Searched refs:extensions_length (Results 1 – 10 of 10) sorted by relevance
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/ |
H A D | s2n_tls13_cert_request_test.c | 44 uint16_t extensions_length, extension_size, extension_type; in main() local 47 EXPECT_SUCCESS(s2n_stuffer_read_uint16(&server_conn->handshake.io, &extensions_length)); in main() 48 EXPECT_EQUAL(s2n_stuffer_data_available(&server_conn->handshake.io), extensions_length); in main()
|
/dports/net/dshell/Dshell-502a546/dshell/plugins/ssl/ |
H A D | tls.py | 658 self.extensions_length = struct.unpack( 667 extensions_data = data[offset:offset+self.extensions_length] 670 data_length, offset + self.extensions_length))
|
/dports/net-im/tdlib/td-a53cb30e99f937cfd64e0266fa558785a184a553/benchmark/ |
H A D | check_tls.cpp | 214 size_t extensions_length = read_length(); in test_tls() local 215 if (extensions_length + 76 != server_hello_length) { in test_tls()
|
/dports/net/tinyldap/tinyldap/ |
H A D | fmt_tls_serverhello.c | 159 char extensions_length[2]; // \x00\x05 in fmt_tls_serverhello()
|
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-reload.c | 2945 guint32 extensions_length = 0; 2950 extensions_length = tvb_get_ntohl(tvb, offset+local_offset); 2951 if (extensions_length+4 > local_length) { 2953 extensions_length = local_length-4; 2957 while (extensions_offset<extensions_length) { 3347 guint32 extensions_length; 3353 extensions_length = tvb_get_ntohl(tvb, offset + 2 + 4 + message_body_length); 3355 if (2 + 4 + message_body_length + 4 + extensions_length > length) { 3797 while (extension_offset >= 0 && (guint32)extension_offset < extensions_length) { 3801 if ((extension_offset + 3 + 4 + extension_content_length) > extensions_length) { [all …]
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-reload.c | 2945 guint32 extensions_length = 0; in dissect_diagnosticrequest() local 2950 extensions_length = tvb_get_ntohl(tvb, offset+local_offset); in dissect_diagnosticrequest() 2951 if (extensions_length+4 > local_length) { in dissect_diagnosticrequest() 2953 extensions_length = local_length-4; in dissect_diagnosticrequest() 2957 while (extensions_offset<extensions_length) { in dissect_diagnosticrequest() 3347 guint32 extensions_length; in dissect_reload_messagecontents() local 3353 extensions_length = tvb_get_ntohl(tvb, offset + 2 + 4 + message_body_length); in dissect_reload_messagecontents() 3355 if (2 + 4 + message_body_length + 4 + extensions_length > length) { in dissect_reload_messagecontents() 3797 while (extension_offset >= 0 && (guint32)extension_offset < extensions_length) { in dissect_reload_messagecontents() 3801 if ((extension_offset + 3 + 4 + extension_content_length) > extensions_length) { in dissect_reload_messagecontents() [all …]
|
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-reload.c | 2945 guint32 extensions_length = 0; in dissect_diagnosticrequest() local 2950 extensions_length = tvb_get_ntohl(tvb, offset+local_offset); in dissect_diagnosticrequest() 2951 if (extensions_length+4 > local_length) { in dissect_diagnosticrequest() 2953 extensions_length = local_length-4; in dissect_diagnosticrequest() 2957 while (extensions_offset<extensions_length) { in dissect_diagnosticrequest() 3347 guint32 extensions_length; in dissect_reload_messagecontents() local 3353 extensions_length = tvb_get_ntohl(tvb, offset + 2 + 4 + message_body_length); in dissect_reload_messagecontents() 3355 if (2 + 4 + message_body_length + 4 + extensions_length > length) { in dissect_reload_messagecontents() 3797 while (extension_offset >= 0 && (guint32)extension_offset < extensions_length) { in dissect_reload_messagecontents() 3801 if ((extension_offset + 3 + 4 + extension_content_length) > extensions_length) { in dissect_reload_messagecontents() [all …]
|
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-reload.c | 2945 guint32 extensions_length = 0; in dissect_diagnosticrequest() local 2950 extensions_length = tvb_get_ntohl(tvb, offset+local_offset); in dissect_diagnosticrequest() 2951 if (extensions_length+4 > local_length) { in dissect_diagnosticrequest() 2953 extensions_length = local_length-4; in dissect_diagnosticrequest() 2957 while (extensions_offset<extensions_length) { in dissect_diagnosticrequest() 3347 guint32 extensions_length; in dissect_reload_messagecontents() local 3353 extensions_length = tvb_get_ntohl(tvb, offset + 2 + 4 + message_body_length); in dissect_reload_messagecontents() 3355 if (2 + 4 + message_body_length + 4 + extensions_length > length) { in dissect_reload_messagecontents() 3797 while (extension_offset >= 0 && (guint32)extension_offset < extensions_length) { in dissect_reload_messagecontents() 3801 if ((extension_offset + 3 + 4 + extension_content_length) > extensions_length) { in dissect_reload_messagecontents() [all …]
|
/dports/finance/pear_Payment_DTA/Payment_DTA-1.4.3/ |
H A D | DTA.php | 974 $extensions_length = ($record_length-187)/29; 1029 if ($extensions != $extensions_length) {
|
/dports/net/py-dpkt/dpkt-1.9.6/dpkt/ |
H A D | ssl.py | 204 extensions_length = struct.unpack('!H', buf[:2])[0] 208 while pointer < extensions_length:
|