/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface_udp.c | 26 #define COOKIE_LEN 8 50 u8 cookie[COOKIE_LEN]; 137 reply = os_malloc(7 + 2 * COOKIE_LEN + 1); 144 wpa_snprintf_hex(reply + 7, 2 * COOKIE_LEN + 1, 145 priv->cookie, COOKIE_LEN); 147 *reply_len = 7 + 2 * COOKIE_LEN; 164 u8 cookie[COOKIE_LEN]; 203 if (hexstr2bin(buf + 7, cookie, COOKIE_LEN) < 0) { 209 if (os_memcmp(cookie, priv->cookie, COOKIE_LEN) != 0) { 215 pos = buf + 7 + 2 * COOKIE_LEN; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_udp.c | 20 #define COOKIE_LEN 8 44 u8 cookie[COOKIE_LEN]; 131 reply = os_malloc(7 + 2 * COOKIE_LEN + 1); 138 wpa_snprintf_hex(reply + 7, 2 * COOKIE_LEN + 1, 139 priv->cookie, COOKIE_LEN); 141 *reply_len = 7 + 2 * COOKIE_LEN; 158 u8 cookie[COOKIE_LEN]; 201 if (hexstr2bin(buf + 7, cookie, COOKIE_LEN) < 0) { 207 if (os_memcmp(cookie, priv->cookie, COOKIE_LEN) != 0) { 213 pos = buf + 7 + 2 * COOKIE_LEN; [all...] |
/external/tcpdump/ |
print-juniper.c | 79 u_int8_t cookie_len; /* cookie len */ member in struct:juniper_cookie_table_t 126 u_int8_t cookie_len; member in struct:juniper_l2info_t 531 if (l2info.cookie_len == 0) { 537 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { 803 l2info->cookie_len = 0; 853 l2info->cookie_len += lp->cookie_len; 858 l2info->cookie_len += 2; 862 l2info->cookie_len = 8; 875 l2info->cookie_len = 0 [all...] |
/external/openssl/ssl/ |
d1_clnt.c | 844 if ( s->d1->cookie_len > sizeof(s->d1->cookie)) 849 *(p++) = s->d1->cookie_len; 850 memcpy(p, s->d1->cookie, s->d1->cookie_len); 851 p += s->d1->cookie_len; 908 unsigned int cookie_len; local 937 cookie_len = *(data++); 938 if ( cookie_len > sizeof(s->d1->cookie)) 944 memcpy(s->d1->cookie, data, cookie_len); 945 s->d1->cookie_len = cookie_len; [all...] |
d1_lib.c | 113 d1->cookie_len = sizeof(s->d1->cookie); 225 s->d1->cookie_len = sizeof(s->d1->cookie);
|
dtls1.h | 183 unsigned int cookie_len; member in struct:dtls1_state_st
|
d1_srvr.c | 885 &(s->d1->cookie_len)) == 0) 891 *(p++) = (unsigned char) s->d1->cookie_len; 892 memcpy(p, s->d1->cookie, s->d1->cookie_len); 893 p += s->d1->cookie_len; [all...] |
s3_srvr.c | 917 unsigned int cookie_len; local 1040 cookie_len = *(p++); 1047 if ( cookie_len > sizeof(s->d1->rcvd_cookie)) 1057 cookie_len > 0) 1059 memcpy(s->d1->rcvd_cookie, p, cookie_len); 1064 cookie_len) == 0) 1074 s->d1->cookie_len) != 0) /* default verification */ 1085 p += cookie_len; [all...] |
ssl_sess.c | [all...] |
ssl.h | [all...] |
/external/openssl/apps/ |
s_apps.h | 175 int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len); 176 int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len);
|
s_cb.c | 761 int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len) 844 *cookie_len = resultlength; 849 int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len) 924 if (cookie_len == resultlength && memcmp(result, cookie, resultlength) == 0)
|
/external/openssl/include/openssl/ |
dtls1.h | 183 unsigned int cookie_len; member in struct:dtls1_state_st
|
ssl.h | [all...] |