/openssl/crypto/ |
H A D | asn1_dsa.c | 211 if (BN_bin2bn(PACKET_data(&contpkt), in ossl_decode_der_integer() 249 consumed = PACKET_data(&pkt) - *ppin; in ossl_decode_der_dsa_sig()
|
/openssl/ssl/quic/ |
H A D | quic_wire_pkt.c | 197 ptrs->raw_start = (unsigned char *)PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 246 pn = (unsigned char *)PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 266 hdr->data = PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 311 hdr->data = PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 385 hdr->data = PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 419 pn = (unsigned char *)PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr() 436 hdr->data = PACKET_data(pkt); in ossl_quic_wire_decode_pkt_hdr()
|
H A D | quic_record_rx.c | 790 const unsigned char *sop = PACKET_data(pkt); in qrx_process_pkt() 825 eop = PACKET_data(pkt); in qrx_process_pkt() 1072 assert(eop != NULL && eop >= PACKET_data(pkt)); in qrx_process_pkt() 1077 ignore_res(PACKET_forward(pkt, eop - PACKET_data(pkt))); in qrx_process_pkt() 1090 assert(eop >= PACKET_data(pkt)); in qrx_process_pkt() 1093 ignore_res(PACKET_forward(pkt, eop - PACKET_data(pkt))); in qrx_process_pkt()
|
H A D | quic_wire.c | 644 f->data = PACKET_data(pkt); in ossl_quic_wire_decode_frame_crypto() 666 *token = PACKET_data(pkt); in ossl_quic_wire_decode_frame_new_token() 719 f->data = PACKET_data(pkt); in ossl_quic_wire_decode_frame_stream() 890 const unsigned char *start = PACKET_data(pkt), *end = PACKET_end(pkt), in ossl_quic_wire_decode_padding()
|
H A D | quic_rx_depack.c | 1072 sof = PACKET_data(pkt); in depack_process_frames() 1390 size_t framelen = PACKET_data(pkt) - sof; in depack_process_frames()
|
H A D | qlog_event_helpers.c | 505 QLOG_BIN("data", PACKET_data(&orig_pkt), in log_frame_actual()
|
/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 269 PACKET_data(pkt), PACKET_remaining(pkt), in tls_parse_ctos_session_ticket() 377 id_data = PACKET_data(&responder_id); in tls_parse_ctos_status_request() 407 const unsigned char *ext_data = PACKET_data(&exts); in tls_parse_ctos_status_request() 710 PACKET_data(&encoded_pt), in tls_parse_ctos_key_share() 751 data = PACKET_data(&raw); in tls_parse_ctos_cookie() 758 mdin = PACKET_data(&raw); in tls_parse_ctos_cookie() 822 ciphdata = PACKET_data(&cookie); in tls_parse_ctos_cookie() 856 PACKET_data(&appcookie), in tls_parse_ctos_cookie() 917 if (!create_synthetic_message_hash(s, PACKET_data(&chhash), in tls_parse_ctos_cookie() 1014 tmpsess = lookup_sess_in_cache(s, PACKET_data(tick), in tls_get_stateful_ticket() [all …]
|
H A D | statem_clnt.c | 1558 || memcmp(PACKET_data(&session_id), s->tmp_session_id, in tls_process_server_hello() 1684 memcpy(s->session->session_id, PACKET_data(&session_id), in tls_process_server_hello() 2217 BN_bin2bn(PACKET_data(&prime), in tls_process_ske_srp() 2220 BN_bin2bn(PACKET_data(&generator), in tls_process_ske_srp() 2223 BN_bin2bn(PACKET_data(&salt), in tls_process_ske_srp() 2226 BN_bin2bn(PACKET_data(&server_pub), in tls_process_ske_srp() 2269 bnpub_key = BN_bin2bn(PACKET_data(&pub_key), in tls_process_ske_dhe() 2381 PACKET_data(&encoded_pt), in tls_process_ske_ecdhe() 2520 tbslen = construct_key_exchange_tbs(s, &tbs, PACKET_data(¶ms), in tls_process_key_exchange() 2527 rv = EVP_DigestVerify(md_ctx, PACKET_data(&signature), in tls_process_key_exchange() [all …]
