| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_asn1.c | 37 ASN1_OCTET_STRING *psk_identity; member in struct:__anon611 66 ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8), 127 ASN1_OCTET_STRING psk_identity, psk_identity_hint; 197 ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity); 365 if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity))
|
| ssl_txt.c | 92 if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0)
|
| ssl_sess.c | 156 dest->psk_identity = NULL; 213 if (src->psk_identity) { 214 dest->psk_identity = OPENSSL_strdup(src->psk_identity); 215 if (dest->psk_identity == NULL) 867 OPENSSL_free(ss->psk_identity);
|
| ssl_local.h | 466 * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity 500 char *psk_identity; member in struct:ssl_session_st
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_asn1.c | 36 ASN1_OCTET_STRING *psk_identity; member in struct:__anon1643 64 ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8), 124 ASN1_OCTET_STRING psk_identity, psk_identity_hint; 184 ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity); 332 if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity))
|
| ssl_txt.c | 87 if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0)
|
| ssl_sess.c | 191 dest->psk_identity = NULL; 239 if (src->psk_identity) { 240 dest->psk_identity = OPENSSL_strdup(src->psk_identity); 241 if (dest->psk_identity == NULL) { 883 OPENSSL_free(ss->psk_identity);
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_asn1.c | 36 ASN1_OCTET_STRING *psk_identity; member in struct:__anon2179 63 ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8), 122 ASN1_OCTET_STRING psk_identity, psk_identity_hint; 180 ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity); 325 if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity))
|
| ssl_txt.c | 87 if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0)
|
| ssl_sess.c | 122 dest->psk_identity = NULL; 166 if (src->psk_identity) { 167 dest->psk_identity = OPENSSL_strdup(src->psk_identity); 168 if (dest->psk_identity == NULL) { 769 OPENSSL_free(ss->psk_identity);
|
| /src/crypto/external/bsd/openssl.old/dist/test/ossl_shim/ |
| test_config.h | 49 std::string psk_identity; member in struct:TestConfig
|
| test_config.cc | 102 { "-psk-identity", &TestConfig::psk_identity },
|
| ossl_shim.cc | 273 if (config->psk_identity.empty()) { 279 strcmp(hint, config->psk_identity.c_str()) != 0) { 285 if (config->psk_identity.size() >= max_identity_len || 291 BUF_strlcpy(out_identity, config->psk_identity.c_str(), 301 if (strcmp(identity, config->psk_identity.c_str()) != 0) { 962 if (!config->psk_identity.empty() && 963 !SSL_use_psk_identity_hint(ssl.get(), config->psk_identity.c_str())) {
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| s_server.c | 118 static char *psk_identity = "Client_identity"; variable 153 if (strcmp(identity, psk_identity) != 0) { 155 " (got '%s' expected '%s')\n", identity, psk_identity); 199 if (strlen(psk_identity) != identity_len 200 || memcmp(psk_identity, identity, identity_len) != 0) { 894 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity to expect"}, 1431 psk_identity = opt_arg();
|
| s_client.c | 93 static char *psk_identity = "Client_identity"; variable 119 ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity); 209 *id = (unsigned char *)psk_identity; 210 *idlen = strlen(psk_identity); 546 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity"}, 1160 psk_identity = opt_arg();
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| s_server.c | 123 static char *psk_identity = "Client_identity"; variable 156 if (strcmp(identity, psk_identity) != 0) { 158 " (got '%s' expected '%s')\n", identity, psk_identity); 202 if (strlen(psk_identity) != identity_len 203 || memcmp(psk_identity, identity, identity_len) != 0) { 907 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity to expect"}, 1411 psk_identity = opt_arg();
|
| s_client.c | 116 static char *psk_identity = "Client_identity"; variable 142 ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity); 232 *id = (unsigned char *)psk_identity; 233 *idlen = strlen(psk_identity); 764 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity"}, 1239 psk_identity = opt_arg();
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| s_server.c | 124 static char *psk_identity = "Client_identity"; variable 159 if (strcmp(identity, psk_identity) != 0) { 162 identity, psk_identity); 206 if (strlen(psk_identity) != identity_len 207 || memcmp(psk_identity, identity, identity_len) != 0) { 1024 { "psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity to expect" }, 1579 psk_identity = opt_arg();
|
| s_client.c | 138 static char *psk_identity = "Client_identity"; variable 164 ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity); 255 *id = (unsigned char *)psk_identity; 256 *idlen = strlen(psk_identity); 683 { "psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity" }, 1325 psk_identity = opt_arg();
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_srvr.c | 2940 PACKET psk_identity; local 2942 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { 2946 if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { 2955 if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { 2961 s->session->psk_identity,
|
| statem_clnt.c | 3079 OPENSSL_free(s->session->psk_identity); 3080 s->session->psk_identity = tmpidentity;
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_srvr.c | 2803 PACKET psk_identity; local 2805 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { 2809 if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { 2818 if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { 2823 psklen = s->psk_server_callback(s, s->session->psk_identity,
|
| statem_clnt.c | 2801 OPENSSL_free(s->session->psk_identity); 2802 s->session->psk_identity = tmpidentity;
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_srvr.c | 2934 PACKET psk_identity; local 2936 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { 2941 if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { 2952 if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { 2958 psklen = s->psk_server_callback(s, s->session->psk_identity,
|
| statem_clnt.c | 2944 OPENSSL_free(s->session->psk_identity); 2945 s->session->psk_identity = tmpidentity;
|