/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_generate_session_id.pod | 14 unsigned int *id_len); 19 unsigned int id_len); 30 (of length B<id_len>) is already contained in the internal session cache 49 B<id> into and a pointer to the maximum allowed length B<id_len>. The 50 buffer at location B<id> is only guaranteed to have the size B<id_len>. 52 the callback B<must never> increase B<id_len> or write to the location 56 callback may only fill part of the possible length and leave B<id_len> 69 guarantee uniqueness, it is recommended to use the maximum B<id_len> and 102 unsigned int *id_len) 107 RAND_pseudo_bytes(id, *id_len); [all …]
|
/freebsd/usr.sbin/bsnmpd/modules/snmp_hostres/ |
H A D | hostres_partition_tbl.c | 157 size_t id_len; in partition_entry_create() local 184 id_len = strlen(chunk_name) + 1; in partition_entry_create() 185 if (id_len > PART_STR_MLEN) in partition_entry_create() 186 id_len = PART_STR_MLEN; in partition_entry_create() 188 if ((map->id = malloc(id_len)) == NULL) { in partition_entry_create() 195 strlcpy(map->id, chunk_name, id_len); in partition_entry_create() 230 id_len = strlen(_PATH_DEV) + strlen(chunk_name) + 1; in partition_entry_create() 232 if (id_len > PART_STR_MLEN) in partition_entry_create() 233 id_len = PART_STR_MLEN; in partition_entry_create() 235 if ((entry->label = malloc(id_len )) == NULL) { in partition_entry_create() [all …]
|
/freebsd/crypto/openssl/crypto/sm2/ |
H A D | sm2_sign.c | 27 const size_t id_len, in ossl_sm2_compute_z_digest() argument 73 if (id_len >= (UINT16_MAX / 8)) { in ossl_sm2_compute_z_digest() 79 entl = (uint16_t)(8 * id_len); in ossl_sm2_compute_z_digest() 92 if (id_len > 0 && !EVP_DigestUpdate(hash, id, id_len)) { in ossl_sm2_compute_z_digest() 144 const size_t id_len, in sm2_compute_msg_hash() argument 172 if (!ossl_sm2_compute_z_digest(z, fetched_digest, id, id_len, key)) { in sm2_compute_msg_hash() 394 const size_t id_len, in ossl_sm2_do_sign() argument 400 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign() 417 const size_t id_len, in ossl_sm2_do_verify() argument 423 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_verify()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | sm2.h | 31 const size_t id_len, 40 const size_t id_len, 47 const size_t id_len,
|
/freebsd/crypto/openssl/providers/implementations/signature/ |
H A D | sm2_sig.c | 90 size_t id_len; member 262 || !ossl_sm2_compute_z_digest(z, ctx->md, ctx->id, ctx->id_len, in sm2sig_compute_z_digest() 376 dstctx->id = OPENSSL_malloc(srcctx->id_len); in sm2sig_dupctx() 379 dstctx->id_len = srcctx->id_len; in sm2sig_dupctx() 380 memcpy(dstctx->id, srcctx->id, srcctx->id_len); in sm2sig_dupctx() 455 psm2ctx->id_len = tmp_idlen; in sm2sig_set_ctx_params()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_ttls.c | 92 u8 id_len; in eap_ttls_valid_session() local 95 id_len = sm->identity_len; in eap_ttls_valid_session() 97 id_len = 255; in eap_ttls_valid_session() 98 wpabuf_put_u8(buf, id_len); in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 1204 u8 id_len; in eap_ttls_process() local 1235 id_len = *pos++; in eap_ttls_process() 1237 pos, id_len); in eap_ttls_process() 1239 sm->identity = os_malloc(id_len ? id_len : 1); in eap_ttls_process() 1246 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process() [all …]
|
