Lines Matching refs:fragment

190             byte[] fragment = new byte[contentLen];
191 packet.get(fragment); // copy the fragment
192 RecordFragment buffered = new RecordFragment(fragment, contentType,
217 // decrypt the fragment
350 // Get the fragment length of the record.
355 "Record overflow, fragment length (" + fragLen +
382 "too small record to hold a handshake fragment");
408 "not a complete handshake fragment in the record");
415 byte[] fragment = new byte[fragmentLength];
416 plaintextFragment.get(fragment);
418 return new HandshakeFragment(fragment, contentType,
425 // buffered record fragment
435 byte[] fragment;
443 this.fragment = new byte[fragBuf.remaining()];
444 fragBuf.get(this.fragment);
447 RecordFragment(byte[] fragment, byte contentType,
458 this.fragment = fragment; // The caller should have cloned
509 HandshakeFragment(byte[] fragment, byte contentType,
515 super(fragment, contentType, majorVersion, minorVersion,
533 // small fragment offset was transmitted first
540 // Should be repacked for suitable fragment length.
720 // as a single fragment.
747 "handshake fragment ranges are overlapping");
775 // buffer this fragment
807 // buffer this fragment
823 // buffer this fragment
828 // append this fragment
1099 bufferedFragments.remove(rFrag); // popup the fragment
1113 bufferedFragments.remove(rFrag); // popup the fragment
1115 ByteBuffer fragment = ByteBuffer.wrap(rFrag.fragment);
1119 rFrag.contentType, fragment, rFrag.recordEnS);
1145 "Invalid handshake fragment, discard it",
1184 // Popup the fragment.
1194 ByteBuffer.wrap(rFrag.fragment));
1200 bufferedFragments.remove(rFrag); // popup the fragment
1213 // fill the handshake fragment of the record
1221 System.arraycopy(hsFrag.fragment, 0,
1239 // fill the handshake fragment of the record
1251 System.arraycopy(hmFrag.fragment, 0,
1254 // popup the fragment
1458 for (RecordFragment fragment : fragments) {
1459 if (fragment.contentType == Record.ct_change_cipher_spec) {
1464 } else if (fragment.contentType == Record.ct_handshake) {
1466 if (fragment.isCiphertext) {
1497 return (rFrag.fragment != null) &&
1498 (rFrag.fragment.length > DTLSRecord.minCertPlaintextSize);
1512 return holes.isEmpty(); // no fragment hole for complete message
1566 int sidLen = plaintext.fragment.get(38);
1598 plaintext.fragment.position(4); // ignore the TLS header
1607 handshakeHash.update(plaintext.fragment);
1615 handshakeHash.reserve(plaintext.fragment);
1617 plaintext.fragment.position(0); // restore the position