/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-juniper.c | 369 uint8_t cookie_len; /* cookie len */ member in struct:juniper_cookie_table_t 416 uint8_t cookie_len; member in struct:juniper_l2info_t 858 if (l2info.cookie_len == 0) { 864 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { 1191 l2info->cookie_len = 0; 1322 l2info->cookie_len += lp->cookie_len; 1327 l2info->cookie_len += 2; 1331 l2info->cookie_len = 8; 1344 l2info->cookie_len [all...] |
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | s_apps.h | 187 unsigned int *cookie_len); 189 unsigned int cookie_len);
|
H A D | s_cb.c | 1007 unsigned int *cookie_len) 1079 *cookie_len = resultlength; 1085 unsigned int cookie_len) 1151 if (cookie_len == resultlength 1006 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument 1084 verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len) argument
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | dtls1.h | 186 unsigned int cookie_len; member in struct:dtls1_state_st
|
H A D | d1_clnt.c | 828 unsigned int cookie_len; local 859 cookie_len = *(data++); 860 if (cookie_len > sizeof(s->d1->cookie)) { 865 memcpy(s->d1->cookie, data, cookie_len); 866 s->d1->cookie_len = cookie_len;
|
H A D | d1_srvr.c | 961 &(s->d1->cookie_len)) == 0) { 968 *(p++) = (unsigned char)s->d1->cookie_len; 969 memcpy(p, s->d1->cookie, s->d1->cookie_len); 970 p += s->d1->cookie_len;
|
H A D | d1_lib.c | 142 d1->cookie_len = sizeof(s->d1->cookie); 271 s->d1->cookie_len = sizeof(s->d1->cookie);
|
H A D | s3_srvr.c | 914 unsigned int cookie_len; local 1072 cookie_len = *(p++); 1074 if ((unsigned int)((d + n ) - p) < cookie_len) { 1085 if (cookie_len > sizeof(s->d1->rcvd_cookie)) { 1093 if ((SSL_get_options(s) & SSL_OP_COOKIE_EXCHANGE) && cookie_len > 0) { 1094 memcpy(s->d1->rcvd_cookie, p, cookie_len); 1098 cookie_len) == 0) { 1108 s->d1->cookie_len) != 0) { 1116 p += cookie_len;
|
H A D | ssl_sess.c | 1276 unsigned int *cookie_len)) 1283 unsigned int cookie_len)) 1273 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) argument 1281 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int cookie_len)) argument
|
H A D | ssl.h | 1003 unsigned int *cookie_len); 1007 unsigned int cookie_len); 1264 *cookie_len)); 1270 cookie_len));
|
H A D | s3_clnt.c | 825 if (s->d1->cookie_len > sizeof(s->d1->cookie)) { 829 *(p++) = s->d1->cookie_len; 830 memcpy(p, s->d1->cookie, s->d1->cookie_len); 831 p += s->d1->cookie_len;
|
/freebsd-11-stable/usr.sbin/ypldap/ |
H A D | aldap.h | 42 unsigned int cookie_len; member in struct:aldap_page_control
|
H A D | aldap.c | 230 page->cookie_len) == NULL) 339 page->cookie_len = elm->be_sub->be_next->be_len; 341 if ((page->cookie = malloc(page->cookie_len)) == NULL) { 348 memcpy(page->cookie, s, page->cookie_len);
|
H A D | ldapclient.c | 536 if (m->page != NULL && m->page->cookie_len != 0)
|
/freebsd-11-stable/sys/netinet/ |
H A D | sctp_input.c | 1497 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1514 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1927 sh, cookie, cookie_len, 2085 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 2148 initack_limit = offset + cookie_len; 2474 unsigned int cookie_len; local 2496 cookie_len = ntohs(cp->ch.chunk_length); 2498 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) + 2520 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE; 2725 cookie_len 1512 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t mflowtype, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument 2083 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t mflowtype, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument [all...] |