Home
last modified time | relevance | path

Searched refs:packet (Results 1 – 25 of 26) sorted by relevance

12

/openssl-master/util/perl/TLSProxy/
A DRecord.pm62 my $packet = shift;
68 while (length ($packet) > 0) {
73 my ($content_type, $version, $len) = unpack('Cnn', $packet);
75 if (length($packet) < TLS_RECORD_HEADER_LENGTH + ($len // 0)) {
76 print "Partial data : ".length($packet)." bytes\n";
77 $partial = $packet;
81 my $data = substr($packet, TLS_RECORD_HEADER_LENGTH, $len);
124 $packet = substr($packet, TLS_RECORD_HEADER_LENGTH + $len);
A DProxy.pm468 my ($self, $server, $packet) = @_;
485 print "Packet length = ".length($packet)."\n";
491 $self->{partial}[$server].$packet);
516 $packet = "";
518 $packet .= $record->reconstruct_record($server);
521 print "Forwarded packet length = ".length($packet)."\n\n";
523 return $packet;
/openssl-master/ssl/record/
A Drecord.h86 unsigned char *packet; member
150 unsigned char *packet; member
191 #define RECORD_LAYER_get_packet(rl) ((rl)->packet)
A Drec_layer_d1.c135 s->rlayer.packet = rdata->packet; in dtls1_copy_record()
141 memcpy(&(s->rlayer.read_sequence[2]), &(rdata->packet[5]), 6); in dtls1_copy_record()
164 rdata->packet = s->rlayer.packet; in dtls1_buffer_record()
181 s->rlayer.packet = NULL; in dtls1_buffer_record()
A Drec_layer_s3.c46 rl->packet = NULL; in RECORD_LAYER_clear()
224 s->rlayer.packet = rb->buf + rb->offset; in ssl3_read_n()
235 if (s->rlayer.packet != pkt && clearold == 1) { in ssl3_read_n()
236 memmove(pkt, s->rlayer.packet, len + left); in ssl3_read_n()
237 s->rlayer.packet = pkt; in ssl3_read_n()
A Drecord_local.h22 #define RECORD_LAYER_set_packet(rl, p) ((rl)->packet = (p))
A Dssl3_record.c1897 s->rlayer.packet = RECORD_LAYER_get_rbuf(&s->rlayer)->buf; in dtls_buffer_listen_record()
1899 rr->data = s->rlayer.packet + DTLS1_RT_HEADER_LENGTH; in dtls_buffer_listen_record()
/openssl-master/ssl/
A Dbuild.info33 # For shared builds we need to include the libcrypto packet.c and sources
35 SHARED_SOURCE[../libssl]=record/tls_pad.c ../crypto/packet.c
/openssl-master/doc/man3/
A DDTLS_set_timer_cb.pod21 called by DTLS for every new DTLS packet that is sent.
A DSSL_read_early_data.pod253 buffer outgoing TCP data if a TCP packet has already been sent which we have not
255 transmitted if enough data to fill an entire TCP packet is accumulated, or if
257 first TCP packet along with any data from the first call to
259 single TCP packet, or if there are more calls to SSL_write_early_data() then
261 buffered by the OS and not sent until an ACK is received for the first packet
A DSSL_connect.pod39 buffer outgoing TCP data if a TCP packet has already been sent for which no
A DSSL_read.pod55 be returned. As the size of an SSL/TLS record may exceed the maximum packet size
A DSSL_CIPHER_get_name.pod100 is usually retrieved from a TLS packet by using functions like
/openssl-master/doc/internal/man7/
A DDERlib.pod27 I<pkt> is the packet context used, and I<tag> should be the
35 DER writers are based in L<WPACKET(3)>, a generic packet writing
/openssl-master/apps/
A Ds_client.c2401 const unsigned char *packet = (const unsigned char *)sbuf; in s_client_main() local
2404 bytes = BIO_read(sbio, (void *)packet, BUFSIZZ); in s_client_main()
2412 } else if (bytes != (4 + packet[0] + in s_client_main()
2413 (packet[1] << 8) + in s_client_main()
2414 (packet[2] << 16))) { in s_client_main()
2418 } else if (packet[4] != 0xA) { in s_client_main()
2430 } else if (packet[pos++] == '\0') { in s_client_main()
2443 if (packet[pos++] != '\0') { /* verify filler */ in s_client_main()
2450 if (!((packet[pos] + (packet[pos + 1] << 8)) & ssl_flg)) { in s_client_main()
/openssl-master/test/ssl-tests/
A D13-fragmentation.cnf.in10 ## Test packet fragmentation
/openssl-master/doc/man7/
A DRAND.pod17 and network packet timings, can be reasonable sources of seeding material.
/openssl-master/crypto/
A Dbuild.info97 context.c sparse_array.c asn1_dsa.c packet.c param_build.c \
/openssl-master/ssl/statem/
A Dextensions.c547 int tls_collect_extensions(SSL *s, PACKET *packet, unsigned int context, in tls_collect_extensions() argument
550 PACKET extensions = *packet; in tls_collect_extensions()
A Dstatem_local.h181 __owur int tls_collect_extensions(SSL *s, PACKET *packet, unsigned int context,
/openssl-master/providers/
A Dfips.module.sources247 crypto/packet.c
375 include/internal/packet.h
A Dfips-sources.checksums247 7b8d9f5dfe00460df5fbcfd4a5f2f36128020ebd2ced85ff5071b91f98740b2e crypto/packet.c
375 ea1bec4f1fff37aef8d4a62745bb451baa3e3ad20ba1bc68920a24f5cbb2f0a7 include/internal/packet.h
/openssl-master/
A DNEWS.md199 * Rewrite of the packet construction code for "safer" packet handling
286 * Truncated packet could crash via OOB read ([CVE-2017-3731])
410 * Truncated packet could crash via OOB read ([CVE-2017-3731])
/openssl-master/crypto/err/
A Dopenssl.txt1255 SSL_R_BAD_PACKET:240:bad packet
1256 SSL_R_BAD_PACKET_LENGTH:115:bad packet length
1424 SSL_R_PACKET_LENGTH_TOO_LONG:198:packet length too long
/openssl-master/test/
A Dbuild.info794 SOURCE[tls13secretstest]= ../ssl/tls13_enc.c ../crypto/packet.c

Completed in 58 milliseconds

12