Lines Matching refs:data
317 coap_ssl_data *data = NULL;
318 data = malloc(sizeof(coap_ssl_data));
319 if (data == NULL)
322 BIO_set_data(a, data);
323 memset(data, 0x00, sizeof(coap_ssl_data));
329 coap_ssl_data *data;
332 data = (coap_ssl_data *)BIO_get_data(a);
333 if (data != NULL)
334 free(data);
341 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(a);
344 if (data != NULL && data->pdu_len > 0) {
345 if (outl < (int)data->pdu_len) {
346 memcpy(out, data->pdu, outl);
349 memcpy(out, data->pdu, data->pdu_len);
350 ret = (int)data->pdu_len;
352 if (!data->peekmode) {
353 data->pdu_len = 0;
354 data->pdu = NULL;
369 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(a);
371 if (data->session) {
372 if (!coap_netif_available(data->session)
374 && data->session->endpoint == NULL
382 ret = (int)data->session->sock.lfunc[COAP_LAYER_TLS].l_write(data->session,
403 coap_ssl_data *data = BIO_get_data(a);
416 data->peekmode = (unsigned)num;
435 data->timeout = coap_ticks_from_rt_us((uint64_t)((struct timeval *)ptr)->tv_sec * 1000000 + ((
468 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(SSL_get_rbio(ssl));
471 (const uint8_t *)&data->session->addr_info.local.addr,
472 (size_t)data->session->addr_info.local.size);
474 (const uint8_t *)&data->session->addr_info.remote.addr,
475 (size_t)data->session->addr_info.remote.size);
721 * return +ve data amount
746 * return +ve data amount
2820 coap_ssl_data *data;
2840 data = (coap_ssl_data *)BIO_get_data(SSL_get_rbio(ssl));
2841 data->session = session;
2960 coap_ssl_data *data;
2971 data = (coap_ssl_data *)BIO_get_data(bio);
2972 data->session = session;
3028 const uint8_t *data, size_t data_len) {
3035 r = SSL_write(ssl, data, (int)data_len);
3115 const uint8_t *data, size_t data_len) {
3124 coap_log_err("** %s: Previous data not read %u bytes\n",
3128 ssl_data->pdu = data;
3143 * Cannot check if data is left on the stack in error as DTLSv1_listen()
3144 * only does a 'peek' read of the incoming data.
3152 coap_dtls_receive(coap_session_t *session, const uint8_t *data, size_t data_len) {
3165 coap_log_err("** %s: Previous data not read %u bytes\n",
3168 ssl_data->pdu = data;
3208 /* pdu data is held on stack which will not stay there */
3209 coap_log_debug("coap_dtls_receive: ret %d: remaining data %u\n", r, ssl_data->pdu_len);
3429 coap_tls_write(coap_session_t *session, const uint8_t *data, size_t data_len) {
3438 r = SSL_write(ssl, data, (int)data_len);
3506 coap_tls_read(coap_session_t *session, uint8_t *data, size_t data_len) {
3517 r = SSL_read(ssl, data, (int)data_len);
3591 const uint8_t *data,
3593 return EVP_DigestUpdate(digest_ctx, data, data_len);
3656 const coap_bin_const_t *data,
3674 if (EVP_DigestUpdate(evp_ctx, data->s, data->length) == 0)
3778 coap_bin_const_t *data,
3787 if (data == NULL)
3811 C(EVP_EncryptUpdate(ctx, NULL, &result_len, NULL, (int)data->length));
3815 C(EVP_EncryptUpdate(ctx, result, &result_len, data->s, (int)data->length));
3838 coap_bin_const_t *data,
3849 if (data == NULL)
3859 if (data->length < ccm->tag_len) {
3862 tag = data->s + data->length - ccm->tag_len;
3863 data->length -= ccm->tag_len;
3880 C(EVP_DecryptUpdate(ctx, NULL, &len, NULL, (int)data->length));
3884 tmp = EVP_DecryptUpdate(ctx, result, &len, data->s, (int)data->length);
3901 coap_bin_const_t *data,
3908 assert(data);
3922 data->s,
3923 (int)data->length,