/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_ess.c | 117 unsigned char *id, int idlen, int allorfirst, in CMS_ReceiptRequest_create0_ex() argument 127 ASN1_STRING_set0(rr->signedContentIdentifier, id, idlen); in CMS_ReceiptRequest_create0_ex() 159 unsigned char *id, int idlen, int allorfirst, in CMS_ReceiptRequest_create0() argument 162 return CMS_ReceiptRequest_create0_ex(id, idlen, allorfirst, receiptList, in CMS_ReceiptRequest_create0()
|
H A D | cms_env.c | 631 const unsigned char *id, size_t idlen) in CMS_RecipientInfo_kekri_id_cmp() argument 643 tmp_os.length = (int)idlen; in CMS_RecipientInfo_kekri_id_cmp() 668 unsigned char *id, size_t idlen, in CMS_add0_recipient_key() argument 743 ASN1_STRING_set0(kekri->kekid->keyIdentifier, id, idlen); in CMS_add0_recipient_key()
|
H A D | cms_smime.c | 788 const unsigned char *id, size_t idlen) in CMS_decrypt_set1_key() argument 802 || (CMS_RecipientInfo_kekri_id_cmp(ri, id, idlen) == 0)) { in CMS_decrypt_set1_key()
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | v3_ncons.c | 313 static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen) in cn2dnsid() argument 322 *idlen = 0; in cn2dnsid() 399 *idlen = (size_t)utf8_length; in cn2dnsid() 427 size_t idlen; in NAME_CONSTRAINTS_check_CN() local 436 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK) in NAME_CONSTRAINTS_check_CN() 438 if (idlen == 0) in NAME_CONSTRAINTS_check_CN() 441 stmp.length = idlen; in NAME_CONSTRAINTS_check_CN()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | CMS_get1_ReceiptRequest.pod | 14 unsigned char *id, int idlen, int allorfirst, 18 unsigned char *id, int idlen, int allorfirst, 30 structure. The B<signedContentIdentifier> field is set using I<id> and I<idlen>,
|
H A D | CMS_add1_recipient_cert.pod | 20 unsigned char *id, size_t idlen, 36 wrapping algorithm B<nid>, identifier B<id> of length B<idlen> and optional
|
H A D | SSL_CTX_set_psk_client_callback.pod | 19 size_t *idlen, 55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>. 99 NULL. The contents of B<*id> and B<*idlen> will be ignored.
|
H A D | CMS_get0_RecipientInfos.pod | 36 const unsigned char *id, size_t idlen); 82 CMS_RecipientInfo_kekri_id_cmp() compares the ID in the B<id> and B<idlen>
|
/freebsd/sys/dev/hyperv/netvsc/ |
H A D | hn_rndis.c | 309 const void *idata, size_t idlen, void *odata, size_t *odlen0) in hn_rndis_query() argument 312 return (hn_rndis_query2(sc, oid, idata, idlen, odata, odlen0, *odlen0)); in hn_rndis_query() 317 const void *idata, size_t idlen, void *odata, size_t *odlen0, in hn_rndis_query2() argument 327 reqlen = sizeof(*req) + idlen; in hn_rndis_query2() 351 if (idlen > 0) { in hn_rndis_query2() 352 req->rm_infobuflen = idlen; in hn_rndis_query2() 354 memcpy(req + 1, idata, idlen); in hn_rndis_query2()
|
/freebsd/sbin/setkey/ |
H A D | test-pfkey.c | 373 u_int idlen = strlen(str), len; local 375 len = sizeof(m_id) + PFKEY_ALIGN8(idlen); 384 str, idlen);
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | cms.h.in | 187 const unsigned char *id, size_t idlen); 219 unsigned char *id, size_t idlen, 235 const unsigned char *id, size_t idlen); 339 unsigned char *id, int idlen, int allorfirst, 343 unsigned char *id, int idlen, int allorfirst,
