/freebsd-10-stable/crypto/openssl/apps/ |
H A D | s_apps.h | 182 unsigned int *cookie_len); 184 unsigned int cookie_len);
|
H A D | s_cb.c | 737 unsigned int *cookie_len) 809 *cookie_len = resultlength; 815 unsigned int cookie_len) 881 if (cookie_len == resultlength 736 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument 814 verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len) argument
|
/freebsd-10-stable/contrib/tcpdump/ |
H A D | print-juniper.c | 370 u_int8_t cookie_len; /* cookie len */ member in struct:juniper_cookie_table_t 417 u_int8_t cookie_len; member in struct:juniper_l2info_t 824 if (l2info.cookie_len == 0) { 830 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { 1145 l2info->cookie_len = 0; 1273 l2info->cookie_len += lp->cookie_len; 1278 l2info->cookie_len += 2; 1282 l2info->cookie_len = 8; 1295 l2info->cookie_len [all...] |
/freebsd-10-stable/crypto/openssl/ssl/ |
H A D | dtls1.h | 182 unsigned int cookie_len; member in struct:dtls1_state_st
|
H A D | d1_clnt.c | 861 if (s->d1->cookie_len > sizeof(s->d1->cookie)) { 865 *(p++) = s->d1->cookie_len; 866 memcpy(p, s->d1->cookie, s->d1->cookie_len); 867 p += s->d1->cookie_len; 929 unsigned int cookie_len; local 955 cookie_len = *(data++); 956 if (cookie_len > sizeof(s->d1->cookie)) { 961 memcpy(s->d1->cookie, data, cookie_len); 962 s->d1->cookie_len = cookie_len; [all...] |
H A D | d1_lib.c | 116 d1->cookie_len = sizeof(s->d1->cookie); 245 s->d1->cookie_len = sizeof(s->d1->cookie);
|
H A D | s3_srvr.c | 970 unsigned int cookie_len; local 1122 cookie_len = *(p++); 1124 if ((d + n ) - p < cookie_len) { 1135 if (cookie_len > sizeof(s->d1->rcvd_cookie)) { 1143 if ((SSL_get_options(s) & SSL_OP_COOKIE_EXCHANGE) && cookie_len > 0) { 1144 memcpy(s->d1->rcvd_cookie, p, cookie_len); 1148 cookie_len) == 0) { 1158 s->d1->cookie_len) != 0) { 1166 p += cookie_len;
|
H A D | d1_srvr.c | 951 &(s->d1->cookie_len)) == 0) { 958 *(p++) = (unsigned char)s->d1->cookie_len; 959 memcpy(p, s->d1->cookie, s->d1->cookie_len); 960 p += s->d1->cookie_len;
|
H A D | ssl.h | 902 unsigned int *cookie_len); 906 unsigned int cookie_len); 1126 *cookie_len)); 1132 cookie_len));
|
H A D | ssl_sess.c | 1289 unsigned int *cookie_len)) 1296 unsigned int cookie_len)) 1286 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) argument 1294 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int cookie_len)) argument
|
/freebsd-10-stable/sys/netinet/ |
H A D | sctp_input.c | 1440 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1457 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1874 sh, cookie, cookie_len, 2031 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 2095 initack_limit = offset + cookie_len; 2420 unsigned int cookie_len; local 2445 cookie_len = ntohs(cp->ch.chunk_length); 2459 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) + 2469 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE; 2668 cookie_len 1455 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t mflowtype, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument 2029 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t mflowtype, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument [all...] |