• Home
  • Raw
  • Download

Lines Matching refs:rr

271   SSL3_RECORD *rr = &s->s3->rrec;  in ssl3_get_record()  local
298 rr->type = *(p++); in ssl3_get_record()
302 n2s(p, rr->length); in ssl3_get_record()
315 if (rr->length > SSL3_RT_MAX_ENCRYPTED_LENGTH + extra) { in ssl3_get_record()
331 if (rr->length > s->packet_length - SSL3_RT_HEADER_LENGTH) { in ssl3_get_record()
333 i = rr->length; in ssl3_get_record()
345 rr->data = &s->packet[SSL3_RT_HEADER_LENGTH]; in ssl3_get_record()
353 if (!SSL_AEAD_CTX_open(s->aead_read_ctx, rr->data, &plaintext_len, rr->length, in ssl3_get_record()
354 rr->type, s->version, s->s3->read_sequence, rr->data, in ssl3_get_record()
355 rr->length)) { in ssl3_get_record()
370 rr->length = plaintext_len; in ssl3_get_record()
372 rr->off = 0; in ssl3_get_record()
383 if (rr->length == 0) { in ssl3_get_record()
712 SSL3_RECORD *rr; in ssl3_read_bytes() local
768 rr = &s->s3->rrec; in ssl3_read_bytes()
771 if (rr->length == 0 || s->rstate == SSL_ST_READ_BODY) { in ssl3_read_bytes()
782 if (s->s3->change_cipher_spec && rr->type != SSL3_RT_HANDSHAKE && in ssl3_read_bytes()
783 rr->type != SSL3_RT_ALERT) { in ssl3_read_bytes()
792 if (rr->type == SSL3_RT_HANDSHAKE && (s->s3->flags & SSL3_FLAGS_EXPECT_CCS)) { in ssl3_read_bytes()
801 rr->length = 0; in ssl3_read_bytes()
806 if (type == rr->type) { in ssl3_read_bytes()
823 if ((unsigned int)len > rr->length) { in ssl3_read_bytes()
824 n = rr->length; in ssl3_read_bytes()
829 memcpy(buf, &(rr->data[rr->off]), n); in ssl3_read_bytes()
831 rr->length -= n; in ssl3_read_bytes()
832 rr->off += n; in ssl3_read_bytes()
833 if (rr->length == 0) { in ssl3_read_bytes()
835 rr->off = 0; in ssl3_read_bytes()
847 if (rr->type == SSL3_RT_HANDSHAKE) { in ssl3_read_bytes()
859 const size_t todo = (rr->length < avail) ? rr->length : avail; in ssl3_read_bytes()
861 &rr->data[rr->off], todo); in ssl3_read_bytes()
862 rr->off += todo; in ssl3_read_bytes()
863 rr->length -= todo; in ssl3_read_bytes()
920 if (rr->type == SSL3_RT_ALERT) { in ssl3_read_bytes()
922 if (rr->length < 2) { in ssl3_read_bytes()
929 s->msg_callback(0, s->version, SSL3_RT_ALERT, &rr->data[rr->off], 2, s, in ssl3_read_bytes()
932 const uint8_t alert_level = rr->data[rr->off++]; in ssl3_read_bytes()
933 const uint8_t alert_descr = rr->data[rr->off++]; in ssl3_read_bytes()
934 rr->length -= 2; in ssl3_read_bytes()
990 rr->length = 0; in ssl3_read_bytes()
994 if (rr->type == SSL3_RT_CHANGE_CIPHER_SPEC) { in ssl3_read_bytes()
997 if (rr->length != 1 || rr->off != 0 || rr->data[0] != SSL3_MT_CCS) { in ssl3_read_bytes()
1018 rr->length = 0; in ssl3_read_bytes()
1021 s->msg_callback(0, s->version, SSL3_RT_CHANGE_CIPHER_SPEC, rr->data, 1, s, in ssl3_read_bytes()
1034 assert(rr->type != SSL3_RT_CHANGE_CIPHER_SPEC && rr->type != SSL3_RT_ALERT && in ssl3_read_bytes()
1035 rr->type != SSL3_RT_HANDSHAKE); in ssl3_read_bytes()