Searched refs:serverid (Results 1 - 23 of 23) sorted by relevance

/netbsd-current/external/bsd/wpa/dist/src/eap_common/
H A Deap_sake_common.h63 const u8 *serverid; member in struct:eap_sake_parse_attr
89 const u8 *serverid, size_t serverid_len,
H A Deap_sake_common.c62 attr->serverid = data;
317 * @serverid: SERVERID
330 const u8 *serverid, size_t serverid_len,
351 if (serverid) {
352 os_memcpy(pos, serverid, serverid_len);
361 if (serverid) {
362 os_memcpy(pos, serverid, serverid_len);
328 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/netbsd-current/external/ibm-public/postfix/dist/src/tls/
H A Dtls_proxy_server_scan.c197 VSTRING *serverid = vstring_alloc(25); local
213 RECV_ATTR_STR(TLS_ATTR_SERVERID, serverid),
220 props->serverid = vstring_export(serverid);
239 myfree((void *) props->serverid);
H A Dtls_proxy_clnt.c13 /* serverid, tls_params, init_props, start_props)
21 /* const char *serverid;
31 /* timeout, serverid)
38 /* const char *serverid;
91 /* .IP serverid
157 const char *serverid,
206 SEND_ATTR_STR(TLS_ATTR_SERVERID, serverid),
151 tls_proxy_open(const char *service, int flags, VSTREAM *peer_stream, const char *peer_addr, const char *peer_port, int handshake_timeout, int session_timeout, const char *serverid, void *tls_params, void *init_props, void *start_props) argument
H A Dtls_client.c207 /* serverid contains transport:addr:port information */
209 TLScontext->serverid, TLScontext->cache_type);
224 if (tls_mgr_lookup(TLScontext->cache_type, TLScontext->serverid,
229 /* serverid contains transport:addr:port information */
231 TLScontext->serverid, TLScontext->cache_type);
269 /* serverid contains transport:addr:port information */
271 TLScontext->serverid, TLScontext->cache_type);
278 tls_mgr_update(TLScontext->cache_type, TLScontext->serverid,
298 if (TLScontext->cache_type == 0 || TLScontext->serverid == 0)
302 /* serverid contain
[all...]
H A Dtls_proxy_client_scan.c324 myfree((void *) props->serverid);
436 VSTRING *serverid = vstring_alloc(25); local
461 RECV_ATTR_STR(TLS_ATTR_SERVERID, serverid),
477 props->serverid = vstring_export(serverid);
H A Dtls_proxy_server_print.c131 STRING_OR_EMPTY(props->serverid)),
H A Dtls_proxy.h94 peer_port, timeout, serverid) \
96 (peer_port), (timeout), (timeout), (serverid), \
148 #define TLS_ATTR_SERVERID "serverid"
212 #define TLS_ATTR_SERVERID "serverid"
247 #define TLS_ATTR_SERVERID "serverid"
H A Dtls_fprint.c58 /* tls_serverid_digest() suffixes props->serverid computed by the SMTP
87 /* initial serverid from the SMTP client and the DANE verification
241 /* tls_serverid_digest - suffix props->serverid with parameter digest */
257 * Try to use sha256: our serverid choice should be strong enough to
259 * DANE TLSA digests. Failing that, we compute serverid digests with the
319 * Append the digest to the serverid. We don't compare this digest to
329 result = vstring_alloc(strlen(props->serverid) + 1 + 2 * md_len);
330 vstring_strcpy(result, props->serverid);
H A Dtls_server.c207 GEN_CACHE_ID(cache_id, session_id, session_id_length, TLScontext->serverid);
249 GEN_CACHE_ID(cache_id, sid, sid_length, TLScontext->serverid);
274 GEN_CACHE_ID(cache_id, sid, sid_length, TLScontext->serverid);
859 TLScontext->serverid = mystrdup(props->serverid);
H A Dtls.h249 char *serverid; /* unique server identifier */ member in struct:__anon40
482 const char *serverid; /* Session cache key */ member in struct:__anon42
552 const char *serverid; /* Server instance (salt cache key) */ member in struct:__anon44
H A Dtls_proxy_client_print.c272 STRING_OR_EMPTY(props->serverid)),
H A Dtls_misc.c1283 TLScontext->serverid = 0;
1325 if (TLScontext->serverid)
1326 myfree(TLScontext->serverid);
/netbsd-current/external/bsd/wpa/dist/src/eap_peer/
H A Deap_sake.c32 u8 *serverid; member in struct:eap_sake_data
108 os_free(data->serverid);
226 os_free(data->serverid);
227 data->serverid = NULL;
229 if (attr.serverid) {
231 attr.serverid, attr.serverid_len);
232 data->serverid = os_memdup(attr.serverid, attr.serverid_len);
233 if (data->serverid == NULL)
270 data->serverid, dat
[all...]
H A Deap_eke.c24 u8 *serverid; member in struct:eap_eke_data
137 os_free(data->serverid);
311 os_free(data->serverid);
312 data->serverid = os_memdup(pos, end - pos);
313 if (data->serverid == NULL) {
404 data->serverid, data->serverid_len,
431 data->serverid, data->serverid_len,
557 if (eap_eke_derive_ka(&data->sess, data->serverid, data->serverid_len,
604 if (eap_eke_derive_msk(&data->sess, data->serverid, data->serverid_len,
/netbsd-current/external/mpl/dhcp/dist/tests/
H A DMakefile.am4 DHCPv6/011-solicit-serverid.pl \
H A DMakefile.in294 DHCPv6/011-solicit-serverid.pl \
/netbsd-current/external/mpl/bind/dist/lib/ns/
H A Dserver.c225 ns_server_setserverid(ns_server_t *sctx, const char *serverid) { argument
233 if (serverid != NULL) {
234 sctx->server_id = isc_mem_strdup(sctx->mctx, serverid);
/netbsd-current/external/mpl/bind/dist/lib/ns/include/ns/
H A Dserver.h168 ns_server_setserverid(ns_server_t *sctx, const char *serverid);
170 * Set sctx->server_id to 'serverid'. If it was set previously, free the memory.
/netbsd-current/external/ibm-public/postfix/dist/src/smtp/
H A Dsmtp_proto.c855 VSTRING *serverid; local
898 * XXX: The TLS library will salt the serverid with further details of the
903 serverid = vstring_alloc(10);
904 smtp_key_prefix(serverid, "&", state->iterator, SMTP_KEY_FLAG_SERVICE
938 serverid = vstring_str(serverid),
1060 serverid = vstring_str(serverid),
1077 vstring_free(serverid);
/netbsd-current/external/ibm-public/postfix/dist/src/posttls-finger/
H A Dposttls-finger.c819 serverid = state->addrport,
916 serverid = state->addrport,
/netbsd-current/external/ibm-public/postfix/dist/src/tlsproxy/
H A Dtlsproxy.c1086 serverid = state->server_id,
/netbsd-current/external/ibm-public/postfix/dist/src/smtpd/
H A Dsmtpd.c5171 serverid = state->service,

Completed in 465 milliseconds