DTLS1_HM_HEADER_LENGTH
header_length = DTLS1_HM_HEADER_LENGTH;
if (!CBB_init_fixed(&cbb, p, DTLS1_HM_HEADER_LENGTH))
(int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH);
if (curr_mtu <= DTLS1_HM_HEADER_LENGTH) {
OPENSSL_assert(s->init_off > DTLS1_HM_HEADER_LENGTH);
s->init_off -= DTLS1_HM_HEADER_LENGTH;
s->init_num += DTLS1_HM_HEADER_LENGTH;
len - DTLS1_HM_HEADER_LENGTH);
OPENSSL_assert(len >= DTLS1_HM_HEADER_LENGTH);
p += DTLS1_HM_HEADER_LENGTH;
xlen = ret - DTLS1_HM_HEADER_LENGTH;
frag_off += (ret -= DTLS1_HM_HEADER_LENGTH);
s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH;
msg_len += DTLS1_HM_HEADER_LENGTH;
s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH;
msg_len + DTLS1_HM_HEADER_LENGTH)) {
unsigned char *p = (unsigned char *)s->init_buf->data + DTLS1_HM_HEADER_LENGTH;
max_len = DTLS1_HM_HEADER_LENGTH + SSL3_RT_MAX_ENCRYPTED_LENGTH;
unsigned char wire[DTLS1_HM_HEADER_LENGTH];
DTLS1_HM_HEADER_LENGTH, 0);
DTLS1_HM_HEADER_LENGTH, s,
unsigned char *p = (unsigned char *)s->init_buf->data + DTLS1_HM_HEADER_LENGTH;
(is_ccs ? DTLS1_CCS_HEADER_LENGTH : DTLS1_HM_HEADER_LENGTH) ==
return (SSL_is_dtls(s) ? DTLS1_HM_HEADER_LENGTH :
if (!CBB_add_space(handshake, &data, DTLS1_HM_HEADER_LENGTH -
#define DTLS_HM_OFFSET (DTLS1_RT_HEADER_LENGTH + DTLS1_HM_HEADER_LENGTH)