/openssl-master/util/perl/TLSProxy/ |
A D | Record.pm | 62 my $packet = shift; 68 while (length ($packet) > 0) { 73 my ($content_type, $version, $len) = unpack('Cnn', $packet); 75 if (length($packet) < TLS_RECORD_HEADER_LENGTH + ($len // 0)) { 76 print "Partial data : ".length($packet)." bytes\n"; 77 $partial = $packet; 81 my $data = substr($packet, TLS_RECORD_HEADER_LENGTH, $len); 124 $packet = substr($packet, TLS_RECORD_HEADER_LENGTH + $len);
|
A D | Proxy.pm | 468 my ($self, $server, $packet) = @_; 485 print "Packet length = ".length($packet)."\n"; 491 $self->{partial}[$server].$packet); 516 $packet = ""; 518 $packet .= $record->reconstruct_record($server); 521 print "Forwarded packet length = ".length($packet)."\n\n"; 523 return $packet;
|
/openssl-master/ssl/record/ |
A D | record.h | 86 unsigned char *packet; member 150 unsigned char *packet; member 191 #define RECORD_LAYER_get_packet(rl) ((rl)->packet)
|
A D | rec_layer_d1.c | 135 s->rlayer.packet = rdata->packet; in dtls1_copy_record() 141 memcpy(&(s->rlayer.read_sequence[2]), &(rdata->packet[5]), 6); in dtls1_copy_record() 164 rdata->packet = s->rlayer.packet; in dtls1_buffer_record() 181 s->rlayer.packet = NULL; in dtls1_buffer_record()
|
A D | rec_layer_s3.c | 46 rl->packet = NULL; in RECORD_LAYER_clear() 224 s->rlayer.packet = rb->buf + rb->offset; in ssl3_read_n() 235 if (s->rlayer.packet != pkt && clearold == 1) { in ssl3_read_n() 236 memmove(pkt, s->rlayer.packet, len + left); in ssl3_read_n() 237 s->rlayer.packet = pkt; in ssl3_read_n()
|
A D | record_local.h | 22 #define RECORD_LAYER_set_packet(rl, p) ((rl)->packet = (p))
|
A D | ssl3_record.c | 1897 s->rlayer.packet = RECORD_LAYER_get_rbuf(&s->rlayer)->buf; in dtls_buffer_listen_record() 1899 rr->data = s->rlayer.packet + DTLS1_RT_HEADER_LENGTH; in dtls_buffer_listen_record()
|
/openssl-master/ssl/ |
A D | build.info | 33 # For shared builds we need to include the libcrypto packet.c and sources 35 SHARED_SOURCE[../libssl]=record/tls_pad.c ../crypto/packet.c
|
/openssl-master/doc/man3/ |
A D | DTLS_set_timer_cb.pod | 21 called by DTLS for every new DTLS packet that is sent.
|
A D | SSL_read_early_data.pod | 253 buffer outgoing TCP data if a TCP packet has already been sent which we have not 255 transmitted if enough data to fill an entire TCP packet is accumulated, or if 257 first TCP packet along with any data from the first call to 259 single TCP packet, or if there are more calls to SSL_write_early_data() then 261 buffered by the OS and not sent until an ACK is received for the first packet
|
A D | SSL_connect.pod | 39 buffer outgoing TCP data if a TCP packet has already been sent for which no
|
A D | SSL_read.pod | 55 be returned. As the size of an SSL/TLS record may exceed the maximum packet size
|
A D | SSL_CIPHER_get_name.pod | 100 is usually retrieved from a TLS packet by using functions like
|
/openssl-master/doc/internal/man7/ |
A D | DERlib.pod | 27 I<pkt> is the packet context used, and I<tag> should be the 35 DER writers are based in L<WPACKET(3)>, a generic packet writing
|
/openssl-master/apps/ |
A D | s_client.c | 2401 const unsigned char *packet = (const unsigned char *)sbuf; in s_client_main() local 2404 bytes = BIO_read(sbio, (void *)packet, BUFSIZZ); in s_client_main() 2412 } else if (bytes != (4 + packet[0] + in s_client_main() 2413 (packet[1] << 8) + in s_client_main() 2414 (packet[2] << 16))) { in s_client_main() 2418 } else if (packet[4] != 0xA) { in s_client_main() 2430 } else if (packet[pos++] == '\0') { in s_client_main() 2443 if (packet[pos++] != '\0') { /* verify filler */ in s_client_main() 2450 if (!((packet[pos] + (packet[pos + 1] << 8)) & ssl_flg)) { in s_client_main()
|
/openssl-master/test/ssl-tests/ |
A D | 13-fragmentation.cnf.in | 10 ## Test packet fragmentation
|
/openssl-master/doc/man7/ |
A D | RAND.pod | 17 and network packet timings, can be reasonable sources of seeding material.
|
/openssl-master/crypto/ |
A D | build.info | 97 context.c sparse_array.c asn1_dsa.c packet.c param_build.c \
|
/openssl-master/ssl/statem/ |
A D | extensions.c | 547 int tls_collect_extensions(SSL *s, PACKET *packet, unsigned int context, in tls_collect_extensions() argument 550 PACKET extensions = *packet; in tls_collect_extensions()
|
A D | statem_local.h | 181 __owur int tls_collect_extensions(SSL *s, PACKET *packet, unsigned int context,
|
/openssl-master/providers/ |
A D | fips.module.sources | 247 crypto/packet.c 375 include/internal/packet.h
|
A D | fips-sources.checksums | 247 7b8d9f5dfe00460df5fbcfd4a5f2f36128020ebd2ced85ff5071b91f98740b2e crypto/packet.c 375 ea1bec4f1fff37aef8d4a62745bb451baa3e3ad20ba1bc68920a24f5cbb2f0a7 include/internal/packet.h
|
/openssl-master/ |
A D | NEWS.md | 199 * Rewrite of the packet construction code for "safer" packet handling 286 * Truncated packet could crash via OOB read ([CVE-2017-3731]) 410 * Truncated packet could crash via OOB read ([CVE-2017-3731])
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 1255 SSL_R_BAD_PACKET:240:bad packet 1256 SSL_R_BAD_PACKET_LENGTH:115:bad packet length 1424 SSL_R_PACKET_LENGTH_TOO_LONG:198:packet length too long
|
/openssl-master/test/ |
A D | build.info | 794 SOURCE[tls13secretstest]= ../ssl/tls13_enc.c ../crypto/packet.c
|