/third_party/mbedtls/library/ |
H A D | ssl_client.c | 522 uint8_t cookie_len = 0; in ssl_write_client_hello_body() local 524 uint16_t cookie_len = 0; in ssl_write_client_hello_body() 530 handshake->cookie_len); in ssl_write_client_hello_body() 531 cookie_len = handshake->cookie_len; in ssl_write_client_hello_body() 534 MBEDTLS_SSL_CHK_BUF_PTR(p, end, cookie_len + 1); in ssl_write_client_hello_body() 535 *p++ = (unsigned char) cookie_len; in ssl_write_client_hello_body() 536 if (cookie_len > 0) { in ssl_write_client_hello_body() 537 memcpy(p, handshake->cookie, cookie_len); in ssl_write_client_hello_body() 538 p += cookie_len; in ssl_write_client_hello_body() [all...] |
H A D | ssl_tls13_client.c | 533 uint16_t cookie_len; in ssl_tls13_parse_cookie_ext() local 539 cookie_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_cookie_ext() 542 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, cookie_len); in ssl_tls13_parse_cookie_ext() 543 MBEDTLS_SSL_DEBUG_BUF(3, "cookie extension", p, cookie_len); in ssl_tls13_parse_cookie_ext() 546 handshake->cookie_len = 0; in ssl_tls13_parse_cookie_ext() 547 handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_tls13_parse_cookie_ext() 551 cookie_len)); in ssl_tls13_parse_cookie_ext() 555 memcpy(handshake->cookie, p, cookie_len); in ssl_tls13_parse_cookie_ext() 556 handshake->cookie_len = cookie_len; in ssl_tls13_parse_cookie_ext() [all...] |
H A D | ssl_cookie.c | 275 const unsigned char *cookie, size_t cookie_len, in mbedtls_ssl_cookie_check() 293 if (cookie_len != COOKIE_LEN) { in mbedtls_ssl_cookie_check() 274 mbedtls_ssl_cookie_check(void *p_ctx, const unsigned char *cookie, size_t cookie_len, const unsigned char *cli_id, size_t cli_id_len) mbedtls_ssl_cookie_check() argument
|
H A D | ssl_tls12_client.c | 1099 uint8_t cookie_len; in ssl_parse_hello_verify_request() local 1101 uint16_t cookie_len; in ssl_parse_hello_verify_request() local 1108 * - 1 byte of cookie_len in ssl_parse_hello_verify_request() 1142 cookie_len = *p++; in ssl_parse_hello_verify_request() 1143 if ((ssl->in_msg + ssl->in_msglen) - p < cookie_len) { in ssl_parse_hello_verify_request() 1150 MBEDTLS_SSL_DEBUG_BUF(3, "cookie", p, cookie_len); in ssl_parse_hello_verify_request() 1154 ssl->handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_parse_hello_verify_request() 1156 MBEDTLS_SSL_DEBUG_MSG(1, ("alloc failed (%d bytes)", cookie_len)); in ssl_parse_hello_verify_request() 1160 memcpy(ssl->handshake->cookie, p, cookie_len); in ssl_parse_hello_verify_request() 1161 ssl->handshake->cookie_len in ssl_parse_hello_verify_request() [all...] |
H A D | ssl_tls12_server.c | 894 size_t cookie_offset, cookie_len; in ssl_parse_client_hello() local 1207 cookie_len = buf[cookie_offset]; in ssl_parse_client_hello() 1209 if (cookie_offset + 1 + cookie_len + 2 > msg_len) { in ssl_parse_client_hello() 1217 buf + cookie_offset + 1, cookie_len); in ssl_parse_client_hello() 1226 buf + cookie_offset + 1, cookie_len, in ssl_parse_client_hello() 1238 if (cookie_len != 0) { in ssl_parse_client_hello() 1250 ciph_offset = cookie_offset + 1 + cookie_len; in ssl_parse_client_hello()
|
H A D | ssl_msg.c | 3478 size_t sid_len, cookie_len, epoch, fragment_offset; in mbedtls_ssl_check_dtls_clihlo_cookie() local 3537 cookie_len = in[60 + sid_len]; in mbedtls_ssl_check_dtls_clihlo_cookie() 3538 if (59 + 1 + sid_len + 1 + cookie_len > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie() 3539 MBEDTLS_SSL_DEBUG_MSG(4, ("check cookie: cookie_len=%u > %u", in mbedtls_ssl_check_dtls_clihlo_cookie() 3540 (unsigned) cookie_len, in mbedtls_ssl_check_dtls_clihlo_cookie() 3546 in + sid_len + 61, cookie_len); in mbedtls_ssl_check_dtls_clihlo_cookie() 3548 in + sid_len + 61, cookie_len, in mbedtls_ssl_check_dtls_clihlo_cookie() 3570 * 27-27 opaque cookie<0..2^8-1>; cookie_len = olen - 27, cookie in mbedtls_ssl_check_dtls_clihlo_cookie()
|
/third_party/node/deps/openssl/openssl/apps/include/ |
H A D | s_apps.h | 49 unsigned int *cookie_len); 51 unsigned int cookie_len); 59 size_t *cookie_len); 61 size_t cookie_len);
|
/third_party/openssl/apps/include/ |
H A D | s_apps.h | 49 unsigned int *cookie_len); 51 unsigned int cookie_len); 59 size_t *cookie_len); 61 size_t cookie_len);
|
/third_party/openssl/test/ |
