/openssl/util/perl/TLSProxy/ |
H A D | HelloVerifyRequest.pm | 44 $self->{cookie_len} = 0; 56 my $cookie_len = unpack('C', substr($self->data, $ptr)); 58 my $cookie = substr($self->data, $ptr, $cookie_len); 61 $self->cookie_len($cookie_len); 67 print " Cookie Len:".$cookie_len."\n"; 84 $data .= pack('C', $self->cookie_len); 99 sub cookie_len subroutine 103 $self->{cookie_len} = shift; 105 return $self->{cookie_len};
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 19 size_t *cookie_len)); 24 size_t cookie_len)); 31 *cookie_len)); 37 cookie_len)); 46 of bytes written to B<cookie_len>. If a cookie cannot be generated, a zero 52 length B<cookie_len>. A nonzero return value from verify_stateless_cookie_cb() 61 B<cookie>, and must write the number of bytes written to B<cookie_len>. If a 67 pointed to by B<cookie> and is of length B<cookie_len>. A nonzero return value
|
/openssl/test/ |
H A D | dtlsv1listentest.c | 262 static int cookie_gen(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) in cookie_gen() argument 268 *cookie_len = COOKIE_LEN; in cookie_gen() 274 unsigned int cookie_len) in cookie_verify() argument 278 if (cookie_len != COOKIE_LEN) in cookie_verify()
|
H A D | dtlstest.c | 48 unsigned int *cookie_len) in generate_cookie_cb() argument 51 *cookie_len = sizeof(dummy_cookie); in generate_cookie_cb() 56 unsigned int cookie_len) in verify_cookie_cb() argument 58 return TEST_mem_eq(cookie, cookie_len, dummy_cookie, sizeof(dummy_cookie)); in verify_cookie_cb()
|
H A D | sslapitest.c | 5847 unsigned int *cookie_len) in generate_cookie_callback() argument 5854 *cookie_len = sizeof(cookie_magic_value) - 1; in generate_cookie_callback() 5860 unsigned int cookie_len) in verify_cookie_callback() argument 5862 if (cookie_len == sizeof(cookie_magic_value) - 1 in verify_cookie_callback() 5863 && memcmp(cookie, cookie_magic_value, cookie_len) == 0) in verify_cookie_callback() 5870 size_t *cookie_len) in generate_stateless_cookie_callback() argument 5874 *cookie_len = temp; in generate_stateless_cookie_callback() 5879 size_t cookie_len) in verify_stateless_cookie_callback() argument 5881 return verify_cookie_callback(ssl, cookie, cookie_len); in verify_stateless_cookie_callback()
|
/openssl/apps/include/ |
H A D | s_apps.h | 54 unsigned int *cookie_len); 56 unsigned int cookie_len); 64 size_t *cookie_len); 66 size_t cookie_len);
|
/openssl/apps/lib/ |
H A D | s_cb.c | 834 size_t *cookie_len) in generate_stateless_cookie_callback() argument 880 cookie, DTLS1_COOKIE_LENGTH, cookie_len) == NULL) { in generate_stateless_cookie_callback() 894 size_t cookie_len) in verify_stateless_cookie_callback() argument 903 && cookie_len == resultlength in verify_stateless_cookie_callback() 911 unsigned int *cookie_len) in generate_cookie_callback() argument 917 *cookie_len = (unsigned int)temp; in generate_cookie_callback() 922 unsigned int cookie_len) in verify_cookie_callback() argument 924 return verify_stateless_cookie_callback(ssl, cookie, cookie_len); in verify_cookie_callback()
|
/openssl/ssl/ |
H A D | ssl_sess.c | 1406 unsigned int *cookie_len)) in SSL_CTX_set_cookie_generate_cb() argument 1414 unsigned int cookie_len)) in SSL_CTX_set_cookie_verify_cb() argument 1446 size_t *cookie_len)) in SSL_CTX_set_stateless_cookie_generate_cb() argument 1455 size_t cookie_len)) in SSL_CTX_set_stateless_cookie_verify_cb() argument
|
H A D | d1_lib.c | 87 d1->cookie_len = sizeof(s->d1->cookie); in dtls1_new() 202 s->d1->cookie_len = sizeof(s->d1->cookie); in dtls1_clear()
|
H A D | ssl_local.h | 878 unsigned int *cookie_len); 882 unsigned int cookie_len); 886 size_t *cookie_len); 890 size_t cookie_len); 1924 size_t cookie_len; member 2701 size_t cookie_len);
|
/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1293 if (s->d1->cookie_len > sizeof(s->d1->cookie) in tls_construct_client_hello() 1295 s->d1->cookie_len)) { in tls_construct_client_hello() 1354 size_t cookie_len; in dtls_process_hello_verify() local 1363 cookie_len = PACKET_remaining(&cookiepkt); in dtls_process_hello_verify() 1364 if (cookie_len > sizeof(s->d1->cookie)) { in dtls_process_hello_verify() 1369 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { in dtls_process_hello_verify() 1373 s->d1->cookie_len = cookie_len; in dtls_process_hello_verify()
|
H A D | statem_srvr.c | 1369 size_t cookie_len) in dtls_raw_hello_verify_request() argument 1373 || !WPACKET_sub_memcpy_u8(pkt, cookie, cookie_len)) in dtls_raw_hello_verify_request() 1392 s->d1->cookie_len = cookie_leni; in dtls_construct_hello_verify_request() 1395 s->d1->cookie_len)) { in dtls_construct_hello_verify_request() 1769 } else if (s->d1->cookie_len != clienthello->dtls_cookie_len in tls_early_post_process_client_hello() 1771 s->d1->cookie_len) != 0) { in tls_early_post_process_client_hello()
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 758 *cookie_len)); 764 cookie_len)); 770 size_t *cookie_len)); 775 size_t cookie_len));
|