Home
last modified time | relevance | path

Searched refs:id_len (Results 1 – 25 of 52) sorted by relevance

123

/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_generate_session_id.pod14 unsigned int *id_len);
19 unsigned int id_len);
30 (of length B<id_len>) is already contained in the internal session cache
49 B<id> into and a pointer to the maximum allowed length B<id_len>. The
50 buffer at location B<id> is only guaranteed to have the size B<id_len>.
51 The callback is only allowed to generate a shorter id and reduce B<id_len>;
52 the callback B<must never> increase B<id_len> or write to the location
56 callback may only fill part of the possible length and leave B<id_len>
69 guarantee uniqueness, it is recommended to use the maximum B<id_len> and
102 unsigned int *id_len)
[all …]
/freebsd/usr.sbin/bsnmpd/modules/snmp_hostres/
H A Dhostres_partition_tbl.c157 size_t id_len; in partition_entry_create() local
184 id_len = strlen(chunk_name) + 1; in partition_entry_create()
185 if (id_len > PART_STR_MLEN) in partition_entry_create()
186 id_len = PART_STR_MLEN; in partition_entry_create()
188 if ((map->id = malloc(id_len)) == NULL) { in partition_entry_create()
195 strlcpy(map->id, chunk_name, id_len); in partition_entry_create()
230 id_len = strlen(_PATH_DEV) + strlen(chunk_name) + 1; in partition_entry_create()
232 if (id_len > PART_STR_MLEN) in partition_entry_create()
233 id_len = PART_STR_MLEN; in partition_entry_create()
235 if ((entry->label = malloc(id_len )) == NULL) { in partition_entry_create()
[all …]
/freebsd/crypto/openssl/crypto/sm2/
H A Dsm2_sign.c27 const size_t id_len, in ossl_sm2_compute_z_digest() argument
80 if (id_len >= (UINT16_MAX / 8)) { in ossl_sm2_compute_z_digest()
86 entl = (uint16_t)(8 * id_len); in ossl_sm2_compute_z_digest()
99 if (id_len > 0 && !EVP_DigestUpdate(hash, id, id_len)) { in ossl_sm2_compute_z_digest()
151 const size_t id_len, in sm2_compute_msg_hash()
179 if (!ossl_sm2_compute_z_digest(z, fetched_digest, id, id_len, key)) { in sm2_compute_msg_hash()
401 const size_t id_len, in ossl_sm2_do_sign()
407 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign()
424 const size_t id_len, in ossl_sm2_do_verify()
144 sm2_compute_msg_hash(const EVP_MD * digest,const EC_KEY * key,const uint8_t * id,const size_t id_len,const uint8_t * msg,size_t msg_len) sm2_compute_msg_hash() argument
394 ossl_sm2_do_sign(const EC_KEY * key,const EVP_MD * digest,const uint8_t * id,const size_t id_len,const uint8_t * msg,size_t msg_len) ossl_sm2_do_sign() argument
417 ossl_sm2_do_verify(const EC_KEY * key,const EVP_MD * digest,const ECDSA_SIG * sig,const uint8_t * id,const size_t id_len,const uint8_t * msg,size_t msg_len) ossl_sm2_do_verify() argument
[all...]
