_t *cookie_len)) in SSL_CTX_set_stateless_cookie_generate_cb() argument 1431 size_t cookie_len)) in SSL_CTX_set_stateless_cookie_verify_cb() argument
|
H A D | ssl_local.h | 929 unsigned int *cookie_len); 933 unsigned int cookie_len); 937 size_t *cookie_len); 941 size_t cookie_len); 1902 size_t cookie_len; member 2574 size_t cookie_len);
|
H A D | d1_lib.c | 86 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new() 197 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1221 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello() 1223 s->d1->cookie_len)) { in tls_construct_client_hello() 1280 size_t cookie_len; in dtls_process_hello_verify() local 1289 cookie_len = PACKET_remaining(&cookiepkt); in dtls_process_hello_verify() 1290 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify() 1295 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify() 1299 s->d1->cookie_len = cookie_len; in dtls_process_hello_verify()
|
H A D | statem_srvr.c | 1278 size_t cookie_len) in dtls_raw_hello_verify_request() argument 1282 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request() 1298 s->d1->cookie_len = cookie_leni; in dtls_construct_hello_verify_request() 1301 s->d1->cookie_len)) { in dtls_construct_hello_verify_request() 1679 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len in tls_early_post_process_client_hello() 1681 s->d1->cookie_len) != 0) { in tls_early_post_process_client_hello()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ssl.h | 761 *cookie_len)); 767 cookie_len)); 773 size_t *cookie_len)); 778 size_t cookie_len));
|
H A D | ssl.h.in | 738 *cookie_len)); 744 cookie_len)); 750 size_t *cookie_len)); 755 size_t cookie_len));
|