Searched refs:handshake_fragment (Results 1 - 14 of 14) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | dtls1.h | 186 unsigned char handshake_fragment[DTLS1_HM_HEADER_LENGTH]; member in struct:dtls1_state_st
|
H A D | ssl3.h | 361 unsigned char handshake_fragment[4]; member in struct:ssl3_state_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | dtls1.h | 186 unsigned char handshake_fragment[DTLS1_HM_HEADER_LENGTH]; member in struct:dtls1_state_st
|
H A D | s3_pkt.c | 811 unsigned char *src = s->s3->handshake_fragment; 825 s->s3->handshake_fragment[k] = *src++; 926 dest_maxlen = sizeof s->s3->handshake_fragment; 927 dest = s->s3->handshake_fragment; 962 (s->s3->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) && 967 if ((s->s3->handshake_fragment[1] != 0) || 968 (s->s3->handshake_fragment[2] != 0) || 969 (s->s3->handshake_fragment[3] != 0)) 977 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->s3->handshake_fragment, 4, s, s->msg_callback_arg);
|
H A D | d1_pkt.c | 785 dest_maxlen = sizeof s->d1->handshake_fragment; 786 dest = s->d1->handshake_fragment; 833 (s->d1->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) && 838 if ((s->d1->handshake_fragment[1] != 0) || 839 (s->d1->handshake_fragment[2] != 0) || 840 (s->d1->handshake_fragment[3] != 0)) 851 s->d1->handshake_fragment, 4, s, s->msg_callback_arg); 1191 unsigned char *src = s->d1->handshake_fragment; 1205 s->d1->handshake_fragment[k] = *src++;
|
H A D | ssl3.h | 361 unsigned char handshake_fragment[4]; member in struct:ssl3_state_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | dtls1.h | 236 unsigned char handshake_fragment[DTLS1_HM_HEADER_LENGTH]; member in struct:dtls1_state_st
|
H A D | s3_pkt.c | 1182 unsigned char *src = s->s3->handshake_fragment; 1196 s->s3->handshake_fragment[k] = *src++; 1303 dest_maxlen = sizeof s->s3->handshake_fragment; 1304 dest = s->s3->handshake_fragment; 1349 (s->s3->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) && 1353 if ((s->s3->handshake_fragment[1] != 0) || 1354 (s->s3->handshake_fragment[2] != 0) || 1355 (s->s3->handshake_fragment[3] != 0)) { 1363 s->s3->handshake_fragment, 4, s, 1414 (s->s3->handshake_fragment[ [all...] |
H A D | d1_pkt.c | 984 dest_maxlen = sizeof s->d1->handshake_fragment; 985 dest = s->d1->handshake_fragment; 1063 (s->d1->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) && 1067 if ((s->d1->handshake_fragment[1] != 0) || 1068 (s->d1->handshake_fragment[2] != 0) || 1069 (s->d1->handshake_fragment[3] != 0)) { 1081 s->d1->handshake_fragment, 4, s, 1454 unsigned char *src = s->d1->handshake_fragment; 1468 s->d1->handshake_fragment[k] = *src++;
|
H A D | ssl3.h | 507 unsigned char handshake_fragment[4]; member in struct:ssl3_state_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | dtls1.h | 236 unsigned char handshake_fragment[DTLS1_HM_HEADER_LENGTH]; member in struct:dtls1_state_st
|
H A D | s3_pkt.c | 1182 unsigned char *src = s->s3->handshake_fragment; 1196 s->s3->handshake_fragment[k] = *src++; 1303 dest_maxlen = sizeof s->s3->handshake_fragment; 1304 dest = s->s3->handshake_fragment; 1349 (s->s3->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) && 1353 if ((s->s3->handshake_fragment[1] != 0) || 1354 (s->s3->handshake_fragment[2] != 0) || 1355 (s->s3->handshake_fragment[3] != 0)) { 1363 s->s3->handshake_fragment, 4, s, 1414 (s->s3->handshake_fragment[ [all...] |
H A D | d1_pkt.c | 984 dest_maxlen = sizeof s->d1->handshake_fragment; 985 dest = s->d1->handshake_fragment; 1063 (s->d1->handshake_fragment[0] == SSL3_MT_HELLO_REQUEST) && 1067 if ((s->d1->handshake_fragment[1] != 0) || 1068 (s->d1->handshake_fragment[2] != 0) || 1069 (s->d1->handshake_fragment[3] != 0)) { 1081 s->d1->handshake_fragment, 4, s, 1454 unsigned char *src = s->d1->handshake_fragment; 1468 s->d1->handshake_fragment[k] = *src++;
|
H A D | ssl3.h | 507 unsigned char handshake_fragment[4]; member in struct:ssl3_state_st
|
Completed in 228 milliseconds