Home | History | Annotate | Download | only in ssl

Lines Matching refs:s3

128 	 * The packet will be in the sub-array of s->s3->rbuf.buf specified
140 rb = &(s->s3->rbuf);
231 /* Now we have len+left bytes at the front of s->s3->rbuf.buf
279 * ssl->s3->rrec.type - is the type of record
280 * ssl->s3->rrec.data, - data
281 * ssl->s3->rrec.length, - number of bytes
296 rr= &(s->s3->rrec);
303 if (extra && !s->s3->init_extra)
316 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
352 if (rr->length > s->s3->rbuf.len - SSL3_RT_HEADER_LENGTH)
514 * ssl->s3->rrec.type is the type of record
515 * ssl->s3->rrec.length == number of bytes in record
516 * ssl->s3->rrec.off == offset to first valid byte
517 * ssl->s3->rrec.data == where to take bytes from, increment
545 rr= &(ssl->s3->rrec);
563 wr= &(ssl->s3->wrec);
587 tot=s->s3->wnum;
588 s->s3->wnum=0;
612 s->s3->wnum=tot;
622 s->s3->empty_fragment_done = 0;
641 SSL3_BUFFER *wb=&(s->s3->wbuf);
654 if (s->s3->alert_dispatch)
665 wr= &(s->s3->wrec);
687 if (!clear && !create_empty_fragment && !s->s3->empty_fragment_done)
692 if (s->s3->need_empty_fragments && type == SSL3_RT_APPLICATION_DATA)
711 s->s3->empty_fragment_done = 1;
847 s->s3->wpend_tot=len;
848 s->s3->wpend_buf=buf;
849 s->s3->wpend_type=type;
850 s->s3->wpend_ret=len;
858 /* if s->s3->wbuf.left != 0, we need to call this */
863 SSL3_BUFFER *wb=&(s->s3->wbuf);
866 if ((s->s3->wpend_tot > (int)len)
867 || ((s->s3->wpend_buf != buf) &&
869 || (s->s3->wpend_type != type))
898 return(s->s3->wpend_ret);
948 if (s->s3->rbuf.buf == NULL) /* Not initialized yet */
959 if ((type == SSL3_RT_HANDSHAKE) && (s->s3->handshake_fragment_len > 0))
962 unsigned char *src = s->s3->handshake_fragment;
968 while ((len > 0) && (s->s3->handshake_fragment_len > 0))
971 len--; s->s3->handshake_fragment_len--;
975 for (k = 0; k < s->s3->handshake_fragment_len; k++)
976 s->s3->handshake_fragment[k] = *src++;
980 /* Now s->s3->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. */
996 /* s->s3->rrec.type - is the type of record
997 * s->s3->rrec.data, - data
998 * s->s3->rrec.off, - offset into 'data' for next read
999 * s->s3->rrec.length, - number of bytes. */
1000 rr = &(s->s3->rrec);
1011 if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
1079 dest_maxlen = sizeof s->s3->handshake_fragment;
1080 dest = s->s3->handshake_fragment;
1081 dest_len = &s->s3->handshake_fragment_len;
1085 dest_maxlen = sizeof s->s3->alert_fragment;
1086 dest = s->s3->alert_fragment;
1087 dest_len = &s->s3->alert_fragment_len;
1121 /* s->s3->handshake_fragment_len == 4 iff rr->type == SSL3_RT_HANDSHAKE;
1122 * s->s3->alert_fragment_len == 2 iff rr->type == SSL3_RT_ALERT.
1127 (s->s3->handshake_fragment_len >= 4) &&
1128 (s->s3->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) &&
1131 s->s3->handshake_fragment_len = 0;
1133 if ((s->s3->handshake_fragment[1] != 0) ||
1134 (s->s3->handshake_fragment[2] != 0) ||
1135 (s->s3->handshake_fragment[3] != 0))
1143 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->s3
1146 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) &&
1147 !s->s3->renegotiate)
1162 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1188 !s->s3->send_connection_binding &&
1190 (s->s3->handshake_fragment_len >= 4) &&
1191 (s->s3->handshake_fragment[0] == SSL3_MT_CLIENT_HELLO) &&
1196 /*s->s3->handshake_fragment_len = 0;*/
1201 if (s->s3->alert_fragment_len >= 2)
1203 int alert_level = s->s3->alert_fragment[0];
1204 int alert_descr = s->s3->alert_fragment[1];
1206 s->s3->alert_fragment_len = 0;
1209 s->msg_callback(0, s->version, SSL3_RT_ALERT, s->s3->alert_fragment, 2, s, s->msg_callback_arg);
1224 s->s3->warn_alert = alert_descr;
1255 s->s3->fatal_alert = alert_descr;
1293 if (s->s3->tmp.new_cipher == NULL)
1305 s->s3->change_cipher_spec=1;
1313 if ((s->s3->handshake_fragment_len >= 4) && !s->in_handshake)
1316 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS))
1340 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1390 if (s->s3->in_read_app_data &&
1391 (s->s3->total_renegotiations != 0) &&
1403 s->s3->in_read_app_data=2;
1432 if (s->s3->tmp.key_block == NULL)
1441 s->session->cipher=s->s3->tmp.new_cipher;
1462 s->s3->tmp.peer_finish_md_len = s->method->ssl3_enc->final_finish_mac(s,
1463 sender,slen,s->s3->tmp.peer_finish_md);
1479 s->s3->alert_dispatch=1;
1480 s->s3->send_alert[0]=level;
1481 s->s3->send_alert[1]=desc;
1482 if (s->s3->wbuf.left == 0) /* data still being written out? */
1494 s->s3->alert_dispatch=0;
1495 i = do_ssl3_write(s, SSL3_RT_ALERT, &s->s3->send_alert[0], 2, 0);
1498 s->s3->alert_dispatch=1;
1505 if (s->s3->send_alert[0] == SSL3_AL_FATAL)
1509 s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3->send_alert, 2, s, s->msg_callback_arg);
1518 j=(s->s3->send_alert[0]<<8)|s->s3->send_alert[1];