H A D | eap_server_peap.c | 117 u8 id_len; in eap_peap_valid_session() local 120 id_len = sm->identity_len; in eap_peap_valid_session() 122 id_len = 255; in eap_peap_valid_session() 123 wpabuf_put_u8(buf, id_len); in eap_peap_valid_session() 124 wpabuf_put_data(buf, sm->identity, id_len); in eap_peap_valid_session() 1261 u8 id_len; in eap_peap_process() local 1293 id_len = *pos++; in eap_peap_process() 1295 pos, id_len); in eap_peap_process() 1297 sm->identity = os_malloc(id_len ? id_len : 1); in eap_peap_process() 1304 os_memcpy(sm->identity, pos, id_len); in eap_peap_process() [all …]
|
H A D | eap_server_gpsk.c | 28 size_t id_len; member 429 data->session_id, &data->id_len) < 0) { in eap_gpsk_process_gpsk_2() 435 data->session_id, data->id_len); in eap_gpsk_process_gpsk_2() 619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 622 *len = data->id_len; in eap_gpsk_get_session_id()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_tls.c | 25 size_t id_len; member 228 &data->id_len); in eap_tls_success() 231 data->session_id, data->id_len); in eap_tls_success() 414 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id() 418 *len = data->id_len; in eap_tls_get_session_id()
|
H A D | eap_gpsk.c | 27 size_t id_len; member 384 data->session_id, &data->id_len) < 0) { in eap_gpsk_send_gpsk_2() 391 data->session_id, data->id_len); in eap_gpsk_send_gpsk_2() 756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id() 759 *len = data->id_len; in eap_gpsk_get_session_id()
|
H A D | eap_fast.c | 57 size_t id_len; member 831 sm, &data->ssl, EAP_TYPE_FAST, &data->id_len); in eap_fast_process_crypto_binding() 834 data->session_id, data->id_len); in eap_fast_process_crypto_binding() 1364 static const u8 * eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len) in eap_fast_get_a_id() argument 1374 *id_len = len; in eap_fast_get_a_id() 1384 *id_len = tlen; in eap_fast_get_a_id() 1387 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: A-ID", a_id, *id_len); in eap_fast_get_a_id() 1790 id = os_memdup(data->session_id, data->id_len); in eap_fast_get_session_id() 1794 *len = data->id_len; in eap_fast_get_session_id()
|
H A D | eap_peap.c | 59 size_t id_len; member 1142 &data->id_len); in eap_peap_process() 1146 data->session_id, data->id_len); in eap_peap_process() 1342 id = os_memdup(data->session_id, data->id_len); in eap_peap_get_session_id() 1346 *len = data->id_len; in eap_peap_get_session_id()
|
H A D | eap_ttls.c | 59 size_t id_len; member 303 &data->id_len); in eap_ttls_v0_derive_key() 306 data->session_id, data->id_len); in eap_ttls_v0_derive_key() 1827 id = os_memdup(data->session_id, data->id_len); in eap_ttls_get_session_id() 1831 *len = data->id_len; in eap_ttls_get_session_id()
|
/freebsd/contrib/libfido2/tools/ |
H A D | credman.c | 246 size_t id_len = 0; in credman_delete_rk() local 250 if (base64_decode(id, &id_ptr, &id_len) < 0) { in credman_delete_rk() 254 if ((r = fido_credman_del_dev_rk(dev, id_ptr, id_len, in credman_delete_rk() 258 r = fido_credman_del_dev_rk(dev, id_ptr, id_len, pin); in credman_delete_rk()
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius_server.c | 564 size_t user_len, id_len; in radius_server_get_new_session() local 628 &id_len, NULL) == 0) { in radius_server_get_new_session() 632 if (id_len >= sizeof(buf)) in radius_server_get_new_session() 633 id_len = sizeof(buf) - 1; in radius_server_get_new_session() 634 os_memcpy(buf, id, id_len); in radius_server_get_new_session() 671 size_t id_len; in radius_srv_hs20_t_c_pending() local 685 os_memcpy(id_str, id, id_len); in radius_srv_hs20_t_c_pending() 686 id_str[id_len] = '\0'; in radius_srv_hs20_t_c_pending() 742 size_t id_len; in db_update_last_msk() local 751 id_str = os_malloc(id_len); in db_update_last_msk() [all …]
