Home | History | Annotate | Download | only in ssl

Lines Matching refs:packet

195     s->packet = rdata->packet;
201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
228 rdata->packet = s->packet;
243 s->packet = NULL;
351 s->packet = rdata->packet;
384 * and we have that many bytes in s->packet
386 rr->input= &(s->packet[DTLS1_RT_HEADER_LENGTH]);
388 /* ok, we can now read from 's->packet' data into 'rr'
503 /* we have pulled in a full packet so zero things */
518 * When it finishes, one packet has been decoded and can be found in
554 /* this packet contained a partial record, dump it */
563 p=s->packet;
622 s->packet= &(s->s3->rbuf.buf[0]);
637 /* this packet contained a partial record, dump it */
650 /* match epochs. NULL means the packet is dropped on the floor */
674 /* just read a 0 length packet */
800 /* get new packet if necessary */
815 /* we now have a packet which can be read and processed */
1452 /* field where we are to write out packet epoch, seq num and len */