/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_generate_session_id.pod | 14 unsigned int *id_len); 19 unsigned int id_len); 30 (of length B<id_len>) is already contained in the internal session cache 49 B<id> into and a pointer to the maximum allowed length B<id_len>. The 50 buffer at location B<id> is only guaranteed to have the size B<id_len>. 51 The callback is only allowed to generate a shorter id and reduce B<id_len>; 52 the callback B<must never> increase B<id_len> or write to the location 56 callback may only fill part of the possible length and leave B<id_len> 69 guarantee uniqueness, it is recommended to use the maximum B<id_len> and 102 unsigned int *id_len) [all …]
|
/freebsd/usr.sbin/bsnmpd/modules/snmp_hostres/ |
H A D | hostres_partition_tbl.c | 157 size_t id_len; in partition_entry_create() local 184 id_len = strlen(chunk_name) + 1; in partition_entry_create() 185 if (id_len > PART_STR_MLEN) in partition_entry_create() 186 id_len = PART_STR_MLEN; in partition_entry_create() 188 if ((map->id = malloc(id_len)) == NULL) { in partition_entry_create() 195 strlcpy(map->id, chunk_name, id_len); in partition_entry_create() 230 id_len = strlen(_PATH_DEV) + strlen(chunk_name) + 1; in partition_entry_create() 232 if (id_len > PART_STR_MLEN) in partition_entry_create() 233 id_len = PART_STR_MLEN; in partition_entry_create() 235 if ((entry->label = malloc(id_len )) == NULL) { in partition_entry_create() [all …]
|
/freebsd/crypto/openssl/crypto/sm2/ |
H A D | sm2_sign.c | 27 const size_t id_len, in ossl_sm2_compute_z_digest() argument 80 if (id_len >= (UINT16_MAX / 8)) { in ossl_sm2_compute_z_digest() 86 entl = (uint16_t)(8 * id_len); in ossl_sm2_compute_z_digest() 99 if (id_len > 0 && !EVP_DigestUpdate(hash, id, id_len)) { in ossl_sm2_compute_z_digest() 151 const size_t id_len, in sm2_compute_msg_hash() 179 if (!ossl_sm2_compute_z_digest(z, fetched_digest, id, id_len, key)) { in sm2_compute_msg_hash() 401 const size_t id_len, in ossl_sm2_do_sign() 407 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign() 424 const size_t id_len, in ossl_sm2_do_verify() 144 sm2_compute_msg_hash(const EVP_MD * digest,const EC_KEY * key,const uint8_t * id,const size_t id_len,const uint8_t * msg,size_t msg_len) sm2_compute_msg_hash() argument 394 ossl_sm2_do_sign(const EC_KEY * key,const EVP_MD * digest,const uint8_t * id,const size_t id_len,const uint8_t * msg,size_t msg_len) ossl_sm2_do_sign() argument 417 ossl_sm2_do_verify(const EC_KEY * key,const EVP_MD * digest,const ECDSA_SIG * sig,const uint8_t * id,const size_t id_len,const uint8_t * msg,size_t msg_len) ossl_sm2_do_verify() argument [all...] |
/freebsd/crypto/openssl/include/crypto/ |
H A D | sm2.h | 31 const size_t id_len, 40 const size_t id_len, 47 const size_t id_len,
|
/freebsd/crypto/openssl/providers/implementations/signature/ |
H A D | sm2_sig.c | 90 size_t id_len; member 262 || !ossl_sm2_compute_z_digest(z, ctx->md, ctx->id, ctx->id_len, in sm2sig_compute_z_digest() 376 dstctx->id = OPENSSL_malloc(srcctx->id_len); in sm2sig_dupctx() 379 dstctx->id_len = srcctx->id_len; in sm2sig_dupctx() 380 memcpy(dstctx->id, srcctx->id, srcctx->id_len); in sm2sig_dupctx() 455 psm2ctx->id_len = tmp_idlen; in sm2sig_set_ctx_params()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_ttls.c | 92 u8 id_len; in eap_ttls_valid_session() local 95 id_len = sm->identity_len; in eap_ttls_valid_session() 97 id_len = 255; in eap_ttls_valid_session() 98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 1205 u8 id_len; in eap_ttls_process() local 1236 id_len = *pos++; in eap_ttls_process() 1238 pos, id_len); in eap_ttls_process() 1240 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process() 1247 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process() [all …]
