Searched refs:id_len (Results 1 – 8 of 8) sorted by relevance
/reactos/dll/3rdparty/mbedtls/ |
H A D | ssl_cache.c | 113 session->id_len != entry->session.id_len ) in mbedtls_ssl_cache_get() 117 entry->session.id_len ) != 0 ) in mbedtls_ssl_cache_get() 194 if( memcmp( session->id, cur->session.id, cur->session.id_len ) == 0 ) in mbedtls_ssl_cache_set()
|
H A D | ecjpake.c | 231 const size_t id_len = strlen( id ); in ecjpake_hash() local 242 *p++ = (unsigned char)( ( id_len >> 24 ) & 0xFF ); in ecjpake_hash() 243 *p++ = (unsigned char)( ( id_len >> 16 ) & 0xFF ); in ecjpake_hash() 244 *p++ = (unsigned char)( ( id_len >> 8 ) & 0xFF ); in ecjpake_hash() 245 *p++ = (unsigned char)( ( id_len ) & 0xFF ); in ecjpake_hash() 247 if( end < p || (size_t)( end - p ) < id_len ) in ecjpake_hash() 250 memcpy( p, id, id_len ); in ecjpake_hash() 251 p += id_len; in ecjpake_hash()
|
H A D | ssl_srv.c | 587 session.id_len = ssl->session_negotiate->id_len; in ssl_parse_session_ticket_ext() 588 memcpy( &session.id, ssl->session_negotiate->id, session.id_len ); in ssl_parse_session_ticket_ext() 1084 ssl->session_negotiate->id_len = sess_len; in ssl_parse_client_hello_v2() 1541 ssl->session_negotiate->id_len = sess_len; in ssl_parse_client_hello() 1545 ssl->session_negotiate->id_len ); in ssl_parse_client_hello() 2511 ssl->session_negotiate->id_len != 0 && in ssl_write_server_hello() 2534 ssl->session_negotiate->id_len = n = 0; in ssl_write_server_hello() 2540 ssl->session_negotiate->id_len = n = 32; in ssl_write_server_hello() 2551 n = ssl->session_negotiate->id_len; in ssl_write_server_hello() 2569 *p++ = (unsigned char) ssl->session_negotiate->id_len; in ssl_write_server_hello() [all …]
|
H A D | ssl_cli.c | 885 n = ssl->session_negotiate->id_len; in ssl_write_client_hello() 914 ssl->session_negotiate->id_len = n = 32; in ssl_write_client_hello() 1900 ssl->session_negotiate->id_len != n || in ssl_parse_server_hello() 1910 ssl->session_negotiate->id_len = n; in ssl_parse_server_hello() 3769 ssl->session_negotiate->id_len = 0; in ssl_parse_new_session_ticket()
|
H A D | ssl_tls.c | 6490 ssl->session->id_len != 0 && in mbedtls_ssl_handshake_wrapup()
|
/reactos/dll/win32/jscript/ |
H A D | lex.c | 1005 unsigned id_len = 0; in cc_token() local 1084 while(ctx->ptr+id_len < ctx->end && is_identifier_char(ctx->ptr[id_len])) in cc_token() 1085 id_len++; in cc_token() 1086 if(!id_len) in cc_token() 1089 TRACE("var %s\n", debugstr_wn(ctx->ptr, id_len)); in cc_token() 1091 var = find_cc_var(ctx->script->cc, ctx->ptr, id_len); in cc_token() 1092 ctx->ptr += id_len; in cc_token()
|
/reactos/sdk/include/reactos/libs/mbedtls/ |
H A D | ssl.h | 825 size_t id_len; /*!< session id length */ member
|
/reactos/sdk/lib/rtl/ |
H A D | actctx.c | 5659 SIZE_T len, id_len = 0, ad_len = 0, path_len = 0; in RtlQueryInformationActivationContext() local 5671 id_len = wcslen(assembly_id) + 1; in RtlQueryInformationActivationContext() 5678 len = sizeof(*afdi) + (id_len + ad_len + path_len) * sizeof(WCHAR); in RtlQueryInformationActivationContext() 5688 afdi->ulEncodedAssemblyIdentityLength = (id_len - 1) * sizeof(WCHAR); in RtlQueryInformationActivationContext() 5703 memcpy( ptr, assembly_id, id_len * sizeof(WCHAR) ); in RtlQueryInformationActivationContext() 5704 ptr += id_len; in RtlQueryInformationActivationContext()
|