Home | History | Annotate | Download | only in ssl

Lines Matching refs:s3

191     if (s->s3->rbuf.buf != NULL)
192 OPENSSL_free(s->s3->rbuf.buf);
196 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER));
197 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD));
200 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
229 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER));
230 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD));
252 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER));
253 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD));
317 s->s3->rrec.seq_num);
355 if (s->s3->rbuf.buf != NULL)
356 OPENSSL_free(s->s3->rbuf.buf);
360 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER));
361 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD));
389 rr= &(s->s3->rrec);
506 * ssl->s3->rrec.type is the type of record
507 * ssl->s3->rrec.length == number of bytes in record
508 * ssl->s3->rrec.off == offset to first valid byte
509 * ssl->s3->rrec.data == where to take bytes from, increment
529 * ssl->s3->rrec.type - is the type of record
530 * ssl->s3->rrec.data, - data
531 * ssl->s3->rrec.length, - number of bytes
544 rr= &(s->s3->rrec);
560 n=ssl3_read_n(s, DTLS1_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
584 memcpy(&(s->s3->read_sequence[2]), p, 6);
620 if (rr->length > s->s3->rbuf.len - DTLS1_RT_HEADER_LENGTH)
624 if ((pp=OPENSSL_realloc(s->s3->rbuf.buf, newlen))==NULL)
629 p = pp + (p - s->s3->rbuf.buf);
630 s->s3->rbuf.buf=pp;
631 s->s3->rbuf.len=newlen;
632 s->packet= &(s->s3->rbuf.buf[0]);
756 if (s->s3->rbuf.buf == NULL) /* Not initialized yet */
782 s->s3->in_read_app_data != 2))
800 /* s->s3->rrec.type - is the type of record
801 * s->s3->rrec.data, - data
802 * s->s3->rrec.off, - offset into 'data' for next read
803 * s->s3->rrec.length, - number of bytes. */
804 rr = &(s->s3->rrec);
853 if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
981 s->s3->in_read_app_data=2;
1052 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) &&
1053 !s->s3->renegotiate)
1069 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1114 s->s3->warn_alert = alert_descr;
1166 s->s3->fatal_alert = alert_descr;
1228 s->s3->change_cipher_spec=1;
1278 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS))
1302 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1350 if (s->s3->in_read_app_data &&
1351 (s->s3->total_renegotiations != 0) &&
1363 s->s3->in_read_app_data=2;
1477 if (s->s3->wbuf.left != 0)
1483 if (s->s3->wbuf.len < len_with_overhead)
1485 if ((p=OPENSSL_realloc(s->s3->wbuf.buf, len_with_overhead)) == NULL) {
1489 s->s3->wbuf.buf = p;
1490 s->s3->wbuf.len = len_with_overhead;
1494 if (s->s3->alert_dispatch)
1505 wr= &(s->s3->wrec);
1506 wb= &(s->s3->wbuf);
1526 if (!clear && !create_empty_fragment && !s->s3->empty_fragment_done
1533 if (s->s3->need_empty_fragments && type == SSL3_RT_APPLICATION_DATA)
1543 if (s->s3->wbuf.len < (size_t)prefix_len + SSL3_RT_MAX_PACKET_SIZE)
1551 s->s3->empty_fragment_done = 1;
1640 memcpy(pseq, &(s->s3->write_sequence[2]), 6);
1654 *((PQ_64BIT *)&(s->s3->write_sequence[0])));
1657 ssl3_record_sequence_update(&(s->s3->write_sequence[0]));
1672 s->s3->wpend_tot=len;
1673 s->s3->wpend_buf=buf;
1674 s->s3->wpend_type=type;
1675 s->s3->wpend_ret=len;
1689 const unsigned char *seq = s->s3->read_sequence;
1694 memcpy (s->s3->rrec.seq_num,seq,8);
1703 memcpy (s->s3->rrec.seq_num,seq,8);
1712 const unsigned char *seq = s->s3->read_sequence;
1739 s->s3->alert_dispatch=0;
1742 *ptr++ = s->s3->send_alert[0];
1743 *ptr++ = s->s3->send_alert[1];
1746 if (s->s3->send_alert[1] == DTLS1_AD_MISSING_HANDSHAKE_MESSAGE)
1766 s->s3->alert_dispatch=1;
1771 if (s->s3
1773 || s->s3->send_alert[1] == DTLS1_AD_MISSING_HANDSHAKE_MESSAGE
1779 s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3->send_alert,
1789 j=(s->s3->send_alert[0]<<8)|s->s3->send_alert[1];
1888 unsigned int seq_bytes = sizeof(s->s3->read_sequence);
1892 seq = s->s3->read_sequence;
1899 seq = s->s3->write_sequence;
1900 memcpy(s->d1->last_write_sequence, seq, sizeof(s->s3->write_sequence));