|
H A D | eap_server_peap.c | 121 u8 id_len; in eap_peap_valid_session() local 124 id_len = sm->identity_len; in eap_peap_valid_session() 126 id_len = 255; in eap_peap_valid_session() 127 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session() 128 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session() 1279 u8 id_len; in eap_peap_process() local 1311 id_len = *pos++; in eap_peap_process() 1313 pos, id_len); in eap_peap_process() 1315 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process() 1322 os_memcpy(sm->identity, pos, id_len); in eap_peap_process() [all …]
|
H A D | eap_server_gpsk.c | 28 size_t id_len; member 429 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2() 435 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2() 619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 622 *len = data->id_len; in eap_gpsk_get_session_id()
|
/freebsd/contrib/libfido2/tools/ |
H A D | credman.c | 246 size_t id_len = 0; in credman_delete_rk() local 250 if (base64_decode(id, &id_ptr, &id_len) < 0) { in credman_delete_rk() 254 if ((r = fido_credman_del_dev_rk(dev, id_ptr, id_len, in credman_delete_rk() 258 r = fido_credman_del_dev_rk(dev, id_ptr, id_len, pin); in credman_delete_rk()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_tls.c | 25 size_t id_len; member 229 &data->id_len); in eap_tls_success() 232 data->session_id, data->id_len); in eap_tls_success() 421 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id() 425 *len = data->id_len; in eap_tls_get_session_id()
|
H A D | eap_gpsk.c | 27 size_t id_len; member 384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2() 391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2() 756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 759 *len = data->id_len; in eap_gpsk_get_session_id()
|
H A D | eap_fast.c | 57 size_t id_len; member 821 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); in eap_fast_process_crypto_binding() 824 data->session_id, data->id_len); in eap_fast_process_crypto_binding() 1354 static const u8 * eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len) in eap_fast_get_a_id() argument 1364 *id_len = len; in eap_fast_get_a_id() 1374 *id_len = tlen; in eap_fast_get_a_id() 1377 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: A-ID", a_id, *id_len); in eap_fast_get_a_id() 1780 id = os_memdup(data->session_id, data->id_len); in eap_fast_get_session_id() 1784 *len = data->id_len; in eap_fast_get_session_id()
|
H A D | eap_peap.c | 59 size_t id_len; member 1175 &data->id_len); in eap_peap_process() 1179 data->session_id, data->id_len); in eap_peap_process() 1376 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id() 1380 *len = data->id_len; in eap_peap_get_session_id()
|
H A D | eap_ttls.c | 59 size_t id_len; member 328 &data->id_len); in eap_ttls_v0_derive_key() 331 data->session_id, data->id_len); in eap_ttls_v0_derive_key() 1853 id = os_memdup(data->session_id, data->id_len); in eap_ttls_get_session_id() 1857 *len = data->id_len; in eap_ttls_get_session_id()
|
H A D | eap_teap.c | 57 size_t id_len; member 812 data->id_len = 1 + res; in eap_teap_session_id() 814 data->session_id, data->id_len); in eap_teap_session_id() 2101 id = os_memdup(data->session_id, data->id_len); in eap_teap_get_session_id() 2105 *len = data->id_len; in eap_teap_get_session_id()
