Lines Matching refs:end
1592 * (At the end because we need information from the EC-based extensions
1694 const unsigned char *end = ssl->out_msg + MBEDTLS_SSL_OUT_CONTENT_LEN;
1706 if (end < p || (size_t) (end - p) < (unsigned) (ssl->own_cid_len + 5)) {
1929 const unsigned char *end = ssl->out_msg + MBEDTLS_SSL_OUT_CONTENT_LEN;
1942 if (end - p < 4) {
1952 p + 2, (size_t) (end - p - 2), &kkpp_len,
1962 p + 2, (size_t) (end - p - 2), &kkpp_len,
1984 const unsigned char *end = ssl->out_msg + MBEDTLS_SSL_OUT_CONTENT_LEN;
2007 if ((size_t) (end - buf) < mki_len + 9) {
2361 unsigned char *end = buf + MBEDTLS_SSL_OUT_CONTENT_LEN - 4;
2362 if ((ret = mbedtls_ssl_write_alpn_ext(ssl, p + 2 + ext_len, end, &olen))
2422 const unsigned char * const end = ssl->out_msg + MBEDTLS_SSL_OUT_CONTENT_LEN;
2555 if (end < p || (size_t) (end - p) < 2 + (size_t) dn_size) {
3268 * ServerKeyExchange, so end here. */
3376 const unsigned char *end)
3384 if (*p + 2 > end) {
3392 if (*p + n > end) {
3435 const unsigned char *end,
3464 if (p + 2 > end) {
3474 if (p + len != end) {
3521 const unsigned char *end,
3533 * matter in the end because diff will be nonzero in that case due to
3541 ret = ssl_decrypt_encrypted_pms(ssl, p, end,
3565 * must not cause the connection to end immediately; instead, send a
3604 const unsigned char *end)
3617 if (end - *p < 2) {
3625 if (n == 0 || n > end - *p) {
3661 unsigned char *p, *end;
3685 end = ssl->in_msg + ssl->in_hslen;
3699 if ((ret = ssl_parse_client_dh_public(ssl, &p, end)) != 0) {
3704 if (p != end) {
3731 size_t buf_len = (size_t) (end - p);
3792 p, (size_t) (end - p))) != 0) {
3819 if ((ret = ssl_parse_client_psk_identity(ssl, &p, end)) != 0) {
3824 if (p != end) {
3852 if ((ret = ssl_parse_client_psk_identity(ssl, &p, end)) != 0) {
3857 if ((ret = ssl_parse_encrypted_pms(ssl, p, end, 2)) != 0) {
3874 if ((ret = ssl_parse_client_psk_identity(ssl, &p, end)) != 0) {
3878 if ((ret = ssl_parse_client_dh_public(ssl, &p, end)) != 0) {
3883 if (p != end) {
3923 if ((ret = ssl_parse_client_psk_identity(ssl, &p, end)) != 0) {
3931 if (p >= end) {
3938 if ((size_t) (end - p) < ecpoint_len) {
3999 if ((ret = ssl_parse_client_psk_identity(ssl, &p, end)) != 0) {
4005 p, (size_t) (end - p))) != 0) {
4024 if ((ret = ssl_parse_encrypted_pms(ssl, p, end, 0)) != 0) {
4034 &ssl->handshake->psa_pake_ctx, p, (size_t) (end - p),
4044 p, (size_t) (end - p));