Lines Matching refs:s3

192     if (s->s3->rbuf.buf != NULL)
193 OPENSSL_free(s->s3->rbuf.buf);
197 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER));
198 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD));
201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
230 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER));
231 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD));
245 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER));
246 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD));
310 s->s3->rrec.seq_num);
348 if (s->s3->rbuf.buf != NULL)
349 OPENSSL_free(s->s3->rbuf.buf);
353 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER));
354 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD));
380 rr= &(s->s3->rrec);
496 * ssl->s3->rrec.type is the type of record
497 * ssl->s3->rrec.length == number of bytes in record
498 * ssl->s3->rrec.off == offset to first valid byte
499 * ssl->s3->rrec.data == where to take bytes from, increment
519 * ssl->s3->rrec.type - is the type of record
520 * ssl->s3->rrec.data, - data
521 * ssl->s3->rrec.length, - number of bytes
534 rr= &(s->s3->rrec);
550 n=ssl3_read_n(s, DTLS1_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
574 memcpy(&(s->s3->read_sequence[2]), p, 6);
719 if (s->s3->rbuf.buf == NULL) /* Not initialized yet */
753 /* s->s3->rrec.type - is the type of record
754 * s->s3->rrec.data, - data
755 * s->s3->rrec.off, - offset into 'data' for next read
756 * s->s3->rrec.length, - number of bytes. */
757 rr = &(s->s3->rrec);
797 if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
887 s->s3->in_read_app_data=2;
958 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) &&
959 !s->s3->renegotiate)
974 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1019 s->s3->warn_alert = alert_descr;
1056 s->s3->fatal_alert = alert_descr;
1118 s->s3->change_cipher_spec=1;
1156 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS))
1179 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1227 if (s->s3->in_read_app_data &&
1228 (s->s3->total_renegotiations != 0) &&
1240 s->s3->in_read_app_data=2;
1344 if (s->s3->wbuf.left != 0)
1351 if (s->s3->alert_dispatch)
1362 wr= &(s->s3->wrec);
1363 wb= &(s->s3->wbuf);
1383 if (!clear && !create_empty_fragment && !s->s3->empty_fragment_done
1390 if (s->s3->need_empty_fragments && type == SSL3_RT_APPLICATION_DATA)
1400 if (s->s3->wbuf.len < (size_t)prefix_len + SSL3_RT_MAX_PACKET_SIZE)
1408 s->s3->empty_fragment_done = 1;
1497 memcpy(pseq, &(s->s3->write_sequence[2]), 6);
1511 *((PQ_64BIT *)&(s->s3->write_sequence[0])));
1514 ssl3_record_sequence_update(&(s->s3->write_sequence[0]));
1529 s->s3->wpend_tot=len;
1530 s->s3->wpend_buf=buf;
1531 s->s3->wpend_type=type;
1532 s->s3->wpend_ret=len;
1546 const unsigned char *seq = s->s3->read_sequence;
1551 memcpy (s->s3->rrec.seq_num,seq,8);
1560 memcpy (s->s3->rrec.seq_num,seq,8);
1569 const unsigned char *seq = s->s3->read_sequence;
1596 s->s3->alert_dispatch=0;
1599 *ptr++ = s->s3->send_alert[0];
1600 *ptr++ = s->s3->send_alert[1];
1603 if (s->s3->send_alert[1] == DTLS1_AD_MISSING_HANDSHAKE_MESSAGE)
1623 s->s3->alert_dispatch=1;
1628 if (s->s3->send_alert[0] == SSL3_AL_FATAL
1630 || s->s3->send_alert[1] == DTLS1_AD_MISSING_HANDSHAKE_MESSAGE
1636 s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3->send_alert,
1646 j=(s->s3->send_alert[0]<<8)|s->s3->send_alert[1];
1745 unsigned int seq_bytes = sizeof(s->s3->read_sequence);
1749 seq = s->s3->read_sequence;
1756 seq = s->s3->write_sequence;
1757 memcpy(s->d1->last_write_sequence, seq, sizeof(s->s3->write_sequence));