Lines Matching refs:len
524 /* Check for enough room 2 for extension type, 2 for len
603 /* save position of id len */
606 /* skip over id len */
609 /* write id len */
964 const size_t len = sizeof(kSafariExtensionsBlock);
966 if (data + len != d+n)
968 if (memcmp(data, kSafariExtensionsBlock, len) != 0)
980 unsigned short len;
1003 n2s(data,len);
1005 if (data > (d+n-len))
1067 n2s(sdata,len);
1070 if (len > dsize)
1086 if (len > TLSEXT_MAXLEN_host_name)
1091 if ((s->session->tlsext_hostname = OPENSSL_malloc(len+1)) == NULL)
1096 memcpy(s->session->tlsext_hostname, sdata, len);
1097 s->session->tlsext_hostname[len]='\0';
1098 if (strlen(s->session->tlsext_hostname) != len) {
1109 && strlen(s->session->tlsext_hostname) == len
1110 && strncmp(s->session->tlsext_hostname, (char *)sdata, len) == 0;
1118 dsize -= len;
1130 if (size <= 0 || ((len = data[0])) != (size -1))
1140 if ((s->srp_ctx.login = OPENSSL_malloc(len+1)) == NULL)
1142 memcpy(s->srp_ctx.login, &data[1], len);
1143 s->srp_ctx.login[len]='\0';
1145 if (strlen(s->srp_ctx.login) != len)
1480 static char ssl_next_proto_validate(unsigned char *d, unsigned len)
1484 while (off < len)
1492 return off == len;
2167 * len: the length of the session ID.
2193 int tls1_process_ticket(SSL *s, unsigned char *session_id, int len,
2197 const unsigned char *p = session_id + len;
2260 r = tls_decrypt_ticket(s, p, size, session_id, len, ret);