| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| packet_quic.h | 27 if (PACKET_remaining(pkt) < 1) 32 if (PACKET_remaining(pkt) < enclen) 52 if (PACKET_remaining(pkt) < 1) 57 if (PACKET_remaining(pkt) < enclen) 81 if (PACKET_remaining(pkt) < 1) 86 if (PACKET_remaining(pkt) < enclen)
|
| packet.h | 39 static ossl_inline size_t PACKET_remaining(const PACKET *pkt) 97 if (PACKET_remaining(pkt) != num) 110 if (PACKET_remaining(pkt) < len) 139 if (PACKET_remaining(pkt) < 2) 179 if (PACKET_remaining(pkt) < 3) 220 if (PACKET_remaining(pkt) < 4) 238 if (PACKET_remaining(pkt) < 8) 292 if (!PACKET_remaining(pkt)) 330 if (PACKET_remaining(pkt) < 4) 366 if (PACKET_remaining(pkt) < len [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| packettest.c | 22 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN) 24 || !TEST_size_t_eq(PACKET_remaining(&pkt), 1) 26 || !TEST_size_t_eq(PACKET_remaining(&pkt), 0)) 37 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN) 142 || !TEST_size_t_eq(PACKET_remaining(&subpkt), 0) 147 || !TEST_size_t_eq(PACKET_remaining(&subpkt), 0) 165 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN - 4) 172 || !TEST_false(PACKET_remaining(&pkt))) 189 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN - 4) 196 || !TEST_false(PACKET_remaining(&pkt)) [all...] |
| clienthellotest.c | 161 msglen = PACKET_remaining(&pkt); 178 while (PACKET_remaining(&pkt2)) {
|
| tls13ccstest.c | 107 while (PACKET_remaining(&pkt)) { 134 chsessidlen = PACKET_remaining(&sessionid); 142 if (PACKET_remaining(&sessionid) != chsessidlen 163 if (PACKET_remaining(&sessionid) != chsessidlen
|
| servername_test.c | 73 while (PACKET_remaining(&pkt2)) { 79 || !TEST_uint_ne(PACKET_remaining(&pkt4), 0) 83 || !TEST_uint_le(PACKET_remaining(&pkt5), TLSEXT_MAXLEN_host_name)
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| packettest.c | 22 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN) 24 || !TEST_size_t_eq(PACKET_remaining(&pkt), 1) 26 || !TEST_size_t_eq(PACKET_remaining(&pkt), 0)) 37 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN) 142 || !TEST_size_t_eq(PACKET_remaining(&subpkt), 0) 147 || !TEST_size_t_eq(PACKET_remaining(&subpkt), 0) 165 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN -4) 172 || !TEST_false(PACKET_remaining(&pkt))) 189 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN - 4) 196 || !TEST_false(PACKET_remaining(&pkt)) [all...] |
| clienthellotest.c | 200 msglen = PACKET_remaining(&pkt); 218 while (PACKET_remaining(&pkt2)) {
|
| tls13ccstest.c | 107 while (PACKET_remaining(&pkt)) { 134 chsessidlen = PACKET_remaining(&sessionid); 142 if (PACKET_remaining(&sessionid) != chsessidlen 162 if (PACKET_remaining(&sessionid) != chsessidlen
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| packettest.c | 22 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN) 24 || !TEST_size_t_eq(PACKET_remaining(&pkt), 1) 26 || !TEST_size_t_eq(PACKET_remaining(&pkt), 0)) 37 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN) 142 || !TEST_size_t_eq(PACKET_remaining(&subpkt), 0) 147 || !TEST_size_t_eq(PACKET_remaining(&subpkt), 0) 165 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN -4) 172 || !TEST_false(PACKET_remaining(&pkt))) 189 || !TEST_size_t_eq(PACKET_remaining(&pkt), BUF_LEN - 4) 196 || !TEST_false(PACKET_remaining(&pkt)) [all...] |
