Home
last modified time | relevance | path

Searched refs:idlen (Results 1 – 17 of 17) sorted by relevance

/openssl/crypto/cms/
H A Dcms_ess.c117 unsigned char *id, int idlen, int allorfirst, in CMS_ReceiptRequest_create0_ex() argument
129 ASN1_STRING_set0(rr->signedContentIdentifier, id, idlen); in CMS_ReceiptRequest_create0_ex()
160 unsigned char *id, int idlen, int allorfirst, in CMS_ReceiptRequest_create0() argument
163 return CMS_ReceiptRequest_create0_ex(id, idlen, allorfirst, receiptList, in CMS_ReceiptRequest_create0()
H A Dcms_env.c653 const unsigned char *id, size_t idlen) in CMS_RecipientInfo_kekri_id_cmp() argument
665 tmp_os.length = (int)idlen; in CMS_RecipientInfo_kekri_id_cmp()
690 unsigned char *id, size_t idlen, in CMS_add0_recipient_key() argument
773 ASN1_STRING_set0(kekri->kekid->keyIdentifier, id, idlen); in CMS_add0_recipient_key()
H A Dcms_smime.c800 const unsigned char *id, size_t idlen) in CMS_decrypt_set1_key() argument
814 || (CMS_RecipientInfo_kekri_id_cmp(ri, id, idlen) == 0)) { in CMS_decrypt_set1_key()
/openssl/crypto/x509/
H A Dv3_ncons.c342 static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen) in cn2dnsid() argument
351 *idlen = 0; in cn2dnsid()
428 *idlen = (size_t)utf8_length; in cn2dnsid()
456 size_t idlen; in NAME_CONSTRAINTS_check_CN() local
465 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK) in NAME_CONSTRAINTS_check_CN()
467 if (idlen == 0) in NAME_CONSTRAINTS_check_CN()
470 stmp.length = idlen; in NAME_CONSTRAINTS_check_CN()
/openssl/doc/man3/
H A DCMS_get1_ReceiptRequest.pod14 unsigned char *id, int idlen, int allorfirst,
18 unsigned char *id, int idlen, int allorfirst,
30 structure. The B<signedContentIdentifier> field is set using I<id> and I<idlen>,
H A DCMS_add1_recipient_cert.pod20 unsigned char *id, size_t idlen,
36 wrapping algorithm B<nid>, identifier B<id> of length B<idlen> and optional
H A DSSL_CTX_set_psk_client_callback.pod19 size_t *idlen,
55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>.
99 NULL. The contents of B<*id> and B<*idlen> will be ignored.
H A DCMS_get0_RecipientInfos.pod36 const unsigned char *id, size_t idlen);
82 CMS_RecipientInfo_kekri_id_cmp() compares the ID in the B<id> and B<idlen>
/openssl/include/openssl/
H A Dcms.h.in193 const unsigned char *id, size_t idlen);
229 unsigned char *id, size_t idlen,
245 const unsigned char *id, size_t idlen);
354 unsigned char *id, int idlen, int allorfirst,
358 unsigned char *id, int idlen, int allorfirst,
H A Dssl.h.in863 size_t *idlen,
/openssl/ssl/statem/
H A Dextensions_clnt.c376 int idlen = i2d_OCSP_RESPID(id, NULL); in tls_construct_ctos_status_request() local
378 if (idlen <= 0 in tls_construct_ctos_status_request()
380 || !WPACKET_sub_allocate_bytes_u16(pkt, idlen, &idbytes) in tls_construct_ctos_status_request()
381 || i2d_OCSP_RESPID(id, &idbytes) != idlen) { in tls_construct_ctos_status_request()
783 size_t idlen = 0; in tls_construct_ctos_early_data() local
793 && (!s->psk_use_session_cb(ussl, handmd, &id, &idlen, &psksess) in tls_construct_ctos_early_data()
818 idlen = strlen(identity); in tls_construct_ctos_early_data()
819 if (idlen > PSK_MAX_IDENTITY_LEN) { in tls_construct_ctos_early_data()
854 s->psksession_id = OPENSSL_memdup(id, idlen); in tls_construct_ctos_early_data()
860 s->psksession_id_len = idlen; in tls_construct_ctos_early_data()
H A Dextensions_srvr.c1053 size_t idlen; in tls_parse_ctos_psk() local
1061 idlen = PACKET_remaining(&identity); in tls_parse_ctos_psk()
1063 && !s->psk_find_session_cb(ussl, PACKET_data(&identity), idlen, in tls_parse_ctos_psk()
1072 && idlen <= PSK_MAX_IDENTITY_LEN) { in tls_parse_ctos_psk()
/openssl/apps/
H A Ds_server.c3831 unsigned int idlen; member
3844 SSL_SESSION_get_id(session, &sess->idlen); in add_session()
3852 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session()
3878 static SSL_SESSION *get_session(SSL *ssl, const unsigned char *id, int idlen, in get_session() argument
3884 if (idlen == (int)sess->idlen && !memcmp(sess->id, id, idlen)) { in get_session()
3899 unsigned int idlen; in del_session() local
3900 id = SSL_SESSION_get_id(session, &idlen); in del_session()
3902 if (idlen == sess->idlen && !memcmp(sess->id, id, idlen)) { in del_session()
H A Dcms.c1384 int idlen; in receipt_request_print() local
1388 idlen = ASN1_STRING_length(scid); in receipt_request_print()
1390 BIO_dump_indent(bio_err, id, idlen, 4); in receipt_request_print()
H A Ds_client.c204 const unsigned char **id, size_t *idlen, in psk_use_session_cb() argument
249 *idlen = 0; in psk_use_session_cb()
255 *idlen = strlen(psk_identity); in psk_use_session_cb()
/openssl/test/
H A Dquicapitest.c1154 size_t *idlen, SSL_SESSION **sess) in use_session_cb() argument
1165 *idlen = strlen(pskid); in use_session_cb()
H A Dsslapitest.c75 size_t *idlen, SSL_SESSION **sess);
3258 size_t *idlen, SSL_SESSION **sess) in use_session_cb() argument
3283 *idlen = strlen(pskid); in use_session_cb()

Completed in 89 milliseconds