Home
last modified time | relevance | path

Searched refs:id_len (Results 1 – 11 of 11) sorted by relevance

/net-tools-2.7.6/mbedtls-2.4.0/library/
Dssl_cache.c88 session->id_len != entry->session.id_len ) in mbedtls_ssl_cache_get()
92 entry->session.id_len ) != 0 ) in mbedtls_ssl_cache_get()
169 if( memcmp( session->id, cur->session.id, cur->session.id_len ) == 0 ) in mbedtls_ssl_cache_set()
Decjpake.c191 const size_t id_len = strlen( id ); in ecjpake_hash() local
202 *p++ = (unsigned char)( ( id_len >> 24 ) & 0xFF ); in ecjpake_hash()
203 *p++ = (unsigned char)( ( id_len >> 16 ) & 0xFF ); in ecjpake_hash()
204 *p++ = (unsigned char)( ( id_len >> 8 ) & 0xFF ); in ecjpake_hash()
205 *p++ = (unsigned char)( ( id_len ) & 0xFF ); in ecjpake_hash()
207 if( end < p || (size_t)( end - p ) < id_len ) in ecjpake_hash()
210 memcpy( p, id, id_len ); in ecjpake_hash()
211 p += id_len; in ecjpake_hash()
Dssl_srv.c492 session.id_len = ssl->session_negotiate->id_len; in ssl_parse_session_ticket_ext()
493 memcpy( &session.id, ssl->session_negotiate->id, session.id_len ); in ssl_parse_session_ticket_ext()
942 ssl->session_negotiate->id_len = sess_len;
945 memcpy( ssl->session_negotiate->id, p, ssl->session_negotiate->id_len );
1391 ssl->session_negotiate->id_len = sess_len;
1395 ssl->session_negotiate->id_len );
2294 ssl->session_negotiate->id_len != 0 &&
2317 ssl->session_negotiate->id_len = n = 0;
2323 ssl->session_negotiate->id_len = n = 32;
2334 n = ssl->session_negotiate->id_len;
[all …]
Dssl_cli.c779 n = ssl->session_negotiate->id_len;
807 ssl->session_negotiate->id_len = n = 32;
1598 ssl->session_negotiate->id_len != n ||
1608 ssl->session_negotiate->id_len = n;
3261 ssl->session_negotiate->id_len = 0;
Dssl_tls.c5000 ssl->session->id_len != 0 && in mbedtls_ssl_handshake_wrapup()
/net-tools-2.7.6/tinydtls-0.8.2/tests/
Ddtls-client.c108 const unsigned char *id, size_t id_len, in get_psk_info() argument
113 if (id_len) { in get_psk_info()
114 dtls_debug("got psk_identity_hint: '%.*s'\n", id_len, id); in get_psk_info()
125 if (id_len != psk_id_length || memcmp(psk_id, id, id_len) != 0) { in get_psk_info()
Ddtls-server.c56 const unsigned char *id, size_t id_len, in get_psk_info() argument
80 if (id_len == psk[i].id_length && memcmp(id, psk[i].id, id_len) == 0) { in get_psk_info()
/net-tools-2.7.6/tinydtls-0.8.2/examples/contiki/
Ddtls-server.c122 const unsigned char *id, size_t id_len, in get_psk_info() argument
146 if (id_len == psk[i].id_length && memcmp(id, psk[i].id, id_len) == 0) { in get_psk_info()
Ddtls-client.c150 const unsigned char *id, size_t id_len, in get_psk_info() argument
163 if (id_len != psk_id_length || memcmp(psk_id, id, id_len) != 0) { in get_psk_info()
/net-tools-2.7.6/
Dcoap-client.c531 const unsigned char *id, size_t id_len, in get_psk_info() argument
536 if (id_len) { in get_psk_info()
537 dtls_debug("got psk_identity_hint: '%.*s'\n", id_len, in get_psk_info()
550 if (id_len != psk_id_length || memcmp(psk_id, id, id_len) != 0) { in get_psk_info()
/net-tools-2.7.6/mbedtls-2.4.0/include/mbedtls/
Dssl.h551 size_t id_len; /*!< session id length */ member