|
H A D | cms.h | 285 const unsigned char *id, size_t idlen); 317 unsigned char *id, size_t idlen, 333 const unsigned char *id, size_t idlen); 437 unsigned char *id, int idlen, int allorfirst, 441 unsigned char *id, int idlen, int allorfirst,
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 347 int idlen = i2d_OCSP_RESPID(id, NULL); in tls_construct_ctos_status_request() local 349 if (idlen <= 0 in tls_construct_ctos_status_request() 351 || !WPACKET_sub_allocate_bytes_u16(pkt, idlen, &idbytes) in tls_construct_ctos_status_request() 352 || i2d_OCSP_RESPID(id, &idbytes) != idlen) { in tls_construct_ctos_status_request() 747 size_t idlen = 0; in tls_construct_ctos_early_data() local 756 && (!s->psk_use_session_cb(s, handmd, &id, &idlen, &psksess) in tls_construct_ctos_early_data() 780 idlen = strlen(identity); in tls_construct_ctos_early_data() 781 if (idlen > PSK_MAX_IDENTITY_LEN) { in tls_construct_ctos_early_data() 815 s->psksession_id = OPENSSL_memdup(id, idlen); in tls_construct_ctos_early_data() 821 s->psksession_id_len = idlen; in tls_construct_ctos_early_data()
|
H A D | extensions_srvr.c | 1015 size_t idlen; in tls_parse_ctos_psk() local 1023 idlen = PACKET_remaining(&identity); in tls_parse_ctos_psk() 1025 && !s->psk_find_session_cb(s, PACKET_data(&identity), idlen, in tls_parse_ctos_psk() 1034 && idlen <= PSK_MAX_IDENTITY_LEN) { in tls_parse_ctos_psk()
|
/freebsd/sys/fs/nfsclient/ |
H A D | nfs_clport.c | 671 nfscl_fillclid(u_int64_t clval, char *uuid, u_int8_t *cp, u_int16_t idlen) in nfscl_fillclid() argument 678 if (idlen >= sizeof (u_int64_t)) { in nfscl_fillclid() 681 idlen -= sizeof (u_int64_t); in nfscl_fillclid() 688 if (uuidlen > 0 && idlen >= uuidlen) { in nfscl_fillclid() 691 idlen -= uuidlen; in nfscl_fillclid() 697 while (idlen > 0) { in nfscl_fillclid() 699 idlen--; in nfscl_fillclid()
|
H A D | nfs_clstate.c | 877 u_int16_t idlen = 0; in nfscl_getcl() local 882 idlen = strlen(uuid); in nfscl_getcl() 883 if (idlen > 0) in nfscl_getcl() 884 idlen += sizeof (u_int64_t); in nfscl_getcl() 886 idlen += sizeof (u_int64_t) + 16; /* 16 random bytes */ in nfscl_getcl() 888 sizeof (struct nfsclclient) + idlen - 1, M_NFSCLCLIENT, in nfscl_getcl() 910 clp->nfsc_idlen = idlen; in nfscl_getcl()
|
/freebsd/sys/cam/ctl/ |
H A D | ctl_frontend_iscsi.c | 2148 int retval, len, idlen; in cfiscsi_ioctl_port_create() local 2208 idlen = strlen(target) + strlen(",t,0x0001") + 1; in cfiscsi_ioctl_port_create() 2209 idlen = roundup2(idlen, 4); in cfiscsi_ioctl_port_create() 2210 len = sizeof(struct scsi_vpd_device_id) + idlen; in cfiscsi_ioctl_port_create() 2218 desc->length = idlen; in cfiscsi_ioctl_port_create() 2219 snprintf(desc->identifier, idlen, "%s,t,0x%4.4x", target, tag); in cfiscsi_ioctl_port_create() 2222 idlen = strlen(target) + 1; in cfiscsi_ioctl_port_create() 2223 idlen = roundup2(idlen, 4); in cfiscsi_ioctl_port_create() 2224 len = sizeof(struct scsi_vpd_device_id) + idlen; in cfiscsi_ioctl_port_create() 2232 desc->length = idlen; in cfiscsi_ioctl_port_create() [all …]
