SSL3_HM_HEADER_LENGTH
#define MAX_HRR_SIZE (SSL3_HM_HEADER_LENGTH + 2 + SSL3_RANDOM_SIZE + 1 \
&& !grow_init_buf(s, s->s3.tmp.message_size + SSL3_HM_HEADER_LENGTH)) {
s->init_num + SSL3_HM_HEADER_LENGTH)) {
while (s->init_num < SSL3_HM_HEADER_LENGTH) {
SSL3_HM_HEADER_LENGTH - s->init_num,
p, SSL3_HM_HEADER_LENGTH, ussl,
l = s->rlayer.tlsrecs[0].length + SSL3_HM_HEADER_LENGTH;
s->init_num = SSL3_HM_HEADER_LENGTH;
if (l > (INT_MAX - SSL3_HM_HEADER_LENGTH)) {
s->init_msg = s->init_buf->data + SSL3_HM_HEADER_LENGTH;
#define SERVER_HELLO_RANDOM_OFFSET (SSL3_HM_HEADER_LENGTH + 2)
s->init_num + SSL3_HM_HEADER_LENGTH)) {
(size_t)s->init_num + SSL3_HM_HEADER_LENGTH, ussl,
unsigned char msghdr[SSL3_HM_HEADER_LENGTH];
msghdr[SSL3_HM_HEADER_LENGTH - 1] = (unsigned char)hashlen;
if (!ssl3_finish_mac(s, msghdr, SSL3_HM_HEADER_LENGTH)
+ SSL3_HM_HEADER_LENGTH))) {
&& s->init_num >= SSL3_HM_HEADER_LENGTH) {
if (msglen < SSL3_HM_HEADER_LENGTH
s->init_msg = s->init_buf->data + SSL3_HM_HEADER_LENGTH;
SSL3_HM_HEADER_LENGTH - 1)
if (!TEST_true(PACKET_forward(&pkt, SSL3_HM_HEADER_LENGTH))
if (!qtest_fault_resize_handshake(fault, newlen + SSL3_HM_HEADER_LENGTH))
if ((size_t)(end - start) + SSL3_HM_HEADER_LENGTH > msglen)
msglen -= (end - start) + SSL3_HM_HEADER_LENGTH;
datalen - SSL3_HM_HEADER_LENGTH)))
|| !TEST_true(PACKET_forward(&pkt, SSL3_HM_HEADER_LENGTH))
|| !TEST_true(PACKET_forward(&pkt, SSL3_HM_HEADER_LENGTH))