| /freebsd/crypto/openssl/ssl/quic/ |
| H A D | quic_wire_pkt.c | 201 ptrs->raw_start = (unsigned char *)PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 250 pn = (unsigned char *)PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 270 hdr->data = PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 315 hdr->data = PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 391 hdr->data = PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 425 pn = (unsigned char *)PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 442 hdr->data = PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr()
|
| H A D | quic_record_rx.c | 323 sop = PACKET_data(&pkt); in qrx_validate_initial_pkt() 1020 const unsigned char *sop = PACKET_data(pkt); in qrx_process_pkt() 1056 eop = PACKET_data(pkt); in qrx_process_pkt() 1304 assert(eop != NULL && eop >= PACKET_data(pkt)); in qrx_process_pkt() 1309 ignore_res(PACKET_forward(pkt, eop - PACKET_data(pkt))); in qrx_process_pkt() 1322 assert(eop >= PACKET_data(pkt)); in qrx_process_pkt() 1325 ignore_res(PACKET_forward(pkt, eop - PACKET_data(pkt))); in qrx_process_pkt()
|
| H A D | quic_wire.c | 642 f->data = PACKET_data(pkt); in ossl_quic_wire_decode_frame_crypto() 664 *token = PACKET_data(pkt); in ossl_quic_wire_decode_frame_new_token() 717 f->data = PACKET_data(pkt); in ossl_quic_wire_decode_frame_stream() 888 const unsigned char *start = PACKET_data(pkt), *end = PACKET_end(pkt), in ossl_quic_wire_decode_padding()
|
| H A D | quic_rx_depack.c | 1074 sof = PACKET_data(pkt); in depack_process_frames() 1405 size_t framelen = PACKET_data(pkt) - sof; in depack_process_frames()
|
| H A D | qlog_event_helpers.c | 476 QLOG_BIN("data", PACKET_data(&orig_pkt), in log_frame_actual()
|
| /freebsd/crypto/openssl/crypto/ |
| H A D | asn1_dsa.c | 211 if (BN_bin2bn(PACKET_data(&contpkt), in ossl_decode_der_integer() 250 consumed = PACKET_data(&pkt) - *ppin; in ossl_decode_der_dsa_sig()
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | extensions_srvr.c | 268 …ticket_cb && !s->ext.session_ticket_cb(SSL_CONNECTION_GET_USER_SSL(s), PACKET_data(pkt), PACKET_re… in tls_parse_ctos_session_ticket() 387 id_data = PACKET_data(&responder_id); in tls_parse_ctos_status_request() 417 const unsigned char *ext_data = PACKET_data(&exts); in tls_parse_ctos_status_request() 634 PACKET_data(encoded_pubkey), in tls_accept_ksgroup() 1031 data = PACKET_data(&raw); in tls_parse_ctos_cookie() 1038 mdin = PACKET_data(&raw); in tls_parse_ctos_cookie() 1104 ciphdata = PACKET_data(&cookie); in tls_parse_ctos_cookie() 1138 PACKET_data(&appcookie), in tls_parse_ctos_cookie() 1200 if (!create_synthetic_message_hash(s, PACKET_data(&chhash), in tls_parse_ctos_cookie() 1296 tmpsess = lookup_sess_in_cache(s, PACKET_data(tick), in tls_get_stateful_ticket() [all …]
|
| H A D | statem_clnt.c | 1491 && memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) { in tls_process_server_hello() 1568 || memcmp(PACKET_data(&session_id), s->tmp_session_id, in tls_process_server_hello() 1654 && memcmp(PACKET_data(&session_id), s->session->session_id, in tls_process_server_hello() 1695 memcpy(s->session->session_id, PACKET_data(&session_id), in tls_process_server_hello() 2254 if ((s->srp_ctx.N = BN_bin2bn(PACKET_data(&prime), in tls_process_ske_srp() 2257 || (s->srp_ctx.g = BN_bin2bn(PACKET_data(&generator), in tls_process_ske_srp() 2260 || (s->srp_ctx.s = BN_bin2bn(PACKET_data(&salt), in tls_process_ske_srp() 2263 || (s->srp_ctx.B = BN_bin2bn(PACKET_data(&server_pub), in tls_process_ske_srp() 2304 p = BN_bin2bn(PACKET_data(&prime), (int)PACKET_remaining(&prime), NULL); in tls_process_ske_dhe() 2305 g = BN_bin2bn(PACKET_data(&generator), (int)PACKET_remaining(&generator), in tls_process_ske_dhe() [all …]
