Searched refs:serialize (Results 1 – 7 of 7) sorted by relevance
540 int serialize; /* serialize/deserialize connection */ member990 opt.serialize = DFL_SERIALIZE; in main()1416 opt.serialize = atoi(q); in main()1417 if (opt.serialize < 0 || opt.serialize > 2) { in main()2827 if (opt.serialize != 0) { in main()2903 if (opt.serialize == 1) { in main()2908 if (opt.serialize == 2) { in main()
692 int serialize; /* serialize/deserialize connection */ member1776 opt.serialize = DFL_SERIALIZE; in main()2269 opt.serialize = atoi(q); in main()2270 if (opt.serialize < 0 || opt.serialize > 2) { in main()4012 if (opt.serialize != 0) { in main()4095 if (opt.serialize == 1) { in main()4108 if (opt.serialize == 2) { in main()
107 int serialize; member
34 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message1.hex(), sig1.hex(), public_key.serialize(…48 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message2.hex(), sig2.hex(), public_key.serialize(…
2221 /* Allocate second buffer and serialize to it */2414 * de-serialize the session - double-check that. */2753 options.serialize = 1;2826 int serialize, int dtls, char *cipher)2835 options.serialize = serialize;
2229 if (options->serialize == 1) { in mbedtls_test_ssl_perform_handshake()
989 via `mbedtls_ssl_session_save()`, export and serialize