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius_server.c | 564 size_t user_len, id_len; in radius_server_get_new_session() local 628 &id_len, NULL) == 0) { in radius_server_get_new_session() 632 if (id_len >= sizeof(buf)) in radius_server_get_new_session() 633 id_len = sizeof(buf) - 1; in radius_server_get_new_session() 634 os_memcpy(buf, id, id_len); in radius_server_get_new_session() 671 size_t id_len; in radius_srv_hs20_t_c_pending() local 679 id = eap_get_identity(sess->eap, &id_len); in radius_srv_hs20_t_c_pending() 682 id_str = os_malloc(id_len + 1); in radius_srv_hs20_t_c_pending() 685 os_memcpy(id_str, id, id_len); in radius_srv_hs20_t_c_pending() 686 id_str[id_len] = '\0'; in radius_srv_hs20_t_c_pending() [all …]
|
/freebsd/sbin/camcontrol/ |
H A D | persist.c | 441 size_t table_size = 0, id_len = 0; in scsipersist() local 494 id_len += id->alloc_len; in scsipersist() 722 res_len = sizeof(struct scsi_per_res_reg_move) + id_len; in scsipersist() 733 res_len += id_len; in scsipersist() 780 scsi_ulto4b(id_len, id_hdr->additional_length); in scsipersist()
|
/freebsd/sys/dev/iicbus/pwm/ |
H A D | adt746x.c | 351 int i, id_len, len = 0, location_len, prev_len = 0; in adt746x_fill_fan_prop() local 359 id_len = OF_getprop_alloc_multi(child, "hwctrl-id", sizeof(cell_t), (void **)&id); in adt746x_fill_fan_prop() 360 if (location_len == -1 || id_len == -1) { in adt746x_fill_fan_prop() 367 for (i = 0; i < id_len; i++) { in adt746x_fill_fan_prop()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-SM2.pod | 48 EVP_PKEY_CTX_set1_id(pctx, id, id_len); 74 EVP_PKEY_CTX_set1_id(pctx, id, id_len);
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 1227 int eap_sim_anonymous_username(const u8 *id, size_t id_len) in eap_sim_anonymous_username() argument 1233 if (id_len > anonymous_id_len && in eap_sim_anonymous_username() 1237 if (id_len > anonymous_id_len + 1 && in eap_sim_anonymous_username() 1241 if (id_len > 1 && id[0] == '@') in eap_sim_anonymous_username() 1246 decorated = get_last_char(id, id_len, '!'); in eap_sim_anonymous_username() 1250 id + id_len - decorated); in eap_sim_anonymous_username()
|
H A D | eap_sim_common.h | 229 int eap_sim_anonymous_username(const u8 *id, size_t id_len);
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | pmeth_lib.c | 1318 static int get1_id_data(EVP_PKEY_CTX *ctx, void *id, size_t *id_len) in get1_id_data() argument 1342 if (id_len != NULL) in get1_id_data() 1343 *id_len = tmp_id_len; in get1_id_data() 1353 int evp_pkey_ctx_get1_id_len_prov(EVP_PKEY_CTX *ctx, size_t *id_len) in evp_pkey_ctx_get1_id_len_prov() argument 1355 return get1_id_data(ctx, NULL, id_len); in evp_pkey_ctx_get1_id_len_prov() 1363 int EVP_PKEY_CTX_get1_id_len(EVP_PKEY_CTX *ctx, size_t *id_len) in EVP_PKEY_CTX_get1_id_len() argument 1366 EVP_PKEY_CTRL_GET1_ID_LEN, 0, (void*)id_len); in EVP_PKEY_CTX_get1_id_len()
|
/freebsd/contrib/libfido2/src/fido/ |
H A D | types.h | 126 uint16_t id_len; /* credential id length */
|
/freebsd/contrib/libfido2/src/ |
H A D | cbor.c | 1081 uint16_t id_len; in decode_attcred() local 1092 if (fido_buf_read(buf, len, &id_len, sizeof(id_len)) < 0) { in decode_attcred() 1097 attcred->id.len = (size_t)be16toh(id_len); in decode_attcred()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 352 unsigned int *id_len) in def_generate_session_id() argument 356 if (RAND_bytes_ex(ssl->ctx->libctx, id, *id_len, 0) <= 0) in def_generate_session_id() 358 while (SSL_has_matching_session_id(ssl, id, *id_len) && in def_generate_session_id()
|