| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_sake.c | 32 u8 *serverid; member in struct:eap_sake_data 108 os_free(data->serverid); 226 os_free(data->serverid); 227 data->serverid = NULL; 229 if (attr.serverid) { 230 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-SAKE: SERVERID", 231 attr.serverid, attr.serverid_len); 232 data->serverid = os_memdup(attr.serverid, attr.serverid_len); 233 if (data->serverid == NULL [all...] |
| eap_eke.c | 24 u8 *serverid; member in struct:eap_eke_data 137 os_free(data->serverid); 311 os_free(data->serverid); 312 data->serverid = os_memdup(pos, end - pos); 313 if (data->serverid == NULL) { 404 data->serverid, data->serverid_len, 431 data->serverid, data->serverid_len, 557 if (eap_eke_derive_ka(&data->sess, data->serverid, data->serverid_len, 604 if (eap_eke_derive_msk(&data->sess, data->serverid, data->serverid_len,
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_sake_common.h | 63 const u8 *serverid; member in struct:eap_sake_parse_attr 89 const u8 *serverid, size_t serverid_len,
|
| eap_sake_common.c | 62 attr->serverid = data; 324 * @serverid: SERVERID 325 * @serverid_len: SERVERID length 337 const u8 *serverid, size_t serverid_len, 358 if (serverid) { 359 os_memcpy(pos, serverid, serverid_len); 368 if (serverid) { 369 os_memcpy(pos, serverid, serverid_len);
|
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_proxy_server_scan.c | 197 VSTRING *serverid = vstring_alloc(25); local 213 RECV_ATTR_STR(TLS_ATTR_SERVERID, serverid), 220 props->serverid = vstring_export(serverid); 239 myfree((void *) props->serverid);
|
| tls_proxy_clnt.c | 13 /* serverid, tls_params, init_props, start_props) 21 /* const char *serverid; 31 /* timeout, serverid) 38 /* const char *serverid; 91 /* .IP serverid 157 const char *serverid, 206 SEND_ATTR_STR(TLS_ATTR_SERVERID, serverid),
|
| tls_client.c | 212 /* serverid contains transport:addr:port information */ 214 TLScontext->serverid, TLScontext->cache_type); 229 if (tls_mgr_lookup(TLScontext->cache_type, TLScontext->serverid, 234 /* serverid contains transport:addr:port information */ 236 TLScontext->serverid, TLScontext->cache_type); 274 /* serverid contains transport:addr:port information */ 276 TLScontext->serverid, TLScontext->cache_type); 283 tls_mgr_update(TLScontext->cache_type, TLScontext->serverid, 303 if (TLScontext->cache_type == 0 || TLScontext->serverid == 0) 307 /* serverid contains transport:addr:port information * [all...] |
| tls_proxy_server_print.c | 131 STRING_OR_EMPTY(props->serverid)),
|
| tls_fprint.c | 56 /* tls_serverid_digest() suffixes props->serverid computed by the SMTP 85 /* initial serverid from the SMTP client and the DANE verification 239 /* tls_serverid_digest - suffix props->serverid with parameter digest */ 255 * Try to use sha256: our serverid choice should be strong enough to 257 * DANE TLSA digests. Failing that, we compute serverid digests with the 320 * Append the digest to the serverid. We don't compare this digest to 330 result = vstring_alloc(strlen(props->serverid) + 1 + 2 * md_len); 331 vstring_strcpy(result, props->serverid);
|
| tls_proxy.h | 96 peer_port, timeout, serverid) \ 98 (peer_port), (timeout), (timeout), (serverid), \ 151 #define TLS_ATTR_SERVERID "serverid" 218 #define TLS_ATTR_SERVERID "serverid" 254 #define TLS_ATTR_SERVERID "serverid"
|
| tls_proxy_client_scan.c | 328 myfree((void *) props->serverid); 532 VSTRING *serverid = vstring_alloc(25); local 565 RECV_ATTR_STR(TLS_ATTR_SERVERID, serverid), 586 props->serverid = vstring_export(serverid);
|
| tls_server.c | 209 GEN_CACHE_ID(cache_id, session_id, session_id_length, TLScontext->serverid); 251 GEN_CACHE_ID(cache_id, sid, sid_length, TLScontext->serverid); 276 GEN_CACHE_ID(cache_id, sid, sid_length, TLScontext->serverid); 868 TLScontext->serverid = mystrdup(props->serverid);
|
| tls.h | 261 char *serverid; /* unique server identifier */ member in struct:__anon8243 501 const char *serverid; /* Session cache key */ member in struct:__anon8245 575 const char *serverid; /* Server instance (salt cache key) */ member in struct:__anon8247
|
| tls_proxy_client_print.c | 332 STRING_OR_EMPTY(props->serverid)),
|
| tls_misc.c | 1360 TLScontext->serverid = 0; 1406 if (TLScontext->serverid) 1407 myfree(TLScontext->serverid);
|
| /src/external/mpl/bind/dist/lib/ns/ |
| server.c | 221 ns_server_setserverid(ns_server_t *sctx, const char *serverid) { 229 if (serverid != NULL) { 230 sctx->server_id = isc_mem_strdup(sctx->mctx, serverid);
|
| /src/external/mpl/bind/dist/lib/ns/include/ns/ |
| server.h | 175 ns_server_setserverid(ns_server_t *sctx, const char *serverid); 177 * Set sctx->server_id to 'serverid'. If it was set previously, free the memory.
|
| /src/external/ibm-public/postfix/dist/src/smtp/ |
| smtp_proto.c | 885 VSTRING *serverid; local 928 * XXX: The TLS library will salt the serverid with further details of the 933 serverid = vstring_alloc(10); 934 smtp_key_prefix(serverid, "&", state->iterator, SMTP_KEY_FLAG_SERVICE 969 serverid = vstring_str(serverid), 1098 serverid = vstring_str(serverid), 1121 vstring_free(serverid);
|
| /src/external/ibm-public/postfix/dist/src/posttls-finger/ |
| posttls-finger.c | 832 serverid = state->addrport, 938 serverid = state->addrport,
|
| /src/external/ibm-public/postfix/dist/src/tlsproxy/ |
| tlsproxy.c | 1110 serverid = state->server_id,
|
| /src/external/ibm-public/postfix/dist/src/smtpd/ |
| smtpd.c | 5290 serverid = state->service,
|