Lines Matching defs:epoch

660  *    2:                      epoch +
717 * epoch +
731 * epoch +
746 * epoch +
799 // epoch + sequence number
833 // epoch + sequence number
2495 /* Swap epoch + sequence_number */
3478 size_t sid_len, cookie_len, epoch, fragment_offset;
3489 * 3-4 uint16 epoch; copied, must be 0
3515 epoch = MBEDTLS_GET_UINT16_BE(in, 3);
3518 if (in[0] != MBEDTLS_SSL_MSG_HANDSHAKE || epoch != 0 ||
3521 MBEDTLS_SSL_DEBUG_MSG(4, (" type=%u epoch=%u fragment_offset=%u",
3522 in[0], (unsigned) epoch,
3559 * 3-4 uint16 epoch; copied
3610 * Called by ssl_parse_record_header() in case we receive an epoch 0 record
3694 * uint16 epoch; // DTLS only
3780 * uint16 epoch;
3870 * Check epoch before checking length constraint because
3871 * the latter varies with the epoch. E.g., if a ChangeCipherSpec
3874 * to an old epoch, but not because its length is shorter than
3899 MBEDTLS_SSL_DEBUG_MSG(1, ("record from another epoch: "
3903 /* Records from the next epoch are considered for buffering
3913 /* For records from the correct epoch, check whether their
3935 * Check for an epoch 0 ClientHello. We can't use in_msg here to
4375 /* Get rid of future records epoch first, if such exist. */
4381 MBEDTLS_SSL_DEBUG_MSG(2, ("Enough space available after freeing future epoch record"));
4739 rec_epoch = hs->buffering.future_record.epoch;
4754 MBEDTLS_SSL_DEBUG_MSG(2, ("Buffered record not from current epoch."));
4758 MBEDTLS_SSL_DEBUG_MSG(2, ("Found buffered record from current epoch - load"));
4794 /* Don't buffer more than one future epoch record. */
4802 MBEDTLS_SSL_DEBUG_MSG(2, ("Buffering of future epoch record of size %" MBEDTLS_PRINTF_SIZET
4812 MBEDTLS_SSL_DEBUG_MSG(2, ("Buffer record from epoch %u",
4817 * of the next epoch as candidates for buffering. */
4818 hs->buffering.future_record.epoch = ssl->in_epoch + 1;
4825 * record from the next epoch, just ignore. */
4845 * and if the epoch matches now, load it.
5244 /* Increment epoch */
5246 MBEDTLS_SSL_DEBUG_MSG(1, ("DTLS epoch would wrap"));