Lines Matching defs:end

58     const uint8_t *cur, const uint8_t *end, size_t need)
61 chk_buf_ptr_fail_args.end = end;
73 (chk_buf_ptr_fail_args.end != args->end) ||
1273 unsigned char **p, unsigned char *end,
1278 ((void) end);
1860 /* Update head if the list was null, else add to the end */
3442 * Peer's end-entity certificate
3556 const unsigned char * const end = buf + len;
3562 if (8 > (size_t) (end - p)) {
3575 if (1 + 32 + 48 + 4 > (size_t) (end - p)) {
3607 /* Deserialize CRT from the end of the ticket. */
3608 if (3 > (size_t) (end - p)) {
3618 if (cert_len > (size_t) (end - p)) {
3641 /* Deserialize CRT digest from the end of the ticket. */
3642 if (2 > (size_t) (end - p)) {
3659 if (session->peer_cert_digest_len > (size_t) (end - p)) {
3682 if (3 > (size_t) (end - p)) {
3690 if (session->ticket_len > (size_t) (end - p)) {
3703 if (4 > (size_t) (end - p)) {
3713 if (8 > (size_t) (end - p)) {
3726 if (1 > (size_t) (end - p)) {
3734 if (1 > (size_t) (end - p)) {
3742 if (p != end) {
3905 const unsigned char *end = buf + len;
3907 if (end - p < 6) {
3917 if (end - p < session->resumption_key_len) {
3928 if (end - p < 4) {
3935 if (end - p < 2) {
3945 if (end - p < 8) {
3955 if (end - p < 2) {
3962 if (end - p < (long int) alpn_len) {
3982 if (end - p < 2) {
3988 if (end - p < (long int) hostname_len) {
4002 if (end - p < 8) {
4008 if (end - p < 4) {
4014 if (end - p < 2) {
4020 if (end - p < (long int) session->ticket_len) {
4390 const unsigned char * const end = buf + len;
4403 if ((size_t) (end - p) < sizeof(ssl_serialized_session_header)) {
4417 if (4 > (size_t) (end - p)) {
4426 remaining_len = (size_t) (end - p);
5239 const unsigned char * const end = buf + len;
5277 if ((size_t) (end - p) < sizeof(ssl_serialized_context_header)) {
5290 if ((size_t) (end - p) < 4) {
5304 if ((size_t) (end - p) < session_len) {
5336 if ((size_t) (end - p) < sizeof(ssl->transform->randbytes)) {
5359 if ((size_t) (end - p) < 1) {
5365 if ((size_t) (end - p) < ssl->transform->in_cid_len + 1u) {
5374 if ((size_t) (end - p) < ssl->transform->out_cid_len) {
5385 if ((size_t) (end - p) < 4) {
5393 if ((size_t) (end - p) < 16) {
5405 if ((size_t) (end - p) < 1) {
5412 if ((size_t) (end - p) < sizeof(ssl->cur_out_ctr)) {
5419 if ((size_t) (end - p) < 2) {
5432 if ((size_t) (end - p) < 1) {
5476 * which we don't want - otherwise we'd end up freeing the wrong transform
5488 if (p != end) {
6613 const unsigned char *end)
6621 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, 2);
6628 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, supported_sig_algs_len);
6654 if (p != end) {
7392 unsigned char *end = p + sizeof(ssl->handshake->premaster);
7420 if (end - p < 2) {
7427 if (end < p || (size_t) (end - p) < psk_len) {
7441 if (end - p < 2) {
7457 p + 2, (size_t) (end - (p + 2)), &len,
7474 p + 2, (size_t) (end - (p + 2)),
7493 if (end - p < 2) {
7500 if (end < p || (size_t) (end - p) < psk_len) {
7816 * end-CRTs hasn't changed compared to the initial handshake,
7818 * the original end-CRT instead of parsing it again. */
8126 /* Remember digest of the peer's end-CRT. */
8156 unsigned char *end = start + len;
8161 ret = mbedtls_pk_parse_subpubkey(&start, end,
8601 /* The loop goes to its end iff the counter is wrapping */
8875 goto end;
9000 goto end;
9042 goto end;
9094 goto end;
9121 goto end;
9132 goto end;
9139 goto end;
9145 goto end;
9152 goto end;
9159 goto end;
9167 goto end;
9173 goto end;
9195 goto end;
9216 goto end;
9221 goto end;
9225 goto end;
9234 end:
9585 const unsigned char *end, size_t *out_len)
9600 MBEDTLS_SSL_CHK_BUF_PTR(p, end, 6);
9619 MBEDTLS_SSL_CHK_BUF_PTR(p, end, 2);
9672 const unsigned char *end)
9681 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, 2);
9685 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, server_name_list_len);
9695 * ClientHello message (it is reset to NULL before the end of
9726 const unsigned char *end)
9753 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, 4);
9757 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, protocol_name_list_len);
9801 unsigned char *end,
9813 MBEDTLS_SSL_CHK_BUF_PTR(p, end, 7 + protocol_name_len);