SSL3_RT_HEADER_LENGTH
const size_t prepend_length = SSL3_RT_HEADER_LENGTH;
const size_t prepend_length = SSL3_RT_HEADER_LENGTH;
(SSL3_RT_MAX_ENCRYPTED_LENGTH + SSL3_RT_HEADER_LENGTH)
unsigned char dummyrec[SSL3_RT_HEADER_LENGTH];
SSL3_RT_HEADER_LENGTH, rl->cbarg);
unsigned char dummyrec[SSL3_RT_HEADER_LENGTH];
SSL3_RT_HEADER_LENGTH, rl->cbarg);
|| hdrlen != SSL3_RT_HEADER_LENGTH
unsigned char recheader[SSL3_RT_HEADER_LENGTH];
+ SSL3_RT_HEADER_LENGTH \
+ SSL3_RT_HEADER_LENGTH)
+ SSL3_RT_HEADER_LENGTH \
+ SSL3_RT_HEADER_LENGTH)
align = (size_t)TLS_BUFFER_get_buf(wb) + SSL3_RT_HEADER_LENGTH;
headerlen = SSL3_RT_HEADER_LENGTH;
align += rl->isdtls ? DTLS1_RT_HEADER_LENGTH : SSL3_RT_HEADER_LENGTH;
: SSL3_RT_HEADER_LENGTH;
headerlen = SSL3_RT_HEADER_LENGTH;
align = (size_t)rb->buf + SSL3_RT_HEADER_LENGTH;
if (left < SSL3_RT_HEADER_LENGTH)
if (left < SSL3_RT_HEADER_LENGTH + len)
if ((rl->rstate != SSL_ST_READ_BODY) || (rl->packet_length < SSL3_RT_HEADER_LENGTH)) {
rret = rl->funcs->read_n(rl, SSL3_RT_HEADER_LENGTH,
if (thisrr->length > TLS_BUFFER_get_len(rbuf) - SSL3_RT_HEADER_LENGTH) {
- SSL3_RT_HEADER_LENGTH;
thisrr->input = &(rl->packet[SSL3_RT_HEADER_LENGTH]);
if (msglen < (size_t)(SSL_CONNECTION_IS_DTLS(sc) ? DTLS1_RT_HEADER_LENGTH : SSL3_RT_HEADER_LENGTH)) {
written += SSL3_RT_HEADER_LENGTH;
|| !PACKET_forward(&pkt, SSL3_RT_HEADER_LENGTH))
unsigned char header[SSL3_RT_HEADER_LENGTH];
if (!BIO_write_ex(b, header, SSL3_RT_HEADER_LENGTH, &written)
|| written != SSL3_RT_HEADER_LENGTH)
|| !PACKET_forward(&pkt, SSL3_RT_HEADER_LENGTH)
unsigned char dummyheader[SSL3_RT_HEADER_LENGTH] = {
|| !TEST_size_t_eq(written, SSL3_RT_HEADER_LENGTH))
|| !TEST_size_t_gt(rawread, SSL3_RT_HEADER_LENGTH))
eoedlen = SSL3_RT_HEADER_LENGTH + (data[3] << 8 | data[4]);
|| !PACKET_forward(&pkt, SSL3_RT_HEADER_LENGTH)
|| !TEST_size_t_gt(readbytes, SSL3_RT_HEADER_LENGTH))
partial_len = SSL3_RT_HEADER_LENGTH - 1;
partial_len = SSL3_RT_HEADER_LENGTH;