Lines Matching refs:s3

191     if (s->s3->rbuf.buf != NULL)
192 OPENSSL_free(s->s3->rbuf.buf);
196 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER));
197 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD));
200 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
229 memcpy(&(rdata->rbuf), &(s->s3->rbuf), sizeof(SSL3_BUFFER));
230 memcpy(&(rdata->rrec), &(s->s3->rrec), sizeof(SSL3_RECORD));
244 memset(&(s->s3->rbuf), 0, sizeof(SSL3_BUFFER));
245 memset(&(s->s3->rrec), 0, sizeof(SSL3_RECORD));
322 s->s3->rrec.seq_num)<0)
361 if (s->s3->rbuf.buf != NULL)
362 OPENSSL_free(s->s3->rbuf.buf);
366 memcpy(&(s->s3->rbuf), &(rdata->rbuf), sizeof(SSL3_BUFFER));
367 memcpy(&(s->s3->rrec), &(rdata->rrec), sizeof(SSL3_RECORD));
391 rr= &(s->s3->rrec);
529 * ssl->s3->rrec.type is the type of record
530 * ssl->s3->rrec.length == number of bytes in record
531 * ssl->s3->rrec.off == offset to first valid byte
532 * ssl->s3->rrec.data == where to take bytes from, increment
551 * ssl->s3->rrec.type - is the type of record
552 * ssl->s3->rrec.data, - data
553 * ssl->s3->rrec.length, - number of bytes
566 rr= &(s->s3->rrec);
583 n=ssl3_read_n(s, DTLS1_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
607 memcpy(&(s->s3->read_sequence[2]), p, 6);
763 if (s->s3->rbuf.buf == NULL) /* Not initialized yet */
789 s->s3->in_read_app_data != 2))
807 /* s->s3->rrec.type - is the type of record
808 * s->s3->rrec.data, - data
809 * s->s3->rrec.off, - offset into 'data' for next read
810 * s->s3->rrec.length, - number of bytes. */
811 rr = &(s->s3->rrec);
866 if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
998 s->s3->in_read_app_data=2;
1069 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) &&
1070 !s->s3->renegotiate)
1087 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1132 s->s3->warn_alert = alert_descr;
1184 s->s3->fatal_alert = alert_descr;
1246 s->s3->change_cipher_spec=1;
1296 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS))
1320 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1368 if (s->s3->in_read_app_data &&
1369 (s->s3->total_renegotiations != 0) &&
1381 s->s3->in_read_app_data=2;
1494 if (s->s3->wbuf.left != 0)
1501 if (s->s3->alert_dispatch)
1512 wr= &(s->s3->wrec);
1513 wb= &(s->s3->wbuf);
1533 if (!clear && !create_empty_fragment && !s->s3->empty_fragment_done
1540 if (s->s3->need_empty_fragments && type == SSL3_RT_APPLICATION_DATA)
1550 if (s->s3->wbuf.len < (size_t)prefix_len + SSL3_RT_MAX_PACKET_SIZE)
1558 s->s3->empty_fragment_done = 1;
1647 memcpy(pseq, &(s->s3->write_sequence[2]), 6);
1661 *((PQ_64BIT *)&(s->s3->write_sequence[0])));
1664 ssl3_record_sequence_update(&(s->s3->write_sequence[0]));
1679 s->s3->wpend_tot=len;
1680 s->s3->wpend_buf=buf;
1681 s->s3->wpend_type=type;
1682 s->s3->wpend_ret=len;
1696 const unsigned char *seq = s->s3->read_sequence;
1701 memcpy (s->s3->rrec.seq_num,seq,8);
1710 memcpy (s->s3->rrec.seq_num,seq,8);
1719 const unsigned char *seq = s->s3->read_sequence;
1746 s->s3->alert_dispatch=0;
1749 *ptr++ = s->s3->send_alert[0];
1750 *ptr++ = s->s3->send_alert[1];
1753 if (s->s3->send_alert[1] == DTLS1_AD_MISSING_HANDSHAKE_MESSAGE)
1773 s->s3->alert_dispatch=1;
1778 if (s->s3->send_alert[0] == SSL3_AL_FATAL
1780 || s->s3->send_alert[1] == DTLS1_AD_MISSING_HANDSHAKE_MESSAGE
1786 s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3->send_alert,
1796 j=(s->s3->send_alert[0]<<8)|s->s3->send_alert[1];
1895 unsigned int seq_bytes = sizeof(s->s3->read_sequence);
1899 seq = s->s3->read_sequence;
1906 seq = s->s3->write_sequence;
1907 memcpy(s->d1->last_write_sequence, seq, sizeof(s->s3->write_sequence));