Home
last modified time | relevance | path

Searched refs:idlen (Results 1 – 16 of 16) sorted by relevance

/openssl/crypto/cms/
H A Dcms_ess.c117 unsigned char *id, int idlen, int allorfirst, in CMS_ReceiptRequest_create0_ex() argument
127 ASN1_STRING_set0(rr->signedContentIdentifier, id, idlen); in CMS_ReceiptRequest_create0_ex()
159 unsigned char *id, int idlen, int allorfirst, in CMS_ReceiptRequest_create0() argument
162 return CMS_ReceiptRequest_create0_ex(id, idlen, allorfirst, receiptList, in CMS_ReceiptRequest_create0()
H A Dcms_env.c649 const unsigned char *id, size_t idlen) in CMS_RecipientInfo_kekri_id_cmp() argument
661 tmp_os.length = (int)idlen; in CMS_RecipientInfo_kekri_id_cmp()
686 unsigned char *id, size_t idlen, in CMS_add0_recipient_key() argument
761 ASN1_STRING_set0(kekri->kekid->keyIdentifier, id, idlen); in CMS_add0_recipient_key()
H A Dcms_smime.c782 const unsigned char *id, size_t idlen) in CMS_decrypt_set1_key() argument
798 if (id == NULL || (CMS_RecipientInfo_kekri_id_cmp(ri, id, idlen) == 0)) { in CMS_decrypt_set1_key()
/openssl/crypto/x509/
H A Dv3_ncons.c315 static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen) in cn2dnsid() argument
324 *idlen = 0; in cn2dnsid()
401 *idlen = (size_t)utf8_length; in cn2dnsid()
429 size_t idlen; in NAME_CONSTRAINTS_check_CN() local
438 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK) in NAME_CONSTRAINTS_check_CN()
440 if (idlen == 0) in NAME_CONSTRAINTS_check_CN()
443 stmp.length = idlen; in NAME_CONSTRAINTS_check_CN()
/openssl/doc/man3/
H A DCMS_get1_ReceiptRequest.pod14 unsigned char *id, int idlen, int allorfirst,
18 unsigned char *id, int idlen, int allorfirst,
30 structure. The B<signedContentIdentifier> field is set using I<id> and I<idlen>,
H A DCMS_add1_recipient_cert.pod20 unsigned char *id, size_t idlen,
36 wrapping algorithm B<nid>, identifier B<id> of length B<idlen> and optional
H A DSSL_CTX_set_psk_client_callback.pod19 size_t *idlen,
55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>.
99 NULL. The contents of B<*id> and B<*idlen> will be ignored.
H A DCMS_get0_RecipientInfos.pod36 const unsigned char *id, size_t idlen);
82 CMS_RecipientInfo_kekri_id_cmp() compares the ID in the B<id> and B<idlen>
/openssl/include/openssl/
H A Dcms.h.in193 const unsigned char *id, size_t idlen);
229 unsigned char *id, size_t idlen,
245 const unsigned char *id, size_t idlen);
354 unsigned char *id, int idlen, int allorfirst,
358 unsigned char *id, int idlen, int allorfirst,
H A Dssl.h.in846 size_t *idlen,
/openssl/ssl/statem/
H A Dextensions_clnt.c364 int idlen = i2d_OCSP_RESPID(id, NULL); in tls_construct_ctos_status_request() local
366 if (idlen <= 0 in tls_construct_ctos_status_request()
368 || !WPACKET_sub_allocate_bytes_u16(pkt, idlen, &idbytes) in tls_construct_ctos_status_request()
369 || i2d_OCSP_RESPID(id, &idbytes) != idlen) { in tls_construct_ctos_status_request()
770 size_t idlen = 0; in tls_construct_ctos_early_data() local
780 && (!s->psk_use_session_cb(ssl, handmd, &id, &idlen, &psksess) in tls_construct_ctos_early_data()
805 idlen = strlen(identity); in tls_construct_ctos_early_data()
806 if (idlen > PSK_MAX_IDENTITY_LEN) { in tls_construct_ctos_early_data()
840 s->psksession_id = OPENSSL_memdup(id, idlen); in tls_construct_ctos_early_data()
846 s->psksession_id_len = idlen; in tls_construct_ctos_early_data()
H A Dextensions_srvr.c1018 size_t idlen; in tls_parse_ctos_psk() local
1026 idlen = PACKET_remaining(&identity); in tls_parse_ctos_psk()
1028 && !s->psk_find_session_cb(ssl, PACKET_data(&identity), idlen, in tls_parse_ctos_psk()
1037 && idlen <= PSK_MAX_IDENTITY_LEN) { in tls_parse_ctos_psk()
/openssl/apps/
H A Ds_server.c3707 unsigned int idlen; member
3720 SSL_SESSION_get_id(session, &sess->idlen); in add_session()
3728 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session()
3754 static SSL_SESSION *get_session(SSL *ssl, const unsigned char *id, int idlen, in get_session() argument
3760 if (idlen == (int)sess->idlen && !memcmp(sess->id, id, idlen)) { in get_session()
3774 unsigned int idlen; in del_session() local
3775 id = SSL_SESSION_get_id(session, &idlen); in del_session()
3777 if (idlen == sess->idlen && !memcmp(sess->id, id, idlen)) { in del_session()
H A Dcms.c1388 int idlen; in receipt_request_print() local
1392 idlen = ASN1_STRING_length(scid); in receipt_request_print()
1394 BIO_dump_indent(bio_err, id, idlen, 4); in receipt_request_print()
H A Ds_client.c159 const unsigned char **id, size_t *idlen, in psk_use_session_cb() argument
204 *idlen = 0; in psk_use_session_cb()
210 *idlen = strlen(psk_identity); in psk_use_session_cb()
/openssl/test/
H A Dsslapitest.c73 size_t *idlen, SSL_SESSION **sess);
3067 size_t *idlen, SSL_SESSION **sess) in use_session_cb() argument
3092 *idlen = strlen(pskid); in use_session_cb()

Completed in 123 milliseconds