/freebsd/crypto/openssl/include/crypto/
H A Dsm2.h31 const size_t id_len,
40 const size_t id_len,
47 const size_t id_len,
/freebsd/crypto/openssl/providers/implementations/signature/
H A Dsm2_sig.c90 size_t id_len; member
262 || !ossl_sm2_compute_z_digest(z, ctx->md, ctx->id, ctx->id_len, in sm2sig_compute_z_digest()
376 dstctx->id = OPENSSL_malloc(srcctx->id_len); in sm2sig_dupctx()
379 dstctx->id_len = srcctx->id_len; in sm2sig_dupctx()
380 memcpy(dstctx->id, srcctx->id, srcctx->id_len); in sm2sig_dupctx()
455 psm2ctx->id_len = tmp_idlen; in sm2sig_set_ctx_params()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_ttls.c92 u8 id_len; in eap_ttls_valid_session() local
95 id_len = sm->identity_len; in eap_ttls_valid_session()
97 id_len = 255; in eap_ttls_valid_session()
98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session()
99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session()
1205 u8 id_len; in eap_ttls_process() local
1236 id_len = *pos++; in eap_ttls_process()
1238 pos, id_len); in eap_ttls_process()
1240 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process()
1247 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process()
[all …]
H A Deap_server_peap.c121 u8 id_len; in eap_peap_valid_session() local
124 id_len = sm->identity_len; in eap_peap_valid_session()
126 id_len = 255; in eap_peap_valid_session()
127 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session()
128 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session()
1279 u8 id_len; in eap_peap_process() local
1311 id_len = *pos++; in eap_peap_process()
1313 pos, id_len); in eap_peap_process()
1315 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process()
1322 os_memcpy(sm->identity, pos, id_len); in eap_peap_process()
[all …]
H A Deap_server_gpsk.c28 size_t id_len; member
429 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2()
435 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2()
619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
622 *len = data->id_len; in eap_gpsk_get_session_id()
/freebsd/contrib/libfido2/tools/
H A Dcredman.c246 size_t id_len = 0; in credman_delete_rk() local
250 if (base64_decode(id, &id_ptr, &id_len) < 0) { in credman_delete_rk()
254 if ((r = fido_credman_del_dev_rk(dev, id_ptr, id_len, in credman_delete_rk()
258 r = fido_credman_del_dev_rk(dev, id_ptr, id_len, pin); in credman_delete_rk()
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_tls.c25 size_t id_len; member
229 &data->id_len); in eap_tls_success()
232 data->session_id, data->id_len); in eap_tls_success()
421 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
425 *len = data->id_len; in eap_tls_get_session_id()
H A Deap_gpsk.c27 size_t id_len; member
384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2()
391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2()
756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
759 *len = data->id_len; in eap_gpsk_get_session_id()
H A Deap_fast.c57 size_t id_len; member
821 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); in eap_fast_process_crypto_binding()
824 data->session_id, data->id_len); in eap_fast_process_crypto_binding()
1354 static const u8 * eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len) in eap_fast_get_a_id() argument
1364 *id_len = len; in eap_fast_get_a_id()
1374 *id_len = tlen; in eap_fast_get_a_id()
1377 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: A-ID", a_id, *id_len); in eap_fast_get_a_id()
1780 id = os_memdup(data->session_id, data->id_len); in eap_fast_get_session_id()
1784 *len = data->id_len; in eap_fast_get_session_id()
H A Deap_peap.c59 size_t id_len; member
1175 &data->id_len); in eap_peap_process()
1179 data->session_id, data->id_len); in eap_peap_process()
1376 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id()
1380 *len = data->id_len; in eap_peap_get_session_id()
H A Deap_ttls.c59 size_t id_len; member
328 &data->id_len); in eap_ttls_v0_derive_key()
