| /openthread-latest/third_party/tcplp/bsdtcp/ |
| D | tcp_fastopen.c | 590 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) 597 SipHash_Update(&ctx, cookie, cookie_len); 947 if ((cce->cookie_len > 0) && in tcp_fastopen_connect() 953 cce->cookie, cce->cookie_len); in tcp_fastopen_connect() 955 tp->t_tfo_client_cookie_len = cce->cookie_len; in tcp_fastopen_connect() 957 cce->cookie_len); in tcp_fastopen_connect() 986 cce->cookie_len = 0; in tcp_fastopen_connect() 1032 cce->cookie_len = 0; in tcp_fastopen_disable_path() 1050 uint8_t cookie_len, uint8_t *cookie) in tcp_fastopen_update_cache() argument 1059 if ((cookie_len >= TCP_FASTOPEN_MIN_COOKIE_LEN) && in tcp_fastopen_update_cache() [all …]
|
| D | tcp_fastopen.h | 63 uint8_t cookie_len;
|
| /openthread-latest/third_party/mbedtls/repo/library/ |
| D | ssl_client.c | 522 uint8_t cookie_len = 0; in ssl_write_client_hello_body() local 524 uint16_t cookie_len = 0; in ssl_write_client_hello_body() 530 handshake->cookie_len); in ssl_write_client_hello_body() 531 cookie_len = handshake->cookie_len; in ssl_write_client_hello_body() 534 MBEDTLS_SSL_CHK_BUF_PTR(p, end, cookie_len + 1); in ssl_write_client_hello_body() 535 *p++ = (unsigned char) cookie_len; in ssl_write_client_hello_body() 536 if (cookie_len > 0) { in ssl_write_client_hello_body() 537 memcpy(p, handshake->cookie, cookie_len); in ssl_write_client_hello_body() 538 p += cookie_len; in ssl_write_client_hello_body()
|
| D | ssl_tls13_client.c | 533 uint16_t cookie_len; in ssl_tls13_parse_cookie_ext() local 539 cookie_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_cookie_ext() 542 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, cookie_len); in ssl_tls13_parse_cookie_ext() 543 MBEDTLS_SSL_DEBUG_BUF(3, "cookie extension", p, cookie_len); in ssl_tls13_parse_cookie_ext() 546 handshake->cookie_len = 0; in ssl_tls13_parse_cookie_ext() 547 handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_tls13_parse_cookie_ext() 551 cookie_len)); in ssl_tls13_parse_cookie_ext() 555 memcpy(handshake->cookie, p, cookie_len); in ssl_tls13_parse_cookie_ext() 556 handshake->cookie_len = cookie_len; in ssl_tls13_parse_cookie_ext() 578 handshake->cookie_len); in ssl_tls13_write_cookie_ext() [all …]
|
| D | ssl_cookie.c | 275 const unsigned char *cookie, size_t cookie_len, in mbedtls_ssl_cookie_check() argument 293 if (cookie_len != COOKIE_LEN) { in mbedtls_ssl_cookie_check()
|
| D | ssl_tls12_client.c | 1099 uint8_t cookie_len; in ssl_parse_hello_verify_request() local 1101 uint16_t cookie_len; in ssl_parse_hello_verify_request() local 1142 cookie_len = *p++; in ssl_parse_hello_verify_request() 1143 if ((ssl->in_msg + ssl->in_msglen) - p < cookie_len) { in ssl_parse_hello_verify_request() 1150 MBEDTLS_SSL_DEBUG_BUF(3, "cookie", p, cookie_len); in ssl_parse_hello_verify_request() 1154 ssl->handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_parse_hello_verify_request() 1156 MBEDTLS_SSL_DEBUG_MSG(1, ("alloc failed (%d bytes)", cookie_len)); in ssl_parse_hello_verify_request() 1160 memcpy(ssl->handshake->cookie, p, cookie_len); in ssl_parse_hello_verify_request() 1161 ssl->handshake->cookie_len = cookie_len; in ssl_parse_hello_verify_request() 1241 ssl->handshake->cookie_len = 0; in ssl_parse_server_hello()
|
| D | ssl_tls12_server.c | 894 size_t cookie_offset, cookie_len; in ssl_parse_client_hello() local 1207 cookie_len = buf[cookie_offset]; in ssl_parse_client_hello() 1209 if (cookie_offset + 1 + cookie_len + 2 > msg_len) { in ssl_parse_client_hello() 1217 buf + cookie_offset + 1, cookie_len); in ssl_parse_client_hello() 1226 buf + cookie_offset + 1, cookie_len, in ssl_parse_client_hello() 1238 if (cookie_len != 0) { in ssl_parse_client_hello() 1250 ciph_offset = cookie_offset + 1 + cookie_len; in ssl_parse_client_hello()
|
| D | ssl_misc.h | 874 uint8_t cookie_len; member 882 uint16_t cookie_len; /*!< DTLS: HelloVerifyRequest cookie length member
|
| D | ssl_msg.c | 3478 size_t sid_len, cookie_len, epoch, fragment_offset; in mbedtls_ssl_check_dtls_clihlo_cookie() local 3537 cookie_len = in[60 + sid_len]; in mbedtls_ssl_check_dtls_clihlo_cookie() 3538 if (59 + 1 + sid_len + 1 + cookie_len > in_len) { in mbedtls_ssl_check_dtls_clihlo_cookie() 3540 (unsigned) cookie_len, in mbedtls_ssl_check_dtls_clihlo_cookie() 3546 in + sid_len + 61, cookie_len); in mbedtls_ssl_check_dtls_clihlo_cookie() 3548 in + sid_len + 61, cookie_len, in mbedtls_ssl_check_dtls_clihlo_cookie()
|
| D | ssl_tls.c | 1287 const unsigned char *cookie, size_t cookie_len, in ssl_cookie_check_dummy() argument 1292 ((void) cookie_len); in ssl_cookie_check_dummy()
|
| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_ssl.data | 3253 Cookie parsing: cookie_len overflow
|