Lines Matching refs:s3

129 	 * The packet will be in the sub-array of s->s3->rbuf.buf specified
141 rb = &(s->s3->rbuf);
234 /* Now we have len+left bytes at the front of s->s3->rbuf.buf
288 * ssl->s3->rrec.type - is the type of record
289 * ssl->s3->rrec.data, - data
290 * ssl->s3->rrec.length, - number of bytes
306 rr= &(s->s3->rrec);
313 if (extra && !s->s3->init_extra)
326 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
362 if (rr->length > s->s3->rbuf.len - SSL3_RT_HEADER_LENGTH)
524 * ssl->s3->rrec.type is the type of record
525 * ssl->s3->rrec.length == number of bytes in record
526 * ssl->s3->rrec.off == offset to first valid byte
527 * ssl->s3->rrec.data == where to take bytes from, increment
565 rr= &(ssl->s3->rrec);
583 wr= &(ssl->s3->wrec);
607 OPENSSL_assert(s->s3->wnum <= INT_MAX);
608 tot=s->s3->wnum;
609 s->s3->wnum=0;
649 s->s3->wnum=tot;
659 s->s3->empty_fragment_done = 0;
678 SSL3_BUFFER *wb=&(s->s3->wbuf);
688 if (s->s3->alert_dispatch)
703 wr= &(s->s3->wrec);
725 if (!clear && !create_empty_fragment && !s->s3->empty_fragment_done)
730 if (s->s3->need_empty_fragments && type == SSL3_RT_APPLICATION_DATA)
749 s->s3->empty_fragment_done = 1;
884 s->s3->wpend_tot=len;
885 s->s3->wpend_buf=buf;
886 s->s3->wpend_type=type;
887 s->s3->wpend_ret=len;
895 /* if s->s3->wbuf.left != 0, we need to call this */
900 SSL3_BUFFER *wb=&(s->s3->wbuf);
903 if ((s->s3->wpend_tot > (int)len)
904 || ((s->s3->wpend_buf != buf) &&
906 || (s->s3->wpend_type != type))
935 return(s->s3->wpend_ret);
985 if (s->s3->rbuf.buf == NULL) /* Not initialized yet */
996 if ((type == SSL3_RT_HANDSHAKE) && (s->s3->handshake_fragment_len > 0))
999 unsigned char *src = s->s3->handshake_fragment;
1005 while ((len > 0) && (s->s3->handshake_fragment_len > 0))
1008 len--; s->s3->handshake_fragment_len--;
1012 for (k = 0; k < s->s3->handshake_fragment_len; k++)
1013 s->s3->handshake_fragment[k] = *src++;
1017 /* Now s->s3->handshake_fragment_len == 0 if type == SSL3_RT_HANDSHAKE. */
1033 /* s->s3->rrec.type - is the type of record
1034 * s->s3->rrec.data, - data
1035 * s->s3->rrec.off, - offset into 'data' for next read
1036 * s->s3->rrec.length, - number of bytes. */
1037 rr = &(s->s3->rrec);
1048 if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
1095 if (s->mode & SSL_MODE_RELEASE_BUFFERS && s->s3->rbuf.left == 0)
1116 dest_maxlen = sizeof s->s3->handshake_fragment;
1117 dest = s->s3->handshake_fragment;
1118 dest_len = &s->s3->handshake_fragment_len;
1122 dest_maxlen = sizeof s->s3->alert_fragment;
1123 dest = s->s3->alert_fragment;
1124 dest_len = &s->s3->alert_fragment_len;
1158 /* s->s3->handshake_fragment_len == 4 iff rr->type == SSL3_RT_HANDSHAKE;
1159 * s->s3->alert_fragment_len == 2 iff rr->type == SSL3_RT_ALERT.
1164 (s->s3->handshake_fragment_len >= 4) &&
1165 (s->s3->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) &&
1168 s->s3->handshake_fragment_len = 0;
1170 if ((s->s3->handshake_fragment[1] != 0) ||
1171 (s->s3->handshake_fragment[2] != 0) ||
1172 (s->s3->handshake_fragment[3] != 0))
1180 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->s3->handshake_fragment, 4, s, s->msg_callback_arg);
1183 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS) &&
1184 !s->s3->renegotiate)
1199 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1225 !s->s3->send_connection_binding &&
1227 (s->s3->handshake_fragment_len >= 4) &&
1228 (s->s3->handshake_fragment[0] == SSL3_MT_CLIENT_HELLO) &&
1233 /*s->s3->handshake_fragment_len = 0;*/
1238 if (s->s3->alert_fragment_len >= 2)
1240 int alert_level = s->s3->alert_fragment[0];
1241 int alert_descr = s->s3->alert_fragment[1];
1243 s->s3->alert_fragment_len = 0;
1246 s->msg_callback(0, s->version, SSL3_RT_ALERT, s->s3->alert_fragment, 2, s, s->msg_callback_arg);
1261 s->s3->warn_alert = alert_descr;
1292 s->s3->fatal_alert = alert_descr;
1330 if (s->s3->tmp.new_cipher == NULL)
1337 if (!(s->s3->flags & SSL3_FLAGS_CCS_OK))
1344 s->s3->flags &= ~SSL3_FLAGS_CCS_OK;
1351 s->s3->change_cipher_spec=1;
1359 if ((s->s3->handshake_fragment_len >= 4) && !s->in_handshake)
1362 !(s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS))
1386 if (s->s3->rbuf.left == 0) /* no read-ahead left? */
1436 if (s->s3->in_read_app_data &&
1437 (s->s3->total_renegotiations != 0) &&
1449 s->s3->in_read_app_data=2;
1478 if (s->s3->tmp.key_block == NULL)
1487 s->session->cipher=s->s3->tmp.new_cipher;
1509 sender,slen,s->s3->tmp.peer_finish_md);
1515 s->s3->tmp.peer_finish_md_len = i;
1531 s->s3->alert_dispatch=1;
1532 s->s3->send_alert[0]=level;
1533 s->s3->send_alert[1]=desc;
1534 if (s->s3->wbuf.left == 0) /* data still being written out? */
1546 s->s3->alert_dispatch=0;
1547 i = do_ssl3_write(s, SSL3_RT_ALERT, &s->s3->send_alert[0], 2, 0);
1550 s->s3->alert_dispatch=1;
1557 if (s->s3->send_alert[0] == SSL3_AL_FATAL)
1561 s->msg_callback(1, s->version, SSL3_RT_ALERT, s->s3->send_alert, 2, s, s->msg_callback_arg);
1570 j=(s->s3->send_alert[0]<<8)|s->s3->send_alert[1];