Searched refs:cookie_len (Results 1 – 8 of 8) sorted by relevance
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_client.c | 523 uint8_t cookie_len = 0; in ssl_write_client_hello_body() local 525 uint16_t cookie_len = 0; in ssl_write_client_hello_body() 531 handshake->cookie_len); in ssl_write_client_hello_body() 532 cookie_len = handshake->cookie_len; in ssl_write_client_hello_body() 535 MBEDTLS_SSL_CHK_BUF_PTR(p, end, cookie_len + 1); in ssl_write_client_hello_body() 536 *p++ = (unsigned char) cookie_len; in ssl_write_client_hello_body() 537 if (cookie_len > 0) { in ssl_write_client_hello_body() 538 memcpy(p, handshake->cookie, cookie_len); in ssl_write_client_hello_body() 539 p += cookie_len; in ssl_write_client_hello_body()
|
| H A D | ssl_tls13_client.c | 534 uint16_t cookie_len; in ssl_tls13_parse_cookie_ext() local 540 cookie_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_cookie_ext() 543 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, cookie_len); in ssl_tls13_parse_cookie_ext() 544 MBEDTLS_SSL_DEBUG_BUF(3, "cookie extension", p, cookie_len); in ssl_tls13_parse_cookie_ext() 547 handshake->cookie_len = 0; in ssl_tls13_parse_cookie_ext() 548 handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_tls13_parse_cookie_ext() 552 cookie_len)); in ssl_tls13_parse_cookie_ext() 556 memcpy(handshake->cookie, p, cookie_len); in ssl_tls13_parse_cookie_ext() 557 handshake->cookie_len = cookie_len; in ssl_tls13_parse_cookie_ext() 579 handshake->cookie_len); in ssl_tls13_write_cookie_ext() [all …]
|
| H A D | ssl_cookie.c | 279 const unsigned char *cookie, size_t cookie_len, in mbedtls_ssl_cookie_check() argument 297 if (cookie_len != COOKIE_LEN) { in mbedtls_ssl_cookie_check()
|
| H A D | ssl_tls12_client.c | 1101 uint8_t cookie_len; in ssl_parse_hello_verify_request() local 1103 uint16_t cookie_len; in ssl_parse_hello_verify_request() local 1144 cookie_len = *p++; in ssl_parse_hello_verify_request() 1145 if ((ssl->in_msg + ssl->in_msglen) - p < cookie_len) { in ssl_parse_hello_verify_request() 1152 MBEDTLS_SSL_DEBUG_BUF(3, "cookie", p, cookie_len); in ssl_parse_hello_verify_request() 1156 ssl->handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_parse_hello_verify_request() 1158 MBEDTLS_SSL_DEBUG_MSG(1, ("alloc failed (%d bytes)", cookie_len)); in ssl_parse_hello_verify_request() 1162 memcpy(ssl->handshake->cookie, p, cookie_len); in ssl_parse_hello_verify_request() 1163 ssl->handshake->cookie_len = cookie_len; in ssl_parse_hello_verify_request() 1243 ssl->handshake->cookie_len = 0; in ssl_parse_server_hello()
|
| H A D | ssl_tls12_server.c | 896 size_t cookie_offset, cookie_len; in ssl_parse_client_hello() local 1187 cookie_len = buf[cookie_offset]; in ssl_parse_client_hello() 1189 if (cookie_offset + 1 + cookie_len + 2 > msg_len) { in ssl_parse_client_hello() 1197 buf + cookie_offset + 1, cookie_len); in ssl_parse_client_hello() 1206 buf + cookie_offset + 1, cookie_len, in ssl_parse_client_hello() 1218 if (cookie_len != 0) { in ssl_parse_client_hello() 1230 ciph_offset = cookie_offset + 1 + cookie_len; in ssl_parse_client_hello()
|
| H A D | ssl_msg.c | 3587 size_t sid_len, cookie_len, epoch, fragment_offset; in mbedtls_ssl_check_dtls_clihlo_cookie() local 3646 cookie_len = in[60 + sid_len]; in mbedtls_ssl_check_dtls_clihlo_cookie() 3647 if (59 + 1 + sid_len + 1 + cookie_len > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie() 3649 (unsigned) cookie_len, in mbedtls_ssl_check_dtls_clihlo_cookie() 3655 in + sid_len + 61, cookie_len); in mbedtls_ssl_check_dtls_clihlo_cookie() 3657 in + sid_len + 61, cookie_len, in mbedtls_ssl_check_dtls_clihlo_cookie()
|
| H A D | ssl_misc.h | 878 uint8_t cookie_len; member 886 uint16_t cookie_len; /*!< DTLS: HelloVerifyRequest cookie length member
|
| H A D | ssl_tls.c | 1292 const unsigned char *cookie, size_t cookie_len, in ssl_cookie_check_dummy() argument 1297 ((void) cookie_len); in ssl_cookie_check_dummy()
|