/openthread-latest/third_party/mbedtls/repo/library/ |
D | ssl_cookie.c | 275 const unsigned char *cookie, size_t cookie_len, in mbedtls_ssl_cookie_check() argument 305 status = psa_mac_update(&operation, cookie, 4); in mbedtls_ssl_cookie_check() 318 status = psa_mac_verify_finish(&operation, cookie + 4, in mbedtls_ssl_cookie_check() 333 if (ssl_cookie_hmac(&ctx->hmac_ctx, cookie, in mbedtls_ssl_cookie_check() 350 if (mbedtls_ct_memcmp(cookie + 4, ref_hmac, sizeof(ref_hmac)) != 0) { in mbedtls_ssl_cookie_check() 362 cookie_time = (unsigned long) MBEDTLS_GET_UINT32_BE(cookie, 0); in mbedtls_ssl_cookie_check()
|
D | ssl_client.c | 527 if (handshake->cookie != NULL) { in ssl_write_client_hello_body() 529 handshake->cookie, in ssl_write_client_hello_body() 537 memcpy(p, handshake->cookie, cookie_len); in ssl_write_client_hello_body() 792 (ssl->handshake->cookie == NULL)) in ssl_prepare_client_hello()
|
D | ssl_tls13_client.c | 545 mbedtls_free(handshake->cookie); in ssl_tls13_parse_cookie_ext() 547 handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_tls13_parse_cookie_ext() 548 if (handshake->cookie == NULL) { in ssl_tls13_parse_cookie_ext() 555 memcpy(handshake->cookie, p, cookie_len); in ssl_tls13_parse_cookie_ext() 571 if (handshake->cookie == NULL) { in ssl_tls13_write_cookie_ext() 577 handshake->cookie, in ssl_tls13_write_cookie_ext() 590 memcpy(p, handshake->cookie, handshake->cookie_len); in ssl_tls13_write_cookie_ext()
|
D | ssl_tls12_client.c | 1152 mbedtls_free(ssl->handshake->cookie); in ssl_parse_hello_verify_request() 1154 ssl->handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_parse_hello_verify_request() 1155 if (ssl->handshake->cookie == NULL) { in ssl_parse_hello_verify_request() 1160 memcpy(ssl->handshake->cookie, p, cookie_len); in ssl_parse_hello_verify_request() 1239 mbedtls_free(ssl->handshake->cookie); in ssl_parse_server_hello() 1240 ssl->handshake->cookie = NULL; in ssl_parse_server_hello()
|
D | ssl_misc.h | 866 unsigned char *cookie; /*!< HelloVerifyRequest cookie for DTLS member
|
D | ssl_tls.c | 1287 const unsigned char *cookie, size_t cookie_len, in ssl_cookie_check_dummy() argument 1291 ((void) cookie); in ssl_cookie_check_dummy() 4882 mbedtls_free(handshake->cookie); in mbedtls_ssl_handshake_free()
|
/openthread-latest/tests/scripts/thread-cert/ |
D | dtls.py | 372 cookie, argument 380 self.cookie = cookie 387 … self.cookie.to_bytes() + self.cipher_suites.to_bytes() + self.compression_methods.to_bytes() + 395 cookie = VariableVector.from_bytes(Opaque, (0, 2**8 - 1), data) 405 cookie, 414 def __init__(self, server_version, cookie): argument 416 self.cookie = cookie 419 return self.server_version.to_bytes() + self.cookie.to_bytes() 424 cookie = VariableVector.from_bytes(Opaque, (0, 2**8 - 1), data) 425 return cls(server_version, cookie)
|
D | Cert_8_1_02_Commissioning.py | 93 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None) 98 lambda p: p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie)
|
D | Cert_8_1_06_Commissioning.py | 153 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None) 163 p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie
|
D | Cert_8_1_01_Commissioning.py | 185 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None) 195 p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie
|
/openthread-latest/third_party/tcplp/bsdtcp/ |
D | tcp_fastopen.c | 590 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) 597 SipHash_Update(&ctx, cookie, cookie_len); 646 tcp_fastopen_check_cookie(struct tcpcb* tp, uint8_t *cookie, in tcp_fastopen_check_cookie() argument 694 rv = tcp_fastopen_find_cookie_match_locked(cookie, &cur_cookie); in tcp_fastopen_check_cookie() 953 cce->cookie, cce->cookie_len); in tcp_fastopen_connect() 956 memcpy(tp->t_tfo_cookie.client, cce->cookie, in tcp_fastopen_connect() 1050 uint8_t cookie_len, uint8_t *cookie) in tcp_fastopen_update_cache() argument 1064 memcpy(cce->cookie, cookie, cookie_len); in tcp_fastopen_update_cache() 1078 tcp_fastopen_ccache_create(ccb, inc, mss, cookie_len, cookie); in tcp_fastopen_update_cache() 1124 struct in_conninfo *inc, uint16_t mss, uint8_t cookie_len, uint8_t *cookie) [all …]
|
D | tcp_fastopen.h | 64 uint8_t cookie[TCP_FASTOPEN_MAX_COOKIE_LEN];
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | ssl.h | 2988 const unsigned char *cookie, size_t clen,
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
D | tls13-support.md | 54 | cookie | no |
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ssl.function | 3155 void cookie_parsing(data_t *cookie, int exp_ret) 3174 cookie->x, cookie->len,
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 1143 and possibly up to 571 bytes with a custom cookie check function. 4302 connection, if cookie verification is available 4303 (MBEDTLS_SSL_DTLS_HELLO_VERIFY defined in config.h, and usable cookie
|