|
/freebsd/sbin/camcontrol/ |
H A D | persist.c | 441 size_t table_size = 0, id_len = 0; in scsipersist() local 494 id_len += id->alloc_len; in scsipersist() 722 res_len = sizeof(struct scsi_per_res_reg_move) + id_len; in scsipersist() 733 res_len += id_len; in scsipersist() 780 scsi_ulto4b(id_len, id_hdr->additional_length); in scsipersist()
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | wpas_kay.c | 270 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local 272 session_id = eapol_sm_get_session_id(wpa_s->eapol, &id_len); in ieee802_1x_auth_get_session_id() 280 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()
|
/freebsd/sys/dev/iicbus/pwm/ |
H A D | adt746x.c | 351 int i, id_len, len = 0, location_len, prev_len = 0; in adt746x_fill_fan_prop() local 359 id_len = OF_getprop_alloc_multi(child, "hwctrl-id", sizeof(cell_t), (void **)&id); in adt746x_fill_fan_prop() 360 if (location_len == -1 || id_len == -1) { in adt746x_fill_fan_prop() 367 for (i = 0; i < id_len; i++) { in adt746x_fill_fan_prop()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-SM2.pod | 45 EVP_PKEY_CTX_set1_id(pctx, id, id_len); 71 EVP_PKEY_CTX_set1_id(pctx, id, id_len);
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 1227 int eap_sim_anonymous_username(const u8 *id, size_t id_len) in eap_sim_anonymous_username() argument 1233 if (id_len > anonymous_id_len && in eap_sim_anonymous_username() 1237 if (id_len > anonymous_id_len + 1 && in eap_sim_anonymous_username() 1241 if (id_len > 1 && id[0] == '@') in eap_sim_anonymous_username() 1246 decorated = get_last_char(id, id_len, '!'); in eap_sim_anonymous_username() 1250 id + id_len - decorated); in eap_sim_anonymous_username()
|
H A D | eap_sim_common.h | 229 int eap_sim_anonymous_username(const u8 *id, size_t id_len);
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth_kay.c | 359 size_t id_len, need_len; in ieee802_1x_auth_get_session_id() local 361 session_id = ieee802_1x_get_session_id(sta->eapol_sm, &id_len); in ieee802_1x_auth_get_session_id() 369 if (need_len > id_len) { in ieee802_1x_auth_get_session_id()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | pmeth_lib.c | 1246 static int get1_id_data(EVP_PKEY_CTX *ctx, void *id, size_t *id_len) in get1_id_data() argument 1270 if (id_len != NULL) in get1_id_data() 1271 *id_len = tmp_id_len; in get1_id_data() 1281 int evp_pkey_ctx_get1_id_len_prov(EVP_PKEY_CTX *ctx, size_t *id_len) in evp_pkey_ctx_get1_id_len_prov() argument 1283 return get1_id_data(ctx, NULL, id_len); in evp_pkey_ctx_get1_id_len_prov() 1291 int EVP_PKEY_CTX_get1_id_len(EVP_PKEY_CTX *ctx, size_t *id_len) in EVP_PKEY_CTX_get1_id_len() argument 1294 EVP_PKEY_CTRL_GET1_ID_LEN, 0, (void*)id_len); in EVP_PKEY_CTX_get1_id_len()
|
/freebsd/contrib/libfido2/src/fido/ |
H A D | types.h | 126 uint16_t id_len; /* credential id length */
|
/freebsd/contrib/libfido2/src/ |
H A D | cbor.c | 1081 uint16_t id_len; in decode_attcred() local 1092 if (fido_buf_read(buf, len, &id_len, sizeof(id_len)) < 0) { in decode_attcred() 1097 attcred->id.len = (size_t)be16toh(id_len); in decode_attcred()
|