PACKET_data
if (BN_bin2bn(PACKET_data(&contpkt),
consumed = PACKET_data(&pkt) - *ppin;
data = PACKET_data(&msgpkt);
if (ssl->ctx->app_verify_cookie_cb(ssl, PACKET_data(&cookiepkt),
QLOG_BIN("data", PACKET_data(&orig_pkt),
const unsigned char *sop = PACKET_data(pkt);
eop = PACKET_data(pkt);
assert(eop != NULL && eop >= PACKET_data(pkt));
ignore_res(PACKET_forward(pkt, eop - PACKET_data(pkt)));
assert(eop >= PACKET_data(pkt));
ignore_res(PACKET_forward(pkt, eop - PACKET_data(pkt)));
sop = PACKET_data(&pkt);
sof = PACKET_data(pkt);
size_t framelen = PACKET_data(pkt) - sof;
f->data = PACKET_data(pkt);
*token = PACKET_data(pkt);
f->data = PACKET_data(pkt);
const unsigned char *start = PACKET_data(pkt), *end = PACKET_end(pkt),
ptrs->raw_start = (unsigned char *)PACKET_data(pkt);
pn = (unsigned char *)PACKET_data(pkt);
hdr->data = PACKET_data(pkt);
hdr->data = PACKET_data(pkt);
hdr->data = PACKET_data(pkt);
pn = (unsigned char *)PACKET_data(pkt);
hdr->data = PACKET_data(pkt);
*out = (unsigned char *)PACKET_data(&csubpkt);
if (PACKET_equal(&csubpkt, PACKET_data(&ssubpkt),
*out = (unsigned char *)PACKET_data(&ssubpkt);
*out = PACKET_data(&sc->clienthello->ciphersuites);
*out = PACKET_data(&r->data);
*extension_data = PACKET_data(&data);
thisex->type, PACKET_data(&thisex->data),
PACKET_data(&currext->data),
if (s->ext.session_ticket_cb != NULL && !s->ext.session_ticket_cb(ssl, PACKET_data(pkt), PACKET_remaining(pkt), s->ext.session_ticket_cb_arg)) {
PACKET_data(pkt), PACKET_remaining(pkt),
PACKET_data(pkt), PACKET_remaining(pkt),
if (memcmp(PACKET_data(pkt), PACKET_data(&protpkt), len) == 0) {
if (tls13_set_encoded_pub_key(skey, PACKET_data(&encoded_pt),
const unsigned char *ct = PACKET_data(&encoded_pt);
data = PACKET_data(&raw);
mdin = PACKET_data(&raw);
ciphdata = PACKET_data(&cookie);
PACKET_data(&appcookie),
if (!create_synthetic_message_hash(s, PACKET_data(&chhash),
tmpsess = lookup_sess_in_cache(s, PACKET_data(tick),
&& !s->psk_find_session_cb(ussl, PACKET_data(&identity), idlen,
ret = tls_decrypt_ticket(s, PACKET_data(&identity),
binderoffset = PACKET_data(pkt) - (const unsigned char *)s->init_buf->data;
binderoffset, PACKET_data(&binder), NULL, sess, 0,
if (s->ext.session_ticket_cb && !s->ext.session_ticket_cb(SSL_CONNECTION_GET_USER_SSL(s), PACKET_data(pkt), PACKET_remaining(pkt), s->ext.session_ticket_cb_arg)) {
id_data = PACKET_data(&responder_id);
const unsigned char *ext_data = PACKET_data(&exts);
PACKET_data(encoded_pubkey),
&& memcmp(hrrrandom, PACKET_data(pkt), SSL3_RANDOM_SIZE) == 0) {
|| memcmp(PACKET_data(&session_id), s->tmp_session_id,
&& memcmp(PACKET_data(&session_id), s->session->session_id,
memcpy(s->session->session_id, PACKET_data(&session_id),
if ((s->srp_ctx.N = BN_bin2bn(PACKET_data(&prime),
|| (s->srp_ctx.g = BN_bin2bn(PACKET_data(&generator),
|| (s->srp_ctx.s = BN_bin2bn(PACKET_data(&salt),
|| (s->srp_ctx.B = BN_bin2bn(PACKET_data(&server_pub),
p = BN_bin2bn(PACKET_data(&prime), (int)PACKET_remaining(&prime), NULL);
g = BN_bin2bn(PACKET_data(&generator), (int)PACKET_remaining(&generator),
bnpub_key = BN_bin2bn(PACKET_data(&pub_key),
PACKET_data(&encoded_pt),
tbslen = construct_key_exchange_tbs(s, &tbs, PACKET_data(¶ms),
rv = EVP_DigestVerify(md_ctx, PACKET_data(&signature),
PACKET_data(&nonce),
(unsigned char *)PACKET_data(pkt), comp_length)
ok = CRYPTO_memcmp(PACKET_data(pkt), s->s3.tmp.peer_finish_md,
if ((PACKET_data(pkt)[0] ^ s->s3.tmp.peer_finish_md[0]) != 0xFF) {
PACKET_data(&enc_premaster),
ptr = PACKET_data(pkt);
if (!PACKET_forward(pkt, ptr - PACKET_data(pkt))) {
start = PACKET_data(pkt);
return tls_decrypt_ticket(s, PACKET_data(&ticketext->data), size,
start = PACKET_data(&sub);
end = PACKET_data(&sub);
if (!WPACKET_memcpy(&old_ext_wpkt, PACKET_data(&subext),
ee.extensions = (unsigned char *)PACKET_data(&pkt);
|| !TEST_mem_eq(data, len, PACKET_data(&pkt), len)
|| !TEST_mem_eq(data, len, PACKET_data(&pkt), len))
TEST_mem_eq(PACKET_data(&pkt), PACKET_remaining(&pkt), NULL, 0);
&& memcmp(chsessid, PACKET_data(&sessionid),
&& memcmp(chsessid, PACKET_data(&sessionid),