Lines Matching full:payload
1452 unsigned int payload;
1455 /* Read type and payload length first */
1457 n2s(p, payload);
1471 * message type, plus 2 bytes payload length, plus
1472 * payload, plus padding
1474 buffer = OPENSSL_malloc(1 + 2 + payload + padding);
1477 /* Enter response type, length and copy payload */
1479 s2n(payload, bp);
1480 memcpy(bp, pl, payload);
1481 bp += payload;
1485 r = dtls1_write_bytes(s, TLS1_RT_HEARTBEAT, buffer, 3 + payload + padding);
1489 buffer, 3 + payload + padding,
1506 if (payload == 18 && seq == s->tlsext_hb_seq)
1522 unsigned int payload = 18; /* Sequence number + random bytes */
1547 /* Check if padding is too long, payload and padding
1550 OPENSSL_assert(payload + padding <= 16381);
1553 * as payload to distuingish different messages and add
1556 * - Payload Length, 2 bytes (unsigned int)
1557 * - Payload, the sequence number (2 bytes uint)
1558 * - Payload, random bytes (16 bytes uint)
1561 buf = OPENSSL_malloc(1 + 2 + payload + padding);
1565 /* Payload length (18 bytes here) */
1566 s2n(payload, p);
1575 ret = dtls1_write_bytes(s, TLS1_RT_HEARTBEAT, buf, 3 + payload + padding);
1580 buf, 3 + payload + padding,