DTLS1_RT_HEADER_LENGTH
buf = OPENSSL_malloc(DTLS1_RT_HEADER_LENGTH + SSL3_RT_MAX_PLAIN_LENGTH);
wbuf = OPENSSL_malloc(DTLS1_RT_HEADER_LENGTH + SSL3_RT_MAX_PLAIN_LENGTH);
n = BIO_read(rbio, buf, SSL3_RT_MAX_PLAIN_LENGTH + DTLS1_RT_HEADER_LENGTH);
if (n < DTLS1_RT_HEADER_LENGTH) {
DTLS1_RT_HEADER_LENGTH, ssl, s->msg_callback_arg);
+ DTLS1_RT_HEADER_LENGTH,
memcpy(&wbuf[DTLS1_RT_HEADER_LENGTH + 1],
&wbuf[DTLS1_RT_HEADER_LENGTH + DTLS1_HM_HEADER_LENGTH - 3],
DTLS1_RT_HEADER_LENGTH, ssl,
if (ext_overhead + DTLS1_RT_HEADER_LENGTH >= mtu)
mtu -= ext_overhead + DTLS1_RT_HEADER_LENGTH;
rr->input = &(rl->packet[DTLS1_RT_HEADER_LENGTH]);
if ((rl->rstate != SSL_ST_READ_BODY) || (rl->packet_length < DTLS1_RT_HEADER_LENGTH)) {
rret = rl->funcs->read_n(rl, DTLS1_RT_HEADER_LENGTH,
if (rl->packet_length != DTLS1_RT_HEADER_LENGTH) {
rl->msg_callback(0, rr->rec_version, SSL3_RT_HEADER, rl->packet, DTLS1_RT_HEADER_LENGTH,
if (rr->length > rl->packet_length - DTLS1_RT_HEADER_LENGTH) {
return DTLS1_RT_HEADER_LENGTH + rl->eivlen + blocksize + rl->taglen;
headerlen = DTLS1_RT_HEADER_LENGTH + 1;
align += rl->isdtls ? DTLS1_RT_HEADER_LENGTH : SSL3_RT_HEADER_LENGTH;
size_t headerlen = rl->isdtls ? DTLS1_RT_HEADER_LENGTH
headerlen = DTLS1_RT_HEADER_LENGTH;
if (msglen < (size_t)(SSL_CONNECTION_IS_DTLS(sc) ? DTLS1_RT_HEADER_LENGTH : SSL3_RT_HEADER_LENGTH)) {
if (!PACKET_forward(&pkt, DTLS1_RT_HEADER_LENGTH - 3))
#define MAC_OFFSET (DTLS1_RT_HEADER_LENGTH + DTLS1_HM_HEADER_LENGTH)
if (!PACKET_forward(&pkt, DTLS1_RT_HEADER_LENGTH - 3))
if (rem < DTLS1_RT_HEADER_LENGTH) {
rec += DTLS1_RT_HEADER_LENGTH;
rem -= DTLS1_RT_HEADER_LENGTH;
if (rem < DTLS1_RT_HEADER_LENGTH)
+ DTLS1_RT_HEADER_LENGTH;
if (rem < DTLS1_RT_HEADER_LENGTH)
+ DTLS1_RT_HEADER_LENGTH;
+ DTLS1_RT_HEADER_LENGTH;