/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 19 size_t *cookie_len)); 24 size_t cookie_len)); 31 *cookie_len)); 37 cookie_len)); 46 of bytes written to B<cookie_len>. If a cookie cannot be generated, a zero 52 length B<cookie_len>. A nonzero return value from verify_stateless_cookie_cb() 61 B<cookie>, and must write the number of bytes written to B<cookie_len>. If a 67 pointed to by B<cookie> and is of length B<cookie_len>. A nonzero return value
|
/third_party/openssl/apps/ |
D | s_apps.h | 46 unsigned int *cookie_len); 48 unsigned int cookie_len); 56 size_t *cookie_len); 58 size_t cookie_len);
|
D | s_cb.c | 748 unsigned int *cookie_len) in generate_cookie_callback() argument 792 buffer, length, cookie, cookie_len); in generate_cookie_callback() 801 unsigned int cookie_len) in verify_cookie_callback() argument 810 && cookie_len == resultlength in verify_cookie_callback() 818 size_t *cookie_len) in generate_stateless_cookie_callback() argument 824 *cookie_len = temp; in generate_stateless_cookie_callback() 829 size_t cookie_len) in verify_stateless_cookie_callback() argument 831 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
|
/third_party/openssl/test/ |
D | dtlsv1listentest.c | 262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument 268 *cookie_len = COOKIE_LEN; in cookie_gen() 274 unsigned int cookie_len) in cookie_verify() argument 278 if (cookie_len != COOKIE_LEN) in cookie_verify()
|
D | dtlstest.c | 251 unsigned int *cookie_len) in generate_cookie_cb() argument 254 *cookie_len = sizeof(dummy_cookie); in generate_cookie_cb() 259 unsigned int cookie_len) in verify_cookie_cb() argument 261 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb()
|
D | sslapitest.c | 3875 unsigned int *cookie_len) in generate_cookie_callback() argument 3882 *cookie_len = sizeof(cookie_magic_value) - 1; in generate_cookie_callback() 3888 unsigned int cookie_len) in verify_cookie_callback() argument 3890 if (cookie_len == sizeof(cookie_magic_value) - 1 in verify_cookie_callback() 3891 && memcmp(cookie, cookie_magic_value, cookie_len) == 0) in verify_cookie_callback() 3898 size_t *cookie_len) in generate_stateless_cookie_callback() argument 3902 *cookie_len = temp; in generate_stateless_cookie_callback() 3907 size_t cookie_len) in verify_stateless_cookie_callback() argument 3909 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
|
/third_party/mbedtls/library/ |
D | ssl_cookie.c | 193 const unsigned char *cookie, size_t cookie_len, in mbedtls_ssl_cookie_check() argument 205 if( cookie_len != COOKIE_LEN ) in mbedtls_ssl_cookie_check()
|
D | ssl_cli.c | 1827 unsigned char cookie_len; in ssl_parse_hello_verify_request() local 1871 cookie_len = *p++; in ssl_parse_hello_verify_request() 1872 if( ( ssl->in_msg + ssl->in_msglen ) - p < cookie_len ) in ssl_parse_hello_verify_request() 1880 MBEDTLS_SSL_DEBUG_BUF( 3, "cookie", p, cookie_len ); in ssl_parse_hello_verify_request() 1884 ssl->handshake->verify_cookie = mbedtls_calloc( 1, cookie_len ); in ssl_parse_hello_verify_request() 1887 MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc failed (%d bytes)", cookie_len ) ); in ssl_parse_hello_verify_request() 1891 memcpy( ssl->handshake->verify_cookie, p, cookie_len ); in ssl_parse_hello_verify_request() 1892 ssl->handshake->verify_cookie_len = cookie_len; in ssl_parse_hello_verify_request()
|
