Searched refs:cookie (Results 1 – 10 of 10) sorted by relevance
| /mbedtls/library/ |
| A D | ssl_cookie.c | 275 const unsigned char *cookie, size_t cookie_len, in mbedtls_ssl_cookie_check() argument 305 status = psa_mac_update(&operation, cookie, 4); in mbedtls_ssl_cookie_check() 318 status = psa_mac_verify_finish(&operation, cookie + 4, in mbedtls_ssl_cookie_check() 333 if (ssl_cookie_hmac(&ctx->hmac_ctx, cookie, in mbedtls_ssl_cookie_check() 350 if (mbedtls_ct_memcmp(cookie + 4, ref_hmac, sizeof(ref_hmac)) != 0) { in mbedtls_ssl_cookie_check() 362 cookie_time = (unsigned long) MBEDTLS_GET_UINT32_BE(cookie, 0); in mbedtls_ssl_cookie_check()
|
| A D | ssl_client.c | 527 if (handshake->cookie != NULL) { in ssl_write_client_hello_body() 529 handshake->cookie, in ssl_write_client_hello_body() 537 memcpy(p, handshake->cookie, cookie_len); in ssl_write_client_hello_body() 792 (ssl->handshake->cookie == NULL)) in ssl_prepare_client_hello()
|
| A D | ssl_tls13_client.c | 545 mbedtls_free(handshake->cookie); in ssl_tls13_parse_cookie_ext() 547 handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_tls13_parse_cookie_ext() 548 if (handshake->cookie == NULL) { in ssl_tls13_parse_cookie_ext() 555 memcpy(handshake->cookie, p, cookie_len); in ssl_tls13_parse_cookie_ext() 571 if (handshake->cookie == NULL) { in ssl_tls13_write_cookie_ext() 577 handshake->cookie, in ssl_tls13_write_cookie_ext() 590 memcpy(p, handshake->cookie, handshake->cookie_len); in ssl_tls13_write_cookie_ext()
|
| A D | ssl_tls12_client.c | 1152 mbedtls_free(ssl->handshake->cookie); in ssl_parse_hello_verify_request() 1154 ssl->handshake->cookie = mbedtls_calloc(1, cookie_len); in ssl_parse_hello_verify_request() 1155 if (ssl->handshake->cookie == NULL) { in ssl_parse_hello_verify_request() 1160 memcpy(ssl->handshake->cookie, p, cookie_len); in ssl_parse_hello_verify_request() 1239 mbedtls_free(ssl->handshake->cookie); in ssl_parse_server_hello() 1240 ssl->handshake->cookie = NULL; in ssl_parse_server_hello()
|
| A D | ssl_misc.h | 866 unsigned char *cookie; /*!< HelloVerifyRequest cookie for DTLS member
|
| A D | ssl_tls.c | 1287 const unsigned char *cookie, size_t cookie_len, in ssl_cookie_check_dummy() argument 1291 ((void) cookie); in ssl_cookie_check_dummy() 4882 mbedtls_free(handshake->cookie); in mbedtls_ssl_handshake_free()
|
| /mbedtls/include/mbedtls/ |
| A D | ssl.h | 2988 const unsigned char *cookie, size_t clen,
|
| /mbedtls/docs/architecture/ |
| A D | tls13-support.md | 54 | cookie | no |
|
| /mbedtls/tests/suites/ |
| A D | test_suite_ssl.function | 3155 void cookie_parsing(data_t *cookie, int exp_ret) 3174 cookie->x, cookie->len,
|
| /mbedtls/ |
| A D | ChangeLog | 1143 and possibly up to 571 bytes with a custom cookie check function. 4302 connection, if cookie verification is available 4303 (MBEDTLS_SSL_DTLS_HELLO_VERIFY defined in config.h, and usable cookie
|
Completed in 55 milliseconds