Lines Matching +defs:tot +defs:len
120 unsigned int len, int create_empty_fragment);
168 int max_max = s->s3->rbuf.len - s->packet_length;
259 if (extra != s->s3->rbuf.len - SSL3_RT_MAX_PACKET_SIZE)
272 n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
529 int ssl3_write_bytes(SSL *s, int type, const void *buf_, int len)
533 int i,tot;
537 tot=s->s3->wnum;
552 * out than the the original len from a write which didn't complete
555 * it must never be possible to end up with (len-tot) as a large
560 if (len < tot)
567 n=(len-tot);
575 i=do_ssl3_write(s, type, &(buf[tot]), nw, 0);
578 s->s3->wnum=tot;
590 return tot+i;
594 tot+=i;
599 unsigned int len, int create_empty_fragment)
611 return(ssl3_write_pending(s,type,buf,len));
622 if (len == 0 && !create_empty_fragment)
655 if (s->s3->wbuf.len < (size_t)prefix_len + SSL3_RT_MAX_PACKET_SIZE)
682 wr->length=(int)len;
740 s->s3->wpend_tot=len;
743 s->s3->wpend_ret=len;
746 return ssl3_write_pending(s,type,buf,len);
753 unsigned int len)
758 if ((s->s3->wpend_tot > (int)len)
802 /* Return up to 'len' payload bytes received in 'type' records.
829 int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek)
856 while ((len > 0) && (s->s3->handshake_fragment_len > 0))
859 len--; s->s3->handshake_fragment_len--;
930 if (len <= 0) return(len);
932 if ((unsigned int)len > rr->length)
935 n = (unsigned int)len;