Home | History | Annotate | Download | only in ssl

Lines Matching refs:cText

11861 /* if cText is non-null, then decipher, check MAC, and decompress the
11862 * SSL record from cText->buf (typically gs->inbuf)
11867 * If cText is NULL, then the ciphertext has previously been deciphered and
11884 ssl3_HandleRecord(sslSocket *ss, SSL3Ciphertext *cText, sslBuffer *databuf)
11922 /* cText is NULL when we're called from ssl3_RestartHandshakeAfterXXX().
11926 if (cText == NULL) {
11947 DTLSEpoch epoch = (cText->seq_num.high >> 16) & 0xffff;
11958 dtls_seq_num = (((PRUint64)(cText->seq_num.high & 0xffff)) << 32) |
11959 ((PRUint64)cText->seq_num.low);
11986 if (cText->buf->len < minLength) {
12008 PRINT_BUF(80, (ss, "IV (ciphertext):", cText->buf->buf, ivLen));
12015 sizeof(iv), cText->buf->buf, ivLen);
12043 PRINT_BUF(80, (ss, "ciphertext:", cText->buf->buf + ivLen,
12044 cText->buf->len - ivLen));
12048 if (isTLS && cText->buf->len - ivLen > (MAX_FRAGMENT_LENGTH + 2048)) {
12055 rType = cText->type;
12062 cText->buf->len - cipher_def->explicit_nonce_size -
12065 header, IS_DTLS(ss) ? cText->seq_num : crSpec->read_seq_num,
12066 rType, isTLS, cText->version, IS_DTLS(ss), decryptedLen);
12074 cText->buf->buf, /* in */
12075 cText->buf->len, /* inlen */
12082 ((cText->buf->len - ivLen) % cipher_def->block_size) != 0) {
12086 /* decrypt from cText buf to plaintext. */
12089 plaintext->space, cText->buf->buf + ivLen, cText->buf->len - ivLen);
12114 header, IS_DTLS(ss) ? cText->seq_num : crSpec->read_seq_num,
12115 rType, isTLS, cText->version, IS_DTLS(ss),
12294 SSL_GETPID(), ss->fd, cText->type));