H A D | dtlstest.c | 48 unsigned int *cookie_len) in generate_cookie_cb() 51 *cookie_len = sizeof(dummy_cookie); in generate_cookie_cb() 56 unsigned int cookie_len) in verify_cookie_cb() 58 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb() 47 generate_cookie_cb(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) generate_cookie_cb() argument 55 verify_cookie_cb(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) verify_cookie_cb() argument
|
H A D | dtlsv1listentest.c | 262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument 268 *cookie_len = COOKIE_LEN; in cookie_gen() 274 unsigned int cookie_len) in cookie_verify() 278 if (cookie_len != COOKIE_LEN) in cookie_verify() 273 cookie_verify(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) cookie_verify() argument
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
H A D | callbacks.rs | 448 cookie_len: *mut size_t, 461 *cookie_len = len as size_t; 475 cookie_len: size_t, 485 let slice = slice::from_raw_parts(cookie as *const c_uchar as *const u8, cookie_len); 493 cookie_len: *mut c_uint, in raw_cookie_generate() 510 *cookie_len = len as c_uint; in raw_cookie_generate() 534 cookie_len: c_uint, in raw_cookie_verify() 546 slice::from_raw_parts(cookie as *const c_uchar as *const u8, cookie_len as usize); in raw_cookie_verify()
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | s_cb.c | 755 size_t *cookie_len) in generate_stateless_cookie_callback() 801 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { in generate_stateless_cookie_callback() 815 size_t cookie_len) in verify_stateless_cookie_callback() 824 && cookie_len == resultlength in verify_stateless_cookie_callback() 832 unsigned int *cookie_len) in generate_cookie_callback() 838 *cookie_len = (unsigned int)temp; in generate_cookie_callback() 843 unsigned int cookie_len) in verify_cookie_callback() 845 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); in verify_cookie_callback() 754 generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, size_t *cookie_len) generate_stateless_cookie_callback() argument 814 verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, size_t cookie_len) verify_stateless_cookie_callback() argument 831 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) generate_cookie_callback() argument 842 verify_cookie_callback(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) verify_cookie_callback() argument
|
/third_party/openssl/apps/lib/ |
H A D | s_cb.c | 755 size_t *cookie_len) in generate_stateless_cookie_callback() 801 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { in generate_stateless_cookie_callback() 815 size_t cookie_len) in verify_stateless_cookie_callback() 824 && cookie_len == resultlength in verify_stateless_cookie_callback() 832 unsigned int *cookie_len) in generate_cookie_callback() 838 *cookie_len = (unsigned int)temp; in generate_cookie_callback() 843 unsigned int cookie_len) in verify_cookie_callback() 845 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); in verify_cookie_callback() 754 generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie, size_t *cookie_len) generate_stateless_cookie_callback() argument 814 verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie, size_t cookie_len) verify_stateless_cookie_callback() argument 831 generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) generate_cookie_callback() argument 842 verify_cookie_callback(SSL *ssl, const unsigned char *cookie, unsigned int cookie_len) verify_cookie_callback() argument
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | ssl.rs | 253 extern "C" fn(ssl: *mut SSL, cookie: *mut c_uchar, cookie_len: *mut c_uint) -> c_int, in SSL_CTX_set_cookie_generate_cb() 265 extern "C" fn(ssl: *mut SSL, cookie: *const c_uchar, cookie_len: c_uint) -> c_int, in SSL_CTX_set_cookie_verify_cb() 273 cb: Option<extern "C" fn(ssl: *mut SSL, cookie: *mut c_uchar, cookie_len: c_uint) -> c_int>, in SSL_CTX_set_cookie_verify_cb() 287 cookie_len: *mut size_t, in SSL_CTX_set_stateless_cookie_generate_cb() 298 cookie_len: size_t, in SSL_CTX_set_stateless_cookie_verify_cb()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1229 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello() 1231 s->d1->cookie_len)) { in tls_construct_client_hello() 1288 size_t cookie_len; in dtls_process_hello_verify() local 1297 cookie_len = PACKET_remaining(&cookiepkt); in dtls_process_hello_verify() 1298 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify() 1303 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify() 1307 s->d1->cookie_len = cookie_len; in dtls_process_hello_verify()
