Searched refs:cookie_len (Results 1 - 20 of 20) sorted by relevance

/freebsd-current/sys/netinet/
H A Dtcp_fastopen.c559 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) argument
566 SipHash_Update(&ctx, cookie, cookie_len);
880 if ((cce->cookie_len > 0) &&
886 cce->cookie, cce->cookie_len);
888 tp->t_tfo_client_cookie_len = cce->cookie_len;
890 cce->cookie_len);
919 cce->cookie_len = 0;
963 cce->cookie_len = 0;
980 uint8_t cookie_len, uint8_t *cookie)
988 if ((cookie_len >
979 tcp_fastopen_update_cache(struct tcpcb *tp, uint16_t mss, uint8_t cookie_len, uint8_t *cookie) argument
1049 tcp_fastopen_ccache_create(struct tcp_fastopen_ccache_bucket *ccb, struct in_conninfo *inc, uint16_t mss, uint8_t cookie_len, uint8_t *cookie) argument
[all...]
H A Dtcp_fastopen.h59 uint8_t cookie_len; member in struct:tcp_fastopen_ccache_entry
H A Dsctp_input.c1333 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len,
1349 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len,
1740 sh, cookie, cookie_len,
1957 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len,
2014 initack_limit = offset + cookie_len;
2254 unsigned int cookie_len; local
2276 cookie_len = ntohs(cp->ch.chunk_length);
2278 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) +
2300 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE;
2528 cookie_len
1347 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t mflowtype, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument
1955 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t mflowtype, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument
[all...]
/freebsd-current/crypto/openssl/apps/include/
H A Ds_apps.h49 unsigned int *cookie_len);
51 unsigned int cookie_len);
59 size_t *cookie_len);
61 size_t cookie_len);
/freebsd-current/contrib/unbound/util/
H A Dedns.h154 * @param cookie_len: the length of the cookie data.
165 size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4,
H A Dedns.c162 edns_cookie_server_validate(const uint8_t* cookie, size_t cookie_len, argument
170 if(cookie_len != 24)
/freebsd-current/contrib/tcpdump/
H A Dprint-juniper.c383 uint8_t cookie_len; /* cookie len */ member in struct:juniper_cookie_table_t
430 uint8_t cookie_len; member in struct:juniper_l2info_t
914 if (l2info.cookie_len == 0) {
921 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) {
1281 l2info->cookie_len = 0;
1418 l2info->cookie_len += lp->cookie_len;
1423 l2info->cookie_len += 2;
1427 l2info->cookie_len = 8;
1440 l2info->cookie_len
[all...]
/freebsd-current/usr.sbin/ypldap/
H A Daldap.h41 unsigned int cookie_len; member in struct:aldap_page_control
H A Daldap.c229 page->cookie_len) == NULL)
338 page->cookie_len = elm->be_sub->be_next->be_len;
340 if ((page->cookie = malloc(page->cookie_len)) == NULL) {
347 memcpy(page->cookie, s, page->cookie_len);
H A Dldapclient.c535 if (m->page != NULL && m->page->cookie_len != 0)
/freebsd-current/crypto/openssl/test/
H A Ddtlstest.c48 unsigned int *cookie_len)
51 *cookie_len = sizeof(dummy_cookie);
56 unsigned int cookie_len)
58 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie));
47 generate_cookie_cb(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument
55 verify_cookie_cb(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) argument
H A Ddtlsv1listentest.c262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument
268 *cookie_len = COOKIE_LEN;
274 unsigned int cookie_len)
278 if (cookie_len != COOKIE_LEN)
273 cookie_verify(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) argument
H A Dsslapitest.c5589 unsigned int *cookie_len)
5596 *cookie_len = sizeof(cookie_magic_value) - 1;
5602 unsigned int cookie_len)
5604 if (cookie_len == sizeof(cookie_magic_value) - 1
5605 && memcmp(cookie, cookie_magic_value, cookie_len) == 0)
5612 size_t *cookie_len)
5616 *cookie_len = temp;
5621 size_t cookie_len)
5623 return verify_cookie_callback(ssl, cookie, cookie_len);
5588 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument
5601 verify_cookie_callback(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) argument
5611 generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, size_t *cookie_len) argument
5620 verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, size_t cookie_len) argument
/freebsd-current/crypto/openssl/apps/lib/
H A Ds_cb.c755 size_t *cookie_len)
801 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) {
815 size_t cookie_len)
824 && cookie_len == resultlength
832 unsigned int *cookie_len)
838 *cookie_len = (unsigned int)temp;
843 unsigned int cookie_len)
845 return verify_stateless_cookie_callback(ssl, cookie, cookie_len);
754 generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, size_t *cookie_len) argument
814 verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, size_t cookie_len) argument
831 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument
842 verify_cookie_callback(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) argument
/freebsd-current/crypto/openssl/ssl/
H A Dssl_sess.c1344 unsigned int *cookie_len))
1352 unsigned int cookie_len))
1384 size_t *cookie_len))
1393 size_t cookie_len))
1341 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) argument
1349 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, unsigned int cookie_len)) argument
1380 SSL_CTX_set_stateless_cookie_generate_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, size_t *cookie_len)) argument
1389 SSL_CTX_set_stateless_cookie_verify_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, size_t cookie_len)) argument
H A Dd1_lib.c86 d1->cookie_len = sizeof(s->d1->cookie);
197 s->d1->cookie_len = sizeof(s->d1->cookie);
H A Dssl_local.h929 unsigned int *cookie_len);
933 unsigned int cookie_len);
937 size_t *cookie_len);
941 size_t cookie_len);
1902 size_t cookie_len; member in struct:dtls1_state_st
2574 size_t cookie_len);
/freebsd-current/crypto/openssl/ssl/statem/
H A Dstatem_clnt.c1221 if (s->d1->cookie_len > sizeof(s->d1->cookie)
1223 s->d1->cookie_len)) {
1280 size_t cookie_len; local
1289 cookie_len = PACKET_remaining(&cookiepkt);
1290 if (cookie_len > sizeof(s->d1->cookie)) {
1295 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) {
1299 s->d1->cookie_len = cookie_len;
H A Dstatem_srvr.c1278 size_t cookie_len)
1282 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len))
1298 s->d1->cookie_len = cookie_leni;
1301 s->d1->cookie_len)) {
1679 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len
1681 s->d1->cookie_len) != 0) {
1277 dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie, size_t cookie_len) argument
/freebsd-current/crypto/openssl/include/openssl/
H A Dssl.h761 *cookie_len));
767 cookie_len));
773 size_t *cookie_len));
778 size_t cookie_len));

Completed in 205 milliseconds