Home
last modified time | relevance | path

Searched refs:cookie_len (Results 1 – 19 of 19) sorted by relevance

/third_party/openssl/doc/man3/
DSSL_CTX_set_stateless_cookie_generate_cb.pod19 size_t *cookie_len));
24 size_t cookie_len));
31 *cookie_len));
37 cookie_len));
46 of bytes written to B<cookie_len>. If a cookie cannot be generated, a zero
52 length B<cookie_len>. A nonzero return value from verify_stateless_cookie_cb()
61 B<cookie>, and must write the number of bytes written to B<cookie_len>. If a
67 pointed to by B<cookie> and is of length B<cookie_len>. A nonzero return value
/third_party/openssl/apps/
Ds_apps.h46 unsigned int *cookie_len);
48 unsigned int cookie_len);
56 size_t *cookie_len);
58 size_t cookie_len);
Ds_cb.c748 unsigned int *cookie_len) in generate_cookie_callback() argument
792 buffer, length, cookie, cookie_len); in generate_cookie_callback()
801 unsigned int cookie_len) in verify_cookie_callback() argument
810 && cookie_len == resultlength in verify_cookie_callback()
818 size_t *cookie_len) in generate_stateless_cookie_callback() argument
824 *cookie_len = temp; in generate_stateless_cookie_callback()
829 size_t cookie_len) in verify_stateless_cookie_callback() argument
831 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
/third_party/openssl/test/
Ddtlsv1listentest.c262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument
268 *cookie_len = COOKIE_LEN; in cookie_gen()
274 unsigned int cookie_len) in cookie_verify() argument
278 if (cookie_len != COOKIE_LEN) in cookie_verify()
Ddtlstest.c251 unsigned int *cookie_len) in generate_cookie_cb() argument
254 *cookie_len = sizeof(dummy_cookie); in generate_cookie_cb()
259 unsigned int cookie_len) in verify_cookie_cb() argument
261 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb()
Dsslapitest.c3875 unsigned int *cookie_len) in generate_cookie_callback() argument
3882 *cookie_len = sizeof(cookie_magic_value) - 1; in generate_cookie_callback()
3888 unsigned int cookie_len) in verify_cookie_callback() argument
3890 if (cookie_len == sizeof(cookie_magic_value) - 1 in verify_cookie_callback()
3891 && memcmp(cookie, cookie_magic_value, cookie_len) == 0) in verify_cookie_callback()
3898 size_t *cookie_len) in generate_stateless_cookie_callback() argument
3902 *cookie_len = temp; in generate_stateless_cookie_callback()
3907 size_t cookie_len) in verify_stateless_cookie_callback() argument
3909 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
/third_party/mbedtls/library/
Dssl_cookie.c193 const unsigned char *cookie, size_t cookie_len, in mbedtls_ssl_cookie_check() argument
205 if( cookie_len != COOKIE_LEN ) in mbedtls_ssl_cookie_check()
Dssl_cli.c1827 unsigned char cookie_len; in ssl_parse_hello_verify_request() local
1871 cookie_len = *p++; in ssl_parse_hello_verify_request()
1872 if( ( ssl->in_msg + ssl->in_msglen ) - p < cookie_len ) in ssl_parse_hello_verify_request()
1880 MBEDTLS_SSL_DEBUG_BUF( 3, "cookie", p, cookie_len ); in ssl_parse_hello_verify_request()
1884 ssl->handshake->verify_cookie = mbedtls_calloc( 1, cookie_len ); in ssl_parse_hello_verify_request()
1887 MBEDTLS_SSL_DEBUG_MSG( 1, ( "alloc failed (%d bytes)", cookie_len ) ); in ssl_parse_hello_verify_request()
1891 memcpy( ssl->handshake->verify_cookie, p, cookie_len ); in ssl_parse_hello_verify_request()
1892 ssl->handshake->verify_cookie_len = cookie_len; in ssl_parse_hello_verify_request()
Dssl_srv.c1127 size_t cookie_offset, cookie_len; in ssl_parse_client_hello() local
1459 cookie_len = buf[cookie_offset]; in ssl_parse_client_hello()
