Searched refs:cookie (Results 1 – 10 of 10) sorted by relevance
/mbedtls-latest/library/ |
D | ssl_cookie.c | 279 const unsigned char *cookie, size_t cookie_len, in mbedtls_ssl_cookie_check() argument 309 status = psa_mac_update(&operation, cookie, 4); in mbedtls_ssl_cookie_check() 322 status = psa_mac_verify_finish(&operation, cookie + 4, in mbedtls_ssl_cookie_check() 337 if (ssl_cookie_hmac(&ctx->hmac_ctx, cookie, in mbedtls_ssl_cookie_check() 354 if (mbedtls_ct_memcmp(cookie + 4, ref_hmac, sizeof(ref_hmac)) != 0) { in mbedtls_ssl_cookie_check() 366 cookie_time = (unsigned long) MBEDTLS_GET_UINT32_BE(cookie, 0); in mbedtls_ssl_cookie_check()
|
D | ssl_client.c | 527 if (handshake->cookie != NULL) { in ssl_write_client_hello_body() 529 handshake->cookie, in ssl_write_client_hello_body() 537 memcpy(p, handshake->cookie, cookie_len); in ssl_write_client_hello_body() 792 (ssl->handshake->cookie == NULL)) in ssl_prepare_client_hello()
|
D | ssl_tls13_client.c | 545 mbedtls_free(handshake->cookie); in ssl_tls13_parse_cookie_ext() 547 handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_tls13_parse_cookie_ext() 548 if (handshake->cookie == NULL) { in ssl_tls13_parse_cookie_ext() 555 memcpy(handshake->cookie, p, cookie_len); in ssl_tls13_parse_cookie_ext() 571 if (handshake->cookie == NULL) { in ssl_tls13_write_cookie_ext() 577 handshake->cookie, in ssl_tls13_write_cookie_ext() 590 memcpy(p, handshake->cookie, handshake->cookie_len); in ssl_tls13_write_cookie_ext()
|
D | ssl_tls12_client.c | 1154 mbedtls_free(ssl->handshake->cookie); in ssl_parse_hello_verify_request() 1156 ssl->handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_parse_hello_verify_request() 1157 if (ssl->handshake->cookie == NULL) { in ssl_parse_hello_verify_request() 1162 memcpy(ssl->handshake->cookie, p, cookie_len); in ssl_parse_hello_verify_request() 1241 mbedtls_free(ssl->handshake->cookie); in ssl_parse_server_hello() 1242 ssl->handshake->cookie = NULL; in ssl_parse_server_hello()
|
D | ssl_misc.h | 866 unsigned char *cookie; /*!< HelloVerifyRequest cookie for DTLS member
|
D | ssl_tls.c | 1287 const unsigned char *cookie, size_t cookie_len, in ssl_cookie_check_dummy() argument 1291 ((void) cookie); in ssl_cookie_check_dummy() 4882 mbedtls_free(handshake->cookie); in mbedtls_ssl_handshake_free()
|
/mbedtls-latest/include/mbedtls/ |
D | ssl.h | 2994 const unsigned char *cookie, size_t clen,
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 54 | cookie | no |
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ssl.function | 3168 void cookie_parsing(data_t *cookie, int exp_ret) 3187 cookie->x, cookie->len,
|
/mbedtls-latest/ |
D | ChangeLog | 1338 and possibly up to 571 bytes with a custom cookie check function. 4497 connection, if cookie verification is available 4498 (MBEDTLS_SSL_DTLS_HELLO_VERIFY defined in config.h, and usable cookie
|