/external/openssl/ssl/ |
d1_clnt.c | 852 if ( s->d1->cookie_len > sizeof(s->d1->cookie)) 857 *(p++) = s->d1->cookie_len; 858 memcpy(p, s->d1->cookie, s->d1->cookie_len); 859 p += s->d1->cookie_len; 922 unsigned int cookie_len; local 951 cookie_len = *(data++); 952 if ( cookie_len > sizeof(s->d1->cookie)) 958 memcpy(s->d1->cookie, data, cookie_len); 959 s->d1->cookie_len = cookie_len; [all...] |
dtls1.h | 189 unsigned int cookie_len; member in struct:dtls1_state_st
|
s3_srvr.c | 950 unsigned int cookie_len; local 1074 cookie_len = *(p++); 1081 if ( cookie_len > sizeof(s->d1->rcvd_cookie)) 1091 cookie_len > 0) 1093 memcpy(s->d1->rcvd_cookie, p, cookie_len); 1098 cookie_len) == 0) 1108 s->d1->cookie_len) != 0) /* default verification */ 1119 p += cookie_len; [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
dtls1.h | 179 size_t cookie_len; member in struct:dtls1_state_st
|
/external/iproute2/ip/ |
ipl2tp.c | 49 int cookie_len; member in struct:l2tp_parm 178 if (p->cookie_len) addattr_l(&req.n, 1024, L2TP_ATTR_COOKIE, 179 p->cookie, p->cookie_len); 257 if (p->cookie_len > 0) 258 print_cookie("cookie", p->cookie, p->cookie_len); 307 p->cookie_len = RTA_PAYLOAD(attrs[L2TP_ATTR_COOKIE])); 595 p->cookie_len = slen / 2; 596 if (hex2mem(*argv, p->cookie, p->cookie_len) < 0)
|
/external/openssl/include/openssl/ |
dtls1.h | 189 unsigned int cookie_len; member in struct:dtls1_state_st
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_input.c | 2471 unsigned int cookie_len; local [all...] |