1461 if( cookie_offset + 1 + cookie_len + 2 > msg_len ) in ssl_parse_client_hello()
1470 buf + cookie_offset + 1, cookie_len ); in ssl_parse_client_hello()
1480 buf + cookie_offset + 1, cookie_len, in ssl_parse_client_hello()
1496 if( cookie_len != 0 ) in ssl_parse_client_hello()
1509 ciph_offset = cookie_offset + 1 + cookie_len; in ssl_parse_client_hello()
Dssl_msg.c2911 size_t sid_len, cookie_len; in ssl_check_dtls_clihlo_cookie() local
2952 cookie_len = in[60 + sid_len]; in ssl_check_dtls_clihlo_cookie()
2953 if( cookie_len > in_len - 60 ) in ssl_check_dtls_clihlo_cookie()
2956 if( f_cookie_check( p_cookie, in + sid_len + 61, cookie_len, in ssl_check_dtls_clihlo_cookie()
Dssl_tls.c3172 const unsigned char *cookie, size_t cookie_len, in ssl_cookie_check_dummy() argument
3177 ((void) cookie_len); in ssl_cookie_check_dummy()
/third_party/openssl/ssl/
Dssl_sess.c1226 unsigned int *cookie_len)) in SSL_CTX_set_cookie_generate_cb() argument
1234 unsigned int cookie_len)) in SSL_CTX_set_cookie_verify_cb() argument
1266 size_t *cookie_len)) in SSL_CTX_set_stateless_cookie_generate_cb() argument
1275 size_t cookie_len)) in SSL_CTX_set_stateless_cookie_verify_cb() argument
Dssl_local.h818 unsigned int *cookie_len);
822 unsigned int cookie_len);
826 size_t *cookie_len);
830 size_t cookie_len);
1775 size_t cookie_len; member
2431 size_t cookie_len);
Dd1_lib.c86 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new()
180 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
/third_party/openssl/ssl/statem/
Dstatem_clnt.c1232 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello()
1234 s->d1->cookie_len)) { in tls_construct_client_hello()
1298 size_t cookie_len; in dtls_process_hello_verify() local
1308 cookie_len = PACKET_remaining(&cookiepkt); in dtls_process_hello_verify()
1309 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify()
1315 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify()
1320 s->d1->cookie_len = cookie_len; in dtls_process_hello_verify()
Dstatem_srvr.c1286 size_t cookie_len) in dtls_raw_hello_verify_request() argument
1290 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request()
1307 s->d1->cookie_len = cookie_leni; in dtls_construct_hello_verify_request()
1310 s->d1->cookie_len)) { in dtls_construct_hello_verify_request()
1711 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len in tls_early_post_process_client_hello()
1713 s->d1->cookie_len) != 0) { in tls_early_post_process_client_hello()
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/
Dsctp_input.c1568 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len,
1587 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, in sctp_process_cookie_existing() argument
1999 sh, cookie, cookie_len, in sctp_process_cookie_existing()
2159 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, argument
2224 initack_limit = offset + cookie_len;
2583 unsigned int cookie_len; local
2608 cookie_len = ntohs(cp->ch.chunk_length);
2610 if (cookie_len < sizeof(struct sctp_cookie_echo_chunk) +
2653 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE;
2882 cookie_len -= SCTP_SIGNATURE_SIZE;
[all …]
/third_party/openssl/include/openssl/
Dssl.h746 *cookie_len));
752 cookie_len));
758 size_t *cookie_len));
763 size_t cookie_len));
/third_party/libcoap/src/
Dcoap_openssl.c385 unsigned int *cookie_len) { in coap_dtls_generate_cookie() argument
396 r &= HMAC_Final(dtls->cookie_hmac, cookie, cookie_len); in coap_dtls_generate_cookie()
403 unsigned int cookie_len) { in coap_dtls_verify_cookie() argument
407 cookie_len == len && memcmp(cookie, hmac, len) == 0) in coap_dtls_verify_cookie()