Searched refs:serialize (Results 1 – 7 of 7) sorted by relevance
537 int serialize; /* serialize/deserialize connection */ member980 opt.serialize = DFL_SERIALIZE; in main()1401 opt.serialize = atoi(q); in main()1402 if (opt.serialize < 0 || opt.serialize > 2) { in main()2800 if (opt.serialize != 0) { in main()2876 if (opt.serialize == 1) { in main()2881 if (opt.serialize == 2) { in main()
692 int serialize; /* serialize/deserialize connection */ member1767 opt.serialize = DFL_SERIALIZE; in main()2260 opt.serialize = atoi(q); in main()2261 if (opt.serialize < 0 || opt.serialize > 2) { in main()4002 if (opt.serialize != 0) { in main()4085 if (opt.serialize == 1) { in main()4098 if (opt.serialize == 2) { in main()
107 int serialize; member
34 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message1.hex(), sig1.hex(), public_key.serialize(…48 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message2.hex(), sig2.hex(), public_key.serialize(…
2208 /* Allocate second buffer and serialize to it */2401 * de-serialize the session - double-check that. */2740 options.serialize = 1;2813 int serialize, int dtls, char *cipher)2822 options.serialize = serialize;
2210 if (options->serialize == 1) { in mbedtls_test_ssl_perform_handshake()
989 via `mbedtls_ssl_session_save()`, export and serialize