Home | History | Annotate | Download | only in ssl

Lines Matching refs:packet

195     s->packet = rdata->packet;
201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
228 rdata->packet = s->packet;
243 s->packet = NULL;
354 s->packet = rdata->packet;
387 * and we have that many bytes in s->packet
389 rr->input= &(s->packet[DTLS1_RT_HEADER_LENGTH]);
391 /* ok, we can now read from 's->packet' data into 'rr'
505 /* we have pulled in a full packet so zero things */
520 * When it finishes, one packet has been decoded and can be found in
558 /* this packet contained a partial record, dump it */
567 p=s->packet;
626 s->packet= &(s->s3->rbuf.buf[0]);
641 /* this packet contained a partial record, dump it */
654 /* match epochs. NULL means the packet is dropped on the floor */
678 /* just read a 0 length packet */
802 /* get new packet if necessary */
817 /* we now have a packet which can be read and processed */
1454 /* field where we are to write out packet epoch, seq num and len */