/openssl/crypto/cms/ |
H A D | cms_ess.c | 117 unsigned char *id, int idlen, int allorfirst, in CMS_ReceiptRequest_create0_ex() argument 129 ASN1_STRING_set0(rr->signedContentIdentifier, id, idlen); in CMS_ReceiptRequest_create0_ex() 160 unsigned char *id, int idlen, int allorfirst, in CMS_ReceiptRequest_create0() argument 163 return CMS_ReceiptRequest_create0_ex(id, idlen, allorfirst, receiptList, in CMS_ReceiptRequest_create0()
|
H A D | cms_env.c | 653 const unsigned char *id, size_t idlen) in CMS_RecipientInfo_kekri_id_cmp() argument 665 tmp_os.length = (int)idlen; in CMS_RecipientInfo_kekri_id_cmp() 690 unsigned char *id, size_t idlen, in CMS_add0_recipient_key() argument 773 ASN1_STRING_set0(kekri->kekid->keyIdentifier, id, idlen); in CMS_add0_recipient_key()
|
H A D | cms_smime.c | 800 const unsigned char *id, size_t idlen) in CMS_decrypt_set1_key() argument 814 || (CMS_RecipientInfo_kekri_id_cmp(ri, id, idlen) == 0)) { in CMS_decrypt_set1_key()
|
/openssl/crypto/x509/ |
H A D | v3_ncons.c | 342 static int cn2dnsid(ASN1_STRING *cn, unsigned char **dnsid, size_t *idlen) in cn2dnsid() argument 351 *idlen = 0; in cn2dnsid() 428 *idlen = (size_t)utf8_length; in cn2dnsid() 456 size_t idlen; in NAME_CONSTRAINTS_check_CN() local 465 if ((r = cn2dnsid(cn, &idval, &idlen)) != X509_V_OK) in NAME_CONSTRAINTS_check_CN() 467 if (idlen == 0) in NAME_CONSTRAINTS_check_CN() 470 stmp.length = idlen; in NAME_CONSTRAINTS_check_CN()
|
/openssl/doc/man3/ |
H A D | CMS_get1_ReceiptRequest.pod | 14 unsigned char *id, int idlen, int allorfirst, 18 unsigned char *id, int idlen, int allorfirst, 30 structure. The B<signedContentIdentifier> field is set using I<id> and I<idlen>,
|
H A D | CMS_add1_recipient_cert.pod | 20 unsigned char *id, size_t idlen, 36 wrapping algorithm B<nid>, identifier B<id> of length B<idlen> and optional
|
H A D | SSL_CTX_set_psk_client_callback.pod | 19 size_t *idlen, 55 the PSK in B<*id>. The identifier length in bytes should be stored in B<*idlen>. 99 NULL. The contents of B<*id> and B<*idlen> will be ignored.
|
H A D | CMS_get0_RecipientInfos.pod | 36 const unsigned char *id, size_t idlen); 82 CMS_RecipientInfo_kekri_id_cmp() compares the ID in the B<id> and B<idlen>
|
/openssl/include/openssl/ |
H A D | cms.h.in | 193 const unsigned char *id, size_t idlen); 229 unsigned char *id, size_t idlen, 245 const unsigned char *id, size_t idlen); 354 unsigned char *id, int idlen, int allorfirst, 358 unsigned char *id, int idlen, int allorfirst,
|
H A D | ssl.h.in | 863 size_t *idlen,
|
/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 376 int idlen = i2d_OCSP_RESPID(id, NULL); in tls_construct_ctos_status_request() local 378 if (idlen <= 0 in tls_construct_ctos_status_request() 380 || !WPACKET_sub_allocate_bytes_u16(pkt, idlen, &idbytes) in tls_construct_ctos_status_request() 381 || i2d_OCSP_RESPID(id, &idbytes) != idlen) { in tls_construct_ctos_status_request() 783 size_t idlen = 0; in tls_construct_ctos_early_data() local 793 && (!s->psk_use_session_cb(ussl, handmd, &id, &idlen, &psksess) in tls_construct_ctos_early_data() 818 idlen = strlen(identity); in tls_construct_ctos_early_data() 819 if (idlen > PSK_MAX_IDENTITY_LEN) { in tls_construct_ctos_early_data() 854 s->psksession_id = OPENSSL_memdup(id, idlen); in tls_construct_ctos_early_data() 860 s->psksession_id_len = idlen; in tls_construct_ctos_early_data()
|
H A D | extensions_srvr.c | 1053 size_t idlen; in tls_parse_ctos_psk() local 1061 idlen = PACKET_remaining(&identity); in tls_parse_ctos_psk() 1063 && !s->psk_find_session_cb(ussl, PACKET_data(&identity), idlen, in tls_parse_ctos_psk() 1072 && idlen <= PSK_MAX_IDENTITY_LEN) { in tls_parse_ctos_psk()
|
/openssl/apps/ |
H A D | s_server.c | 3831 unsigned int idlen; member 3844 SSL_SESSION_get_id(session, &sess->idlen); in add_session() 3852 sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen); in add_session() 3878 static SSL_SESSION *get_session(SSL *ssl, const unsigned char *id, int idlen, in get_session() argument 3884 if (idlen == (int)sess->idlen && !memcmp(sess->id, id, idlen)) { in get_session() 3899 unsigned int idlen; in del_session() local 3900 id = SSL_SESSION_get_id(session, &idlen); in del_session() 3902 if (idlen == sess->idlen && !memcmp(sess->id, id, idlen)) { in del_session()
|
H A D | cms.c | 1384 int idlen; in receipt_request_print() local 1388 idlen = ASN1_STRING_length(scid); in receipt_request_print() 1390 BIO_dump_indent(bio_err, id, idlen, 4); in receipt_request_print()
|
H A D | s_client.c | 204 const unsigned char **id, size_t *idlen, in psk_use_session_cb() argument 249 *idlen = 0; in psk_use_session_cb() 255 *idlen = strlen(psk_identity); in psk_use_session_cb()
|
/openssl/test/ |
H A D | quicapitest.c | 1154 size_t *idlen, SSL_SESSION **sess) in use_session_cb() argument 1165 *idlen = strlen(pskid); in use_session_cb()
|
H A D | sslapitest.c | 75 size_t *idlen, SSL_SESSION **sess); 3258 size_t *idlen, SSL_SESSION **sess) in use_session_cb() argument 3283 *idlen = strlen(pskid); in use_session_cb()
|