|
H A D | statem_srvr.c | 1289 size_t cookie_len) in dtls_raw_hello_verify_request() 1293 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request() 1309 s->d1->cookie_len = cookie_leni; in dtls_construct_hello_verify_request() 1312 s->d1->cookie_len)) { in dtls_construct_hello_verify_request() 1699 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len in tls_early_post_process_client_hello() 1701 s->d1->cookie_len) != 0) { in tls_early_post_process_client_hello() 1288 dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie, size_t cookie_len) dtls_raw_hello_verify_request() argument
|
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1221 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello() 1223 s->d1->cookie_len)) { in tls_construct_client_hello() 1280 size_t cookie_len; in dtls_process_hello_verify() local 1289 cookie_len = PACKET_remaining(&cookiepkt); in dtls_process_hello_verify() 1290 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify() 1295 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify() 1299 s->d1->cookie_len = cookie_len; in dtls_process_hello_verify()
|
H A D | statem_srvr.c | 1278 size_t cookie_len) in dtls_raw_hello_verify_request() 1282 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request() 1298 s->d1->cookie_len = cookie_leni; in dtls_construct_hello_verify_request() 1301 s->d1->cookie_len)) { in dtls_construct_hello_verify_request() 1679 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len in tls_early_post_process_client_hello() 1681 s->d1->cookie_len) != 0) { in tls_early_post_process_client_hello() 1277 dtls_raw_hello_verify_request(WPACKET *pkt, unsigned char *cookie, size_t cookie_len) dtls_raw_hello_verify_request() argument
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_sess.c | 1344 unsigned int *cookie_len)) in SSL_CTX_set_cookie_generate_cb() 1352 unsigned int cookie_len)) in SSL_CTX_set_cookie_verify_cb() 1384 size_t *cookie_len)) in SSL_CTX_set_stateless_cookie_generate_cb() 1393 size_t cookie_len)) in SSL_CTX_set_stateless_cookie_verify_cb() 1341 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) SSL_CTX_set_cookie_generate_cb() argument 1349 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, unsigned int cookie_len)) SSL_CTX_set_cookie_verify_cb() argument 1380 SSL_CTX_set_stateless_cookie_generate_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, size_t *cookie_len)) SSL_CTX_set_stateless_cookie_generate_cb() argument 1389 SSL_CTX_set_stateless_cookie_verify_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, size_t cookie_len)) SSL_CTX_set_stateless_cookie_verify_cb() argument
|
H A D | d1_lib.c | 86 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new() 197 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
|
H A D | ssl_local.h | 938 unsigned int *cookie_len); 942 unsigned int cookie_len); 946 size_t *cookie_len); 950 size_t cookie_len); 1958 size_t cookie_len; member 2630 size_t cookie_len);
|
/third_party/openssl/ssl/ |
H A D | ssl_sess.c | 1378 unsigned int *cookie_len)) in SSL_CTX_set_cookie_generate_cb() 1386 unsigned int cookie_len)) in SSL_CTX_set_cookie_verify_cb() 1418 size_t *cookie_len)) in SSL_CTX_set_stateless_cookie_generate_cb() 1427 size_t cookie_len)) in SSL_CTX_set_stateless_cookie_verify_cb() 1375 SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)) SSL_CTX_set_cookie_generate_cb() argument 1383 SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, unsigned int cookie_len)) SSL_CTX_set_cookie_verify_cb() argument 1414 SSL_CTX_set_stateless_cookie_generate_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, unsigned char *cookie, size_t *cookie_len)) SSL_CTX_set_stateless_cookie_generate_cb() argument 1423 SSL_CTX_set_stateless_cookie_verify_cb( SSL_CTX *ctx, int (*cb) (SSL *ssl, const unsigned char *cookie, size_t cookie_len)) SSL_CTX_set_stateless_cookie_verify_cb() argument
|
H A D | d1_lib.c | 86 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new() 180 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
|
H A D | ssl_local.h | 929 unsigned int *cookie_len); 933 unsigned int cookie_len); 937 size_t *cookie_len); 941 size_t cookie_len); 1902 size_t cookie_len; member 2574 size_t cookie_len);
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | ssl.h | 746 *cookie_len)); 752 cookie_len)); 758 size_t *cookie_len)); 763 size_t cookie_len));
|