/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | s_apps.h | 182 unsigned int *cookie_len); 184 unsigned int cookie_len);
|
H A D | s_cb.c | 652 unsigned int *cookie_len) 690 *cookie_len = resultlength; 696 unsigned int cookie_len) 728 if (cookie_len == resultlength 651 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument 695 verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len) argument
|
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-juniper.c | 370 u_int8_t cookie_len; /* cookie len */ member in struct:juniper_cookie_table_t 417 u_int8_t cookie_len; member in struct:juniper_l2info_t 824 if (l2info.cookie_len == 0) { 830 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { 1145 l2info->cookie_len = 0; 1273 l2info->cookie_len += lp->cookie_len; 1278 l2info->cookie_len += 2; 1282 l2info->cookie_len = 8; 1295 l2info->cookie_len [all...] |
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | dtls1.h | 167 unsigned int cookie_len; member in struct:dtls1_state_st
|
H A D | d1_clnt.c | 665 if (s->d1->cookie_len > sizeof(s->d1->cookie)) { 669 *(p++) = s->d1->cookie_len; 670 memcpy(p, s->d1->cookie, s->d1->cookie_len); 671 p += s->d1->cookie_len; 728 unsigned int cookie_len; local 754 cookie_len = *(data++); 755 if (cookie_len > sizeof(s->d1->cookie)) { 760 memcpy(s->d1->cookie, data, cookie_len); 761 s->d1->cookie_len = cookie_len; [all...] |
H A D | d1_lib.c | 130 d1->cookie_len = sizeof(s->d1->cookie); 268 s->d1->cookie_len = sizeof(s->d1->cookie);
|
H A D | d1_srvr.c | 725 &(s->d1->cookie_len)) == 0) { 731 *(p++) = (unsigned char)s->d1->cookie_len; 732 memcpy(p, s->d1->cookie, s->d1->cookie_len); 733 p += s->d1->cookie_len;
|
H A D | s3_srvr.c | 750 unsigned int cookie_len; local 882 cookie_len = *(p++); 884 if ((d + n ) - p < cookie_len) { 895 if (cookie_len > sizeof(s->d1->rcvd_cookie)) { 903 if ((SSL_get_options(s) & SSL_OP_COOKIE_EXCHANGE) && cookie_len > 0) { 904 memcpy(s->d1->rcvd_cookie, p, cookie_len); 908 cookie_len) == 0) { 918 s->d1->cookie_len) != 0) { 927 p += cookie_len;
|
H A D | ssl.h | 752 unsigned int *cookie_len); 756 unsigned int cookie_len); 915 *cookie_len)); 921 cookie_len));
|
H A D | ssl_sess.c | 979 unsigned int *cookie_len)) 986 unsigned int cookie_len)) 976 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) argument 984 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int cookie_len)) argument
|
/freebsd-9.3-release/sys/netinet/ |
H A D | sctp_input.c | 1435 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1452 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1860 sh, cookie, cookie_len, 2006 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 2079 initack_limit = offset + cookie_len; 2396 unsigned int cookie_len; local 2421 cookie_len = ntohs(cp->ch.chunk_length); 2435 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) + 2445 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE; 2653 cookie_len 1450 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument 2004 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t use_mflowid, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument [all...] |