Home | History | Annotate | Download | only in ssl

Lines Matching refs:d1

291                    &((s)->d1->unprocessed_rcds))
296 &((s)->d1->processed_rcds))
303 item = pqueue_peek(s->d1->unprocessed_rcds.q);
307 if (s->d1->unprocessed_rcds.epoch != s->d1->r_epoch)
311 while (pqueue_peek(s->d1->unprocessed_rcds.q))
316 dtls1_buffer_record(s, &(s->d1->processed_rcds),
323 s->d1->processed_rcds.epoch = s->d1->r_epoch;
324 s->d1->unprocessed_rcds.epoch = s->d1->r_epoch + 1;
337 (((PQ_64BIT)s->d1->handshake_read_seq) << 32) |
338 ((PQ_64BIT)s->d1->r_msg_hdr.frag_off);
345 item = pqueue_peek(s->d1->rcvd_records);
352 item = pqueue_pop(s->d1->rcvd_records);
366 /* s->d1->next_expected_seq_num++; */
532 dtls1_record_bitmap_update(s, &(s->d1->bitmap));/* Mark receipt of record. */
679 if (!(s->d1->listen && rr->type == SSL3_RT_HANDSHAKE &&
701 if ((SSL_in_init(s) || s->in_handshake) && !s->d1->listen)
703 dtls1_buffer_record(s, &(s->d1->unprocessed_rcds), rr->seq_num);
772 /* Now s->d1->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. */
812 item = pqueue_pop(s->d1->buffered_app_data.q);
861 dtls1_buffer_record(s, &(s->d1->buffered_app_data), rr->seq_num);
925 s->d1->shutdown_received && !BIO_dgram_sctp_msg_waiting(SSL_get_rbio(s)))
948 dest_maxlen = sizeof s->d1->handshake_fragment;
949 dest = s->d1->handshake_fragment;
950 dest_len = &s->d1->handshake_fragment_len;
954 dest_maxlen = sizeof(s->d1->alert_fragment);
955 dest = s->d1->alert_fragment;
956 dest_len = &s->d1->alert_fragment_len;
1023 /* s->d1->handshake_fragment_len == 12 iff rr->type == SSL3_RT_HANDSHAKE;
1024 * s->d1->alert_fragment_len == 7 iff rr->type == SSL3_RT_ALERT.
1029 (s->d1->handshake_fragment_len >= DTLS1_HM_HEADER_LENGTH) &&
1030 (s->d1->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) &&
1033 s->d1->handshake_fragment_len = 0;
1035 if ((s->d1->handshake_fragment[1] != 0) ||
1036 (s->d1->handshake_fragment[2] != 0) ||
1037 (s->d1->handshake_fragment[3] != 0))
1048 s->d1->handshake_fragment, 4, s, s->msg_callback_arg);
1089 if (s->d1->alert_fragment_len >= DTLS1_AL_HEADER_LENGTH)
1091 int alert_level = s->d1->alert_fragment[0];
1092 int alert_descr = s->d1->alert_fragment[1];
1094 s->d1->alert_fragment_len = 0;
1098 s->d1->alert_fragment, 2, s, s->msg_callback_arg);
1124 s->d1->shutdown_received = 1;
1141 unsigned char *p = &(s->d1->alert_fragment[2]);
1220 if (!s->d1->change_cipher_spec_ok)
1225 s->d1->change_cipher_spec_ok = 0;
1235 s->d1->handshake_read_seq++;
1250 if ((s->d1->handshake_fragment_len >= DTLS1_HM_HEADER_LENGTH) &&
1257 if( rr->epoch != s->d1->r_epoch)
1423 if ((type == SSL3_RT_HANDSHAKE) && (s->d1->handshake_fragment_len > 0))
1426 unsigned char *src = s->d1->handshake_fragment;
1432 while ((len > 0) && (s->d1->handshake_fragment_len > 0))
1435 len--; s->d1->handshake_fragment_len--;
1439 for (k = 0; k < s->d1->handshake_fragment_len; k++)
1440 s->d1->handshake_fragment[k] = *src++;
1622 s2n(s->d1->w_epoch, pseq);
1626 s2n(s->d1->handshake_epoch, pseq); */
1736 s2n(s->d1->handshake_read_seq, ptr);
1738 if ( s->d1->r_msg_hdr.frag_off == 0) /* waiting for a new msg */
1741 s2n(s->d1->r_msg_hdr.seq, ptr); /* partial msg read */
1745 fprintf(stderr, "s->d1->handshake_read_seq = %d, s->d1->r_msg_hdr.seq = %d\n",s->d1->handshake_read_seq,s->d1->r_msg_hdr.seq);
1747 l2n3(s->d1->r_msg_hdr.frag_off, ptr);
1792 if (rr->epoch == s->d1->r_epoch)
1793 return &s->d1->bitmap;
1796 else if (rr->epoch == (unsigned long)(s->d1->r_epoch + 1) &&
1801 return &s->d1->next_bitmap;
1848 if ( seq_num < s->d1->handshake_read_seq)
1851 seq_num == s->d1->handshake_read_seq &&
1852 msg_hdr.frag_off < s->d1->r_msg_hdr.frag_off)
1854 else if ( seq_num == s->d1->handshake_read_seq &&
1856 msg_hdr.frag_off == s->d1->r_msg_hdr.frag_off))
1881 s->d1->r_epoch++;
1882 memcpy(&(s->d1->bitmap), &(s->d1->next_bitmap), sizeof(DTLS1_BITMAP));
1883 memset(&(s->d1->next_bitmap), 0x00, sizeof(DTLS1_BITMAP));
1888 memcpy(s->d1->last_write_sequence, seq, sizeof(s->s3->write_sequence));
1889 s->d1->w_epoch++;