331 data->session_id, data->id_len); in eap_ttls_v0_derive_key()
1853 id = os_memdup(data->session_id, data->id_len); in eap_ttls_get_session_id()
1857 *len = data->id_len; in eap_ttls_get_session_id()
H A Deap_teap.c57 size_t id_len; member
812 data->id_len = 1 + res; in eap_teap_session_id()
814 data->session_id, data->id_len); in eap_teap_session_id()
2101 id = os_memdup(data->session_id, data->id_len); in eap_teap_get_session_id()
2105 *len = data->id_len; in eap_teap_get_session_id()
/freebsd/contrib/wpa/src/radius/
H A Dradius_server.c564 size_t user_len, id_len; in radius_server_get_new_session() local
628 &id_len, NULL) == 0) { in radius_server_get_new_session()
632 if (id_len >= sizeof(buf)) in radius_server_get_new_session()
633 id_len = sizeof(buf) - 1; in radius_server_get_new_session()
634 os_memcpy(buf, id, id_len); in radius_server_get_new_session()
671 size_t id_len; in radius_srv_hs20_t_c_pending() local
679 id = eap_get_identity(sess->eap, &id_len); in radius_srv_hs20_t_c_pending()
682 id_str = os_malloc(id_len + 1); in radius_srv_hs20_t_c_pending()
685 os_memcpy(id_str, id, id_len); in radius_srv_hs20_t_c_pending()
686 id_str[id_len] = '\0'; in radius_srv_hs20_t_c_pending()
[all …]
/freebsd/sbin/camcontrol/
H A Dpersist.c441 size_t table_size = 0, id_len = 0; in scsipersist() local
494 id_len += id->alloc_len; in scsipersist()
722 res_len = sizeof(struct scsi_per_res_reg_move) + id_len; in scsipersist()
733 res_len += id_len; in scsipersist()
780 scsi_ulto4b(id_len, id_hdr->additional_length); in scsipersist()
/freebsd/sys/dev/iicbus/pwm/
H A Dadt746x.c351 int i, id_len, len = 0, location_len, prev_len = 0; in adt746x_fill_fan_prop() local
359 id_len = OF_getprop_alloc_multi(child, "hwctrl-id", sizeof(cell_t), (void **)&id); in adt746x_fill_fan_prop()
360 if (location_len == -1 || id_len == -1) { in adt746x_fill_fan_prop()
367 for (i = 0; i < id_len; i++) { in adt746x_fill_fan_prop()
/freebsd/crypto/openssl/doc/man7/
H A DEVP_PKEY-SM2.pod48 EVP_PKEY_CTX_set1_id(pctx, id, id_len);
74 EVP_PKEY_CTX_set1_id(pctx, id, id_len);
/freebsd/contrib/wpa/src/eap_common/
H A Deap_sim_common.c1227 int eap_sim_anonymous_username(const u8 *id, size_t id_len) in eap_sim_anonymous_username() argument
1233 if (id_len > anonymous_id_len && in eap_sim_anonymous_username()
1237 if (id_len > anonymous_id_len + 1 && in eap_sim_anonymous_username()
1241 if (id_len > 1 && id[0] == '@') in eap_sim_anonymous_username()
1246 decorated = get_last_char(id, id_len, '!'); in eap_sim_anonymous_username()
1250 id + id_len - decorated); in eap_sim_anonymous_username()
H A Deap_sim_common.h229 int eap_sim_anonymous_username(const u8 *id, size_t id_len);
/freebsd/crypto/openssl/crypto/evp/
H A Dpmeth_lib.c1318 static int get1_id_data(EVP_PKEY_CTX *ctx, void *id, size_t *id_len) in get1_id_data() argument
1342 if (id_len != NULL) in get1_id_data()
1343 *id_len = tmp_id_len; in get1_id_data()
1353 int evp_pkey_ctx_get1_id_len_prov(EVP_PKEY_CTX *ctx, size_t *id_len) in evp_pkey_ctx_get1_id_len_prov() argument
1355 return get1_id_data(ctx, NULL, id_len); in evp_pkey_ctx_get1_id_len_prov()
1363 int EVP_PKEY_CTX_get1_id_len(EVP_PKEY_CTX *ctx, size_t *id_len) in EVP_PKEY_CTX_get1_id_len() argument
1366 EVP_PKEY_CTRL_GET1_ID_LEN, 0, (void*)id_len); in EVP_PKEY_CTX_get1_id_len()
/freebsd/contrib/libfido2/src/fido/
H A Dtypes.h126 uint16_t id_len; /* credential id length */
/freebsd/contrib/libfido2/src/
H A Dcbor.c1081 uint16_t id_len; in decode_attcred() local
1092 if (fido_buf_read(buf, len, &id_len, sizeof(id_len)) < 0) { in decode_attcred()
1097 attcred->id.len = (size_t)be16toh(id_len); in decode_attcred()
/freebsd/crypto/openssl/ssl/
H A Dssl_sess.c352 unsigned int *id_len) in def_generate_session_id() argument
356 if (RAND_bytes_ex(ssl->ctx->libctx, id, *id_len, 0) <= 0) in def_generate_session_id()
358 while (SSL_has_matching_session_id(ssl, id, *id_len) && in def_generate_session_id()

123