D | ssl_srv.c | 1127 size_t cookie_offset, cookie_len; in ssl_parse_client_hello() local 1459 cookie_len = buf[cookie_offset]; in ssl_parse_client_hello() 1461 if( cookie_offset + 1 + cookie_len + 2 > msg_len ) in ssl_parse_client_hello() 1470 buf + cookie_offset + 1, cookie_len ); in ssl_parse_client_hello() 1480 buf + cookie_offset + 1, cookie_len, in ssl_parse_client_hello() 1496 if( cookie_len != 0 ) in ssl_parse_client_hello() 1509 ciph_offset = cookie_offset + 1 + cookie_len; in ssl_parse_client_hello()
|
D | ssl_msg.c | 2911 size_t sid_len, cookie_len; in ssl_check_dtls_clihlo_cookie() local 2952 cookie_len = in[60 + sid_len]; in ssl_check_dtls_clihlo_cookie() 2953 if( cookie_len > in_len - 60 ) in ssl_check_dtls_clihlo_cookie() 2956 if( f_cookie_check( p_cookie, in + sid_len + 61, cookie_len, in ssl_check_dtls_clihlo_cookie()
|
D | ssl_tls.c | 3172 const unsigned char *cookie, size_t cookie_len, in ssl_cookie_check_dummy() argument 3177 ((void) cookie_len); in ssl_cookie_check_dummy()
|
/third_party/openssl/ssl/ |
D | ssl_sess.c | 1226 unsigned int *cookie_len)) in SSL_CTX_set_cookie_generate_cb() argument 1234 unsigned int cookie_len)) in SSL_CTX_set_cookie_verify_cb() argument 1266 size_t *cookie_len)) in SSL_CTX_set_stateless_cookie_generate_cb() argument 1275 size_t cookie_len)) in SSL_CTX_set_stateless_cookie_verify_cb() argument
|
D | ssl_local.h | 818 unsigned int *cookie_len); 822 unsigned int cookie_len); 826 size_t *cookie_len); 830 size_t cookie_len); 1775 size_t cookie_len; member 2431 size_t cookie_len);
|
D | d1_lib.c | 86 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new() 180 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
|
/third_party/openssl/ssl/statem/ |
D | statem_clnt.c | 1232 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello() 1234 s->d1->cookie_len)) { in tls_construct_client_hello() 1298 size_t cookie_len; in dtls_process_hello_verify() local 1308 cookie_len = PACKET_remaining(&cookiepkt); in dtls_process_hello_verify() 1309 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify() 1315 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify() 1320 s->d1->cookie_len = cookie_len; in dtls_process_hello_verify()
|
D | statem_srvr.c | 1286 size_t cookie_len) in dtls_raw_hello_verify_request() argument 1290 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request() 1307 s->d1->cookie_len = cookie_leni; in dtls_construct_hello_verify_request() 1310 s->d1->cookie_len)) { in dtls_construct_hello_verify_request() 1711 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len in tls_early_post_process_client_hello() 1713 s->d1->cookie_len) != 0) { in tls_early_post_process_client_hello()
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/ |
D | sctp_input.c | 1568 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1587 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, in sctp_process_cookie_existing() argument 1999 sh, cookie, cookie_len, in sctp_process_cookie_existing() 2159 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, argument 2224 initack_limit = offset + cookie_len; 2583 unsigned int cookie_len; local 2608 cookie_len = ntohs(cp->ch.chunk_length); 2610 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) + 2653 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE; 2882 cookie_len -= SCTP_SIGNATURE_SIZE; [all …]
|
/third_party/openssl/include/openssl/ |
D | ssl.h | 746 *cookie_len)); 752 cookie_len)); 758 size_t *cookie_len)); 763 size_t cookie_len));
|
/third_party/libcoap/src/ |
D | coap_openssl.c | 385 unsigned int *cookie_len) { in coap_dtls_generate_cookie() argument 396 r &= HMAC_Final(dtls->cookie_hmac, cookie, cookie_len); in coap_dtls_generate_cookie() 403 unsigned int cookie_len) { in coap_dtls_verify_cookie() argument 407 cookie_len == len && memcmp(cookie, hmac, len) == 0) in coap_dtls_verify_cookie()
|