HomeSort by: relevance | last modified time | path
    Searched refs:serverid (Results 1 - 21 of 21) sorted by relevancy

  /src/external/bsd/wpa/dist/src/eap_peer/
eap_sake.c 32 u8 *serverid; member in struct:eap_sake_data
108 os_free(data->serverid);
226 os_free(data->serverid);
227 data->serverid = NULL;
229 if (attr.serverid) {
230 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-SAKE: SERVERID",
231 attr.serverid, attr.serverid_len);
232 data->serverid = os_memdup(attr.serverid, attr.serverid_len);
233 if (data->serverid == NULL
    [all...]
eap_eke.c 24 u8 *serverid; member in struct:eap_eke_data
137 os_free(data->serverid);
311 os_free(data->serverid);
312 data->serverid = os_memdup(pos, end - pos);
313 if (data->serverid == NULL) {
404 data->serverid, data->serverid_len,
431 data->serverid, data->serverid_len,
557 if (eap_eke_derive_ka(&data->sess, data->serverid, data->serverid_len,
604 if (eap_eke_derive_msk(&data->sess, data->serverid, data->serverid_len,
  /src/external/bsd/wpa/dist/src/eap_common/
eap_sake_common.h 63 const u8 *serverid; member in struct:eap_sake_parse_attr
89 const u8 *serverid, size_t serverid_len,
eap_sake_common.c 62 attr->serverid = data;
324 * @serverid: SERVERID
325 * @serverid_len: SERVERID length
337 const u8 *serverid, size_t serverid_len,
358 if (serverid) {
359 os_memcpy(pos, serverid, serverid_len);
368 if (serverid) {
369 os_memcpy(pos, serverid, serverid_len);
  /src/external/ibm-public/postfix/dist/src/tls/
tls_proxy_server_scan.c 197 VSTRING *serverid = vstring_alloc(25); local
213 RECV_ATTR_STR(TLS_ATTR_SERVERID, serverid),
220 props->serverid = vstring_export(serverid);
239 myfree((void *) props->serverid);
tls_proxy_clnt.c 13 /* serverid, tls_params, init_props, start_props)
21 /* const char *serverid;
31 /* timeout, serverid)
38 /* const char *serverid;
91 /* .IP serverid
157 const char *serverid,
206 SEND_ATTR_STR(TLS_ATTR_SERVERID, serverid),
tls_client.c 212 /* serverid contains transport:addr:port information */
214 TLScontext->serverid, TLScontext->cache_type);
229 if (tls_mgr_lookup(TLScontext->cache_type, TLScontext->serverid,
234 /* serverid contains transport:addr:port information */
236 TLScontext->serverid, TLScontext->cache_type);
274 /* serverid contains transport:addr:port information */
276 TLScontext->serverid, TLScontext->cache_type);
283 tls_mgr_update(TLScontext->cache_type, TLScontext->serverid,
303 if (TLScontext->cache_type == 0 || TLScontext->serverid == 0)
307 /* serverid contains transport:addr:port information *
    [all...]
tls_proxy_server_print.c 131 STRING_OR_EMPTY(props->serverid)),
tls_fprint.c 56 /* tls_serverid_digest() suffixes props->serverid computed by the SMTP
85 /* initial serverid from the SMTP client and the DANE verification
239 /* tls_serverid_digest - suffix props->serverid with parameter digest */
255 * Try to use sha256: our serverid choice should be strong enough to
257 * DANE TLSA digests. Failing that, we compute serverid digests with the
320 * Append the digest to the serverid. We don't compare this digest to
330 result = vstring_alloc(strlen(props->serverid) + 1 + 2 * md_len);
331 vstring_strcpy(result, props->serverid);
tls_proxy.h 96 peer_port, timeout, serverid) \
98 (peer_port), (timeout), (timeout), (serverid), \
151 #define TLS_ATTR_SERVERID "serverid"
218 #define TLS_ATTR_SERVERID "serverid"
254 #define TLS_ATTR_SERVERID "serverid"
tls_proxy_client_scan.c 328 myfree((void *) props->serverid);
532 VSTRING *serverid = vstring_alloc(25); local
565 RECV_ATTR_STR(TLS_ATTR_SERVERID, serverid),
586 props->serverid = vstring_export(serverid);
tls_server.c 209 GEN_CACHE_ID(cache_id, session_id, session_id_length, TLScontext->serverid);
251 GEN_CACHE_ID(cache_id, sid, sid_length, TLScontext->serverid);
276 GEN_CACHE_ID(cache_id, sid, sid_length, TLScontext->serverid);
868 TLScontext->serverid = mystrdup(props->serverid);
tls.h 261 char *serverid; /* unique server identifier */ member in struct:__anon8243
501 const char *serverid; /* Session cache key */ member in struct:__anon8245
575 const char *serverid; /* Server instance (salt cache key) */ member in struct:__anon8247
tls_proxy_client_print.c 332 STRING_OR_EMPTY(props->serverid)),
tls_misc.c 1360 TLScontext->serverid = 0;
1406 if (TLScontext->serverid)
1407 myfree(TLScontext->serverid);
  /src/external/mpl/bind/dist/lib/ns/
server.c 221 ns_server_setserverid(ns_server_t *sctx, const char *serverid) {
229 if (serverid != NULL) {
230 sctx->server_id = isc_mem_strdup(sctx->mctx, serverid);
  /src/external/mpl/bind/dist/lib/ns/include/ns/
server.h 175 ns_server_setserverid(ns_server_t *sctx, const char *serverid);
177 * Set sctx->server_id to 'serverid'. If it was set previously, free the memory.
  /src/external/ibm-public/postfix/dist/src/smtp/
smtp_proto.c 885 VSTRING *serverid; local
928 * XXX: The TLS library will salt the serverid with further details of the
933 serverid = vstring_alloc(10);
934 smtp_key_prefix(serverid, "&", state->iterator, SMTP_KEY_FLAG_SERVICE
969 serverid = vstring_str(serverid),
1098 serverid = vstring_str(serverid),
1121 vstring_free(serverid);
  /src/external/ibm-public/postfix/dist/src/posttls-finger/
posttls-finger.c 832 serverid = state->addrport,
938 serverid = state->addrport,
  /src/external/ibm-public/postfix/dist/src/tlsproxy/
tlsproxy.c 1110 serverid = state->server_id,
  /src/external/ibm-public/postfix/dist/src/smtpd/
smtpd.c 5290 serverid = state->service,

Completed in 67 milliseconds