|
| H A D | extensions_clnt.c | 1472 …if (s->ext.session_ticket_cb != NULL && !s->ext.session_ticket_cb(ssl, PACKET_data(pkt), PACKET_re… in tls_parse_stoc_session_ticket() 1585 PACKET_data(pkt), PACKET_remaining(pkt), in tls_parse_stoc_sct() 1643 PACKET_data(pkt), PACKET_remaining(pkt), in tls_parse_stoc_npn() 1704 if (memcmp(PACKET_data(pkt), PACKET_data(&protpkt), len) == 0) { in tls_parse_stoc_alpn() 2012 if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt), in tls_parse_stoc_key_share() 2028 const unsigned char *ct = PACKET_data(&encoded_pt); in tls_parse_stoc_key_share()
|
| H A D | extensions.c | 645 thisex->type, PACKET_data(&thisex->data), in tls_collect_extensions() 726 PACKET_data(&currext->data), in tls_parse_extension()
|
| H A D | statem_lib.c | 892 ok = CRYPTO_memcmp(PACKET_data(pkt), s->s3.tmp.peer_finish_md, in tls_process_finished() 896 if ((PACKET_data(pkt)[0] ^ s->s3.tmp.peer_finish_md[0]) != 0xFF) { in tls_process_finished() 2935 (unsigned char *)PACKET_data(pkt), comp_length) in tls13_process_compressed_certificate()
|
| H A D | statem_srvr.c | 3063 PACKET_data(&enc_premaster), in tls_process_cke_rsa() 3291 ptr = PACKET_data(pkt); in tls_process_cke_gost() 3302 if (!PACKET_forward(pkt, ptr - PACKET_data(pkt))) { in tls_process_cke_gost() 3399 start = PACKET_data(pkt); in tls_process_cke_gost18()
|
| /freebsd/crypto/openssl/test/ |
| H A D | tls13ccstest.c | 144 && memcmp(chsessid, PACKET_data(&sessionid), in watchccs_write() 165 && memcmp(chsessid, PACKET_data(&sessionid), in watchccs_write()
|
| H A D | packettest.c | 229 || !TEST_mem_eq(data, len, PACKET_data(&pkt), len) in test_PACKET_memdup() 233 || !TEST_mem_eq(data, len, PACKET_data(&pkt), len)) in test_PACKET_memdup()
|
| H A D | quicapitest.c | 2230 TEST_mem_eq(PACKET_data(&pkt), PACKET_remaining(&pkt), NULL, 0); in tparam_on_enc_ext()
|
| /freebsd/crypto/openssl/test/helpers/ |
| H A D | quictestlib.c | 980 ee.extensions = (unsigned char *)PACKET_data(&pkt); in handshake_mutate() 1100 start = PACKET_data(&sub); in qtest_fault_delete_extension() 1107 end = PACKET_data(&sub); in qtest_fault_delete_extension() 1113 if (!WPACKET_memcpy(&old_ext_wpkt, PACKET_data(&subext), in qtest_fault_delete_extension()
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | d1_lib.c | 553 data = PACKET_data(&msgpkt); in DTLSv1_listen() 636 if (ssl->ctx->app_verify_cookie_cb(ssl, PACKET_data(&cookiepkt), in DTLSv1_listen()
|
| H A D | ssl_rsa.c | 629 *extension_data = PACKET_data(&data); in serverinfo_find_extension()
|
| H A D | ssl_lib.c | 3587 *out = (unsigned char *)PACKET_data(&csubpkt); in SSL_select_next_proto() 3599 if (PACKET_equal(&csubpkt, PACKET_data(&ssubpkt), in SSL_select_next_proto() 3602 *out = (unsigned char *)PACKET_data(&ssubpkt); in SSL_select_next_proto() 6792 *out = PACKET_data(&sc->clienthello->ciphersuites); in SSL_client_hello_get0_ciphers() 6904 *out = PACKET_data(&r->data); in SSL_client_hello_get0_ext()
|
| H A D | t1_lib.c | 3022 return tls_decrypt_ticket(s, PACKET_data(&ticketext->data), size, in tls_get_ticket_from_client()
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | packet.h | 59 static ossl_inline const unsigned char *PACKET_data(const PACKET *pkt) in PACKET_data() function
|