|
H A D | extensions_clnt.c | 1428 !s->ext.session_ticket_cb(ssl, PACKET_data(pkt), in tls_parse_stoc_session_ticket() 1542 PACKET_data(pkt), PACKET_remaining(pkt), in tls_parse_stoc_sct() 1601 PACKET_data(pkt), PACKET_remaining(pkt), in tls_parse_stoc_npn() 1661 if (memcmp(PACKET_data(pkt), PACKET_data(&protpkt), len) == 0) { in tls_parse_stoc_alpn() 1941 if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt), in tls_parse_stoc_key_share() 1956 const unsigned char *ct = PACKET_data(&encoded_pt); in tls_parse_stoc_key_share()
|
H A D | statem_lib.c | 883 ok = CRYPTO_memcmp(PACKET_data(pkt), s->s3.tmp.peer_finish_md, in tls_process_finished() 887 if ((PACKET_data(pkt)[0] ^ s->s3.tmp.peer_finish_md[0]) != 0xFF) { in tls_process_finished() 2903 … (unsigned char*)PACKET_data(pkt), comp_length) != (int)expected_length) { in tls13_process_compressed_certificate()
|
H A D | extensions.c | 697 thisex->type, PACKET_data(&thisex->data), in tls_collect_extensions() 777 PACKET_data(&currext->data), in tls_parse_extension()
|
H A D | statem_srvr.c | 3027 PACKET_data(&enc_premaster), in tls_process_cke_rsa() 3254 ptr = PACKET_data(pkt); in tls_process_cke_gost() 3265 if (!PACKET_forward(pkt, ptr - PACKET_data(pkt))) { in tls_process_cke_gost() 3360 start = PACKET_data(pkt); in tls_process_cke_gost18()
|
/openssl/test/ |
H A D | tls13ccstest.c | 144 && memcmp(chsessid, PACKET_data(&sessionid), in watchccs_write() 164 && memcmp(chsessid, PACKET_data(&sessionid), in watchccs_write()
|
H A D | packettest.c | 229 || !TEST_mem_eq(data, len, PACKET_data(&pkt), len) in test_PACKET_memdup() 233 || !TEST_mem_eq(data, len, PACKET_data(&pkt), len)) in test_PACKET_memdup()
|
H A D | quicapitest.c | 2066 TEST_mem_eq(PACKET_data(&pkt), PACKET_remaining(&pkt), NULL, 0); in tparam_on_enc_ext()
|
/openssl/test/helpers/ |
H A D | quictestlib.c | 885 ee.extensions = (unsigned char *)PACKET_data(&pkt); in handshake_mutate() 1005 start = PACKET_data(&sub); in qtest_fault_delete_extension() 1012 end = PACKET_data(&sub); in qtest_fault_delete_extension() 1018 if (!WPACKET_memcpy(&old_ext_wpkt, PACKET_data(&subext), in qtest_fault_delete_extension()
|
/openssl/ssl/ |
H A D | d1_lib.c | 555 data = PACKET_data(&msgpkt); in DTLSv1_listen() 639 if (ssl->ctx->app_verify_cookie_cb(ssl, PACKET_data(&cookiepkt), in DTLSv1_listen()
|
H A D | ssl_rsa.c | 621 *extension_data = PACKET_data(&data); in serverinfo_find_extension()
|
H A D | ssl_lib.c | 3560 *out = (unsigned char *)PACKET_data(&csubpkt); in SSL_select_next_proto() 3572 if (PACKET_equal(&csubpkt, PACKET_data(&ssubpkt), in SSL_select_next_proto() 3575 *out = (unsigned char *)PACKET_data(&ssubpkt); in SSL_select_next_proto() 6707 *out = PACKET_data(&sc->clienthello->ciphersuites); in SSL_client_hello_get0_ciphers() 6819 *out = PACKET_data(&r->data); in SSL_client_hello_get0_ext()
|
H A D | t1_lib.c | 2340 return tls_decrypt_ticket(s, PACKET_data(&ticketext->data), size, in tls_get_ticket_from_client()
|
/openssl/include/internal/ |
H A D | packet.h | 59 static ossl_inline const unsigned char *PACKET_data(const PACKET *pkt) in PACKET_data() function
|