Lines Matching defs:payload

24  *     expected payload len: 0
56 /* Maximum number of payload characters to print as test output */
65 unsigned char* payload;
141 * payload we seek.
165 * a total of 6 bytes, at which point we can grab the length and the payload
180 const unsigned char *payload, const int n)
192 const unsigned char c = payload[i];
203 unsigned char *payload = fixture.payload;
209 s->s3->rrec.data = payload;
210 s->s3->rrec.length = strlen((const char*)payload);
211 *payload++ = TLS1_HB_REQUEST;
212 s2n(fixture.sent_payload_len, payload);
216 memcpy((char *)sent_buf, (const char*)payload, sizeof(sent_buf));
236 printf("%s failed:\n expected payload len: %d\n received: %d\n",
248 printf("%s failed:\n expected payload: \"%s\"\n received: \"%s\"\n",
265 /* Omit three-byte pad at the beginning for type and payload length */
278 /* Three-byte pad at the beginning for type and payload length */
283 fixture.payload = &payload_buf[0];
296 /* Three-byte pad at the beginning for type and payload length, plus a NUL
303 fixture.payload = &payload_buf[0];
314 /* Three-byte pad at the beginning for type and payload length */
317 fixture.payload = &payload_buf[0];
328 /* Excluding the NUL at the end, one byte short of type + payload length +
334 fixture.payload = &payload_buf[0];
351 fixture.payload = &payload_buf[0];
362 /* Three-byte pad at the beginning for type and payload length */
367 fixture.payload = &payload_buf[0];
380 /* Three-byte pad at the beginning for type and payload length, plus a NUL
387 fixture.payload = &payload_buf[0];
398 /* Three-byte pad at the beginning for type and payload length */
401 fixture.payload = &payload_buf[0];
412 /* Excluding the NUL at the end, one byte short of type + payload length +
418 fixture.payload = &payload_buf[0];