| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| HelloVerifyRequest.pm | 44 $self->{cookie_len} = 0; 56 my $cookie_len = unpack('C', substr($self->data, $ptr)); 58 my $cookie = substr($self->data, $ptr, $cookie_len); 61 $self->cookie_len($cookie_len); 67 print " Cookie Len:".$cookie_len."\n"; 84 $data .= pack('C', $self->cookie_len); 99 sub cookie_len subroutine 103 $self->{cookie_len} = shift; 105 return $self->{cookie_len}; [all...] |
| /src/external/bsd/nsd/dist/ |
| edns.h | 68 size_t cookie_len; member in struct:edns_record
|
| /src/sys/netinet/ |
| sctp_input.c | 1041 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1409 struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len, 1676 unsigned int cookie_len; local 1728 cookie_len = ntohs(cp->ch.chunk_length); 1743 if (cookie_len > size_of_pkt || 1744 cookie_len < sizeof(struct sctp_cookie_echo_chunk) + 1750 printf("sctp_handle_cookie: cookie_len=%u, pkt size=%u\n", cookie_len, size_of_pkt); 1773 sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE; 2003 cookie_len -= SCTP_SIGNATURE_SIZE [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 1303 if (s->d1->cookie_len > sizeof(s->d1->cookie) 1305 s->d1->cookie_len)) { 1364 size_t cookie_len; local 1373 cookie_len = PACKET_remaining(&cookiepkt); 1374 if (cookie_len > sizeof(s->d1->cookie)) { 1379 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { 1383 s->d1->cookie_len = cookie_len;
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_clnt.c | 1221 if (s->d1->cookie_len > sizeof(s->d1->cookie) 1223 s->d1->cookie_len)) { 1280 size_t cookie_len; local 1289 cookie_len = PACKET_remaining(&cookiepkt); 1290 if (cookie_len > sizeof(s->d1->cookie)) { 1295 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { 1299 s->d1->cookie_len = cookie_len;
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| s_cb.c | 754 unsigned int *cookie_len) 798 buffer, length, cookie, cookie_len); local 807 unsigned int cookie_len) 816 && cookie_len == resultlength 824 size_t *cookie_len) 830 *cookie_len = temp; 835 size_t cookie_len) 837 return verify_cookie_callback(ssl, cookie, cookie_len);
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_clnt.c | 1232 if (s->d1->cookie_len > sizeof(s->d1->cookie) 1234 s->d1->cookie_len)) { 1298 size_t cookie_len; local 1308 cookie_len = PACKET_remaining(&cookiepkt); 1309 if (cookie_len > sizeof(s->d1->cookie)) { 1315 if (!PACKET_copy_bytes(&cookiepkt, s->d1->cookie, cookie_len)) { 1320 s->d1->cookie_len = cookie_len;
|
| /src/external/bsd/tcpdump/dist/ |
| print-juniper.c | 381 uint8_t cookie_len; /* cookie len */ member in struct:juniper_cookie_table_t 428 uint8_t cookie_len; member in struct:juniper_l2info_t 912 if (l2info.cookie_len == 0) { 919 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { 1279 l2info->cookie_len = 0; 1417 l2info->cookie_len += lp->cookie_len; 1422 l2info->cookie_len += 2; 1426 l2info->cookie_len = 8; 1439 l2info->cookie_len = 0 [all...] |
| /src/external/bsd/unbound/dist/testcode/ |
| testpkts.c | 1584 int cookie_len = extract_cookie(query_pkt, len, local 1586 if(cookie_len == -1) { 1591 cookie_len != 8) { 1596 cookie_len != 24) {
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| ssl_local.h | 881 unsigned int *cookie_len); 885 unsigned int cookie_len); 889 size_t *cookie_len); 893 size_t cookie_len); 1954 size_t cookie_len; member in struct:dtls1_state_st 2747 size_t cookie_len);
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| ssl_local.h | 929 unsigned int *cookie_len); 933 unsigned int cookie_len); 937 size_t *cookie_len); 941 size_t cookie_len); 1902 size_t cookie_len; member in struct:dtls1_state_st 2574 size_t cookie_len);
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| ssl_local.h | 818 unsigned int *cookie_len); 822 unsigned int cookie_len); 826 size_t *cookie_len); 830 size_t cookie_len); 1775 size_t cookie_len; member in struct:dtls1_state_st 2432 size_t cookie_len);
|