/freebsd-current/sys/netinet/ |
H A D | tcp_fastopen.c | 559 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) argument 566 SipHash_Update(&ctx, cookie, cookie_len); 880 if ((cce->cookie_len > 0) && 886 cce->cookie, cce->cookie_len); 888 tp->t_tfo_client_cookie_len = cce->cookie_len; 890 cce->cookie_len); 919 cce->cookie_len = 0; 963 cce->cookie_len = 0; 980 uint8_t cookie_len, uint8_t *cookie) 988 if ((cookie_len > 979 tcp_fastopen_update_cache(struct tcpcb *tp, uint16_t mss, uint8_t cookie_len, uint8_t *cookie) argument 1049 tcp_fastopen_ccache_create(struct tcp_fastopen_ccache_bucket *ccb, struct in_conninfo *inc, uint16_t mss, uint8_t cookie_len, uint8_t *cookie) argument [all...] |
H A D | tcp_fastopen.h | 59 uint8_t cookie_len; member in struct:tcp_fastopen_ccache_entry
|
H A D | sctp_input.c | 1333 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1349 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1740 sh, cookie, cookie_len, 1957 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 2014 initack_limit = offset + cookie_len; 2254 unsigned int cookie_len; local 2276 cookie_len = ntohs(cp->ch.chunk_length); 2278 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) + 2300 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE; 2528 cookie_len 1347 sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t mflowtype, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument 1955 sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset, struct sockaddr *src, struct sockaddr *dst, struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, struct sctp_inpcb *inp, struct sctp_nets **netp, struct sockaddr *init_src, int *notification, int auth_skipped, uint32_t auth_offset, uint32_t auth_len, uint8_t mflowtype, uint32_t mflowid, uint32_t vrf_id, uint16_t port) argument [all...] |
/freebsd-current/crypto/openssl/apps/include/ |
H A D | s_apps.h | 49 unsigned int *cookie_len); 51 unsigned int cookie_len); 59 size_t *cookie_len); 61 size_t cookie_len);
|
/freebsd-current/contrib/unbound/util/ |
H A D | edns.h | 154 * @param cookie_len: the length of the cookie data. 165 size_t cookie_len, const uint8_t* secret, size_t secret_len, int v4,
|
H A D | edns.c | 162 edns_cookie_server_validate(const uint8_t* cookie, size_t cookie_len, argument 170 if(cookie_len != 24)
|
/freebsd-current/contrib/tcpdump/ |
H A D | print-juniper.c | 383 uint8_t cookie_len; /* cookie len */ member in struct:juniper_cookie_table_t 430 uint8_t cookie_len; member in struct:juniper_l2info_t 914 if (l2info.cookie_len == 0) { 921 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { 1281 l2info->cookie_len = 0; 1418 l2info->cookie_len += lp->cookie_len; 1423 l2info->cookie_len += 2; 1427 l2info->cookie_len = 8; 1440 l2info->cookie_len [all...] |
/freebsd-current/usr.sbin/ypldap/ |
H A D | aldap.h | 41 unsigned int cookie_len; member in struct:aldap_page_control
|
H A D | aldap.c | 229 page->cookie_len) == NULL) 338 page->cookie_len = elm->be_sub->be_next->be_len; 340 if ((page->cookie = malloc(page->cookie_len)) == NULL) { 347 memcpy(page->cookie, s, page->cookie_len);
|
H A D | ldapclient.c | 535 if (m->page != NULL && m->page->cookie_len != 0)
|
/freebsd-current/crypto/openssl/test/ |
H A D | dtlstest.c | 48 unsigned int *cookie_len) 51 *cookie_len = sizeof(dummy_cookie); 56 unsigned int cookie_len) 58 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); 47 generate_cookie_cb(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument 55 verify_cookie_cb(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) argument
|
H A D | dtlsv1listentest.c | 262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument 268 *cookie_len = COOKIE_LEN; 274 unsigned int cookie_len) 278 if (cookie_len != COOKIE_LEN) 273 cookie_verify(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) argument
|
H A D | sslapitest.c | 5589 unsigned int *cookie_len) 5596 *cookie_len = sizeof(cookie_magic_value) - 1; 5602 unsigned int cookie_len) 5604 if (cookie_len == sizeof(cookie_magic_value) - 1 5605 && memcmp(cookie, cookie_magic_value, cookie_len) == 0) 5612 size_t *cookie_len) 5616 *cookie_len = temp; 5621 size_t cookie_len) 5623 return verify_cookie_callback(ssl, cookie, cookie_len); 5588 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument 5601 verify_cookie_callback(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) argument 5611 generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, size_t *cookie_len) argument 5620 verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, size_t cookie_len) argument
|
/freebsd-current/crypto/openssl/apps/lib/ |
H A D | s_cb.c | 755 size_t *cookie_len) 801 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { 815 size_t cookie_len) 824 && cookie_len == resultlength 832 unsigned int *cookie_len) 838 *cookie_len = (unsigned int)temp; 843 unsigned int cookie_len) 845 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); 754 generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, size_t *cookie_len) argument 814 verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, size_t cookie_len) argument 831 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) argument 842 verify_cookie_callback(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) argument
|
/freebsd-current/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 1344 unsigned int *cookie_len)) 1352 unsigned int cookie_len)) 1384 size_t *cookie_len)) 1393 size_t cookie_len)) 1341 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) argument 1349 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, unsigned int cookie_len)) argument 1380 SSL_CTX_set_stateless_cookie_generate_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, size_t *cookie_len)) argument 1389 SSL_CTX_set_stateless_cookie_verify_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, size_t cookie_len)) argument
|
H A D | d1_lib.c | 86 d1->cookie_len = sizeof(s->d1->cookie); 197 s->d1->cookie_len = sizeof(s->d1->cookie);
|
H A D | ssl_local.h | 929 unsigned int *cookie_len); 933 unsigned int cookie_len); 937 size_t *cookie_len); 941 size_t cookie_len); 1902 size_t cookie_len; member in struct:dtls1_state_st 2574 size_t cookie_len);
|
/freebsd-current/crypto/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1221 if (s->d1->cookie_len > sizeof(s->d1->cookie) 1223 s->d1->cookie_len)) { 1280 size_t cookie_len; local 1289 cookie_len = PACKET_remaining(&cookiepkt); 1290 if (cookie_len > sizeof(s->d1->cookie)) { 1295 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { 1299 s->d1->cookie_len = cookie_len;
|
H A D | statem_srvr.c | 1278 size_t cookie_len) 1282 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) 1298 s->d1->cookie_len = cookie_leni; 1301 s->d1->cookie_len)) { 1679 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len 1681 s->d1->cookie_len) != 0) { 1277 dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie, size_t cookie_len) argument
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | ssl.h | 761 *cookie_len)); 767 cookie_len)); 773 size_t *cookie_len)); 778 size_t cookie_len));
|