|
/freebsd/crypto/openssl/apps/ |
H A D | s_server.c | 3689 unsigned int idlen; member 3702 SSL_SESSION_get_id(session, &sess->idlen); in add_session() 3710 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session() 3736 static SSL_SESSION *get_session(SSL *ssl, const unsigned char *id, int idlen, in get_session() argument 3742 if (idlen == (int)sess->idlen && !memcmp(sess->id, id, idlen)) { in get_session() 3756 unsigned int idlen; in del_session() local 3757 id = SSL_SESSION_get_id(session, &idlen); in del_session() 3759 if (idlen == sess->idlen && !memcmp(sess->id, id, idlen)) { in del_session()
|
H A D | cms.c | 1354 int idlen; in receipt_request_print() local 1358 idlen = ASN1_STRING_length(scid); in receipt_request_print() 1360 BIO_dump_indent(bio_err, id, idlen, 4); in receipt_request_print()
|
H A D | s_client.c | 159 const unsigned char **id, size_t *idlen, in psk_use_session_cb() argument 204 *idlen = 0; in psk_use_session_cb() 210 *idlen = strlen(psk_identity); in psk_use_session_cb()
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_hs_client.t0 | 671 read8 { idlen } 672 idlen 32 > if ERR_OVERSIZED_ID fail then 673 addr-pad idlen read-blob 674 idlen addr-session_id_len get8 = idlen 0 > and if 675 addr-session_id addr-pad idlen memcmp if 681 addr-session_id addr-pad idlen memcpy 682 idlen addr-session_id_len set8
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_acl.c | 537 int count, idlen, tmp, r; in archive_acl_text_len() local 631 idlen = 1; in archive_acl_text_len() 635 idlen++; in archive_acl_text_len() 637 length += idlen; in archive_acl_text_len()
|
/freebsd/contrib/sendmail/src/ |
H A D | conf.c | 5493 int idlen; local 5502 idlen = strlen(id) + SyslogPrefixLen; 5536 if ((strlen(newstring) + idlen + 1) < SYSLOG_BUFSIZE) 5592 idlen += 5; /* strlen("[999]"), see below */ 5594 (strlen(begin) + idlen) > SYSLOG_BUFSIZE) 5603 end = begin + SYSLOG_BUFSIZE - idlen - SL_SPLIT; 5616 end = begin + SYSLOG_BUFSIZE - idlen - SL_SPLIT;
|
/freebsd/sys/fs/nfsserver/ |
H A D | nfs_nfsdserv.c | 3976 int error = 0, idlen; in nfsrvd_setclientid() local 4005 idlen = i; in nfsrvd_setclientid() 4018 clp->lc_idlen = idlen; in nfsrvd_setclientid() 4019 error = nfsrv_mtostr(nd, clp->lc_id, idlen); in nfsrvd_setclientid() 4034 clp->lc_name = &clp->lc_id[idlen]; in nfsrvd_setclientid() 4294 int error = 0, i, idlen; in nfsrvd_exchangeid() local 4320 idlen = i; in nfsrvd_exchangeid() 4355 clp->lc_idlen = idlen; in nfsrvd_exchangeid() 4356 error = nfsrv_mtostr(nd, clp->lc_id, idlen); in nfsrvd_exchangeid() 4372 clp->lc_name = &clp->lc_id[idlen]; in nfsrvd_exchangeid()
|
/freebsd/contrib/wpa/hostapd/ |
H A D | config_file.c | 2695 size_t idlen = os_strlen(pos); in hostapd_config_fill() local 2696 if (idlen & 1) { in hostapd_config_fill() 2702 bss->eap_fast_a_id = os_malloc(idlen / 2); in hostapd_config_fill() 2704 hexstr2bin(pos, bss->eap_fast_a_id, idlen / 2)) { in hostapd_config_fill() 2711 bss->eap_fast_a_id_len = idlen / 2; in hostapd_config_fill()
|