| clienthellotest.c | 195 msglen = PACKET_remaining(&pkt); 213 while (PACKET_remaining(&pkt2)) {
|
| tls13ccstest.c | 107 while (PACKET_remaining(&pkt)) { 134 chsessidlen = PACKET_remaining(&sessionid); 142 if (PACKET_remaining(&sessionid) != chsessidlen 162 if (PACKET_remaining(&sessionid) != chsessidlen
|
| /src/crypto/external/bsd/openssl/dist/include/internal/ |
| packet.h | 39 static ossl_inline size_t PACKET_remaining(const PACKET *pkt) 97 if (PACKET_remaining(pkt) != num) 110 if (PACKET_remaining(pkt) < len) 139 if (PACKET_remaining(pkt) < 2) 179 if (PACKET_remaining(pkt) < 3) 220 if (PACKET_remaining(pkt) < 4) 238 if (PACKET_remaining(pkt) < 8) 292 if (!PACKET_remaining(pkt)) 330 if (PACKET_remaining(pkt) < 4) 366 if (PACKET_remaining(pkt) < len [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| packet_local.h | 38 static ossl_inline size_t PACKET_remaining(const PACKET *pkt) 96 if (PACKET_remaining(pkt) != num) 109 if (PACKET_remaining(pkt) < len) 138 if (PACKET_remaining(pkt) < 2) 178 if (PACKET_remaining(pkt) < 3) 219 if (PACKET_remaining(pkt) < 4) 237 if (PACKET_remaining(pkt) < 8) 291 if (!PACKET_remaining(pkt)) 329 if (PACKET_remaining(pkt) < 4) 365 if (PACKET_remaining(pkt) < len [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| extensions_srvr.c | 102 || PACKET_remaining(&sni) == 0) { 130 if (PACKET_remaining(&hostname) > TLSEXT_MAXLEN_host_name) { 171 if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) { 234 || PACKET_remaining(&ec_point_format_list) == 0) { 256 PACKET_remaining(pkt), 273 || PACKET_remaining(&supported_sig_algs) == 0) { 292 || PACKET_remaining(&supported_sig_algs) == 0) { 342 if (PACKET_remaining(&responder_id_list) > 0) { 352 while (PACKET_remaining(&responder_id_list) > 0) { 358 || PACKET_remaining(&responder_id) == 0) [all...] |
| extensions_clnt.c | 1227 if (PACKET_remaining(pkt) != ilen) { 1262 if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) { 1303 if (PACKET_remaining(pkt) > 0) { 1334 ecpointformats_len = PACKET_remaining(&ecptformatlist); 1367 PACKET_remaining(pkt), 1377 if (PACKET_remaining(pkt) > 0) { 1404 if (!SSL_IS_TLS13(s) && PACKET_remaining(pkt) > 0) { 1443 size_t size = PACKET_remaining(pkt); 1479 PACKET_data(pkt), PACKET_remaining(pkt), 1501 while (PACKET_remaining(pkt)) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| extensions_srvr.c | 105 || PACKET_remaining(&sni) == 0) { 135 if (PACKET_remaining(&hostname) > TLSEXT_MAXLEN_host_name) { 185 if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) { 254 || PACKET_remaining(&ec_point_format_list) == 0) { 279 PACKET_remaining(pkt), 295 || PACKET_remaining(&supported_sig_algs) == 0) { 316 || PACKET_remaining(&supported_sig_algs) == 0) { 370 if (PACKET_remaining(&responder_id_list) > 0) { 381 while (PACKET_remaining(&responder_id_list) > 0) { 387 || PACKET_remaining(&responder_id) == 0) [all...] |
| statem_clnt.c | 1308 cookie_len = PACKET_remaining(&cookiepkt); 1423 && PACKET_remaining(pkt) >= SSL3_RANDOM_SIZE 1451 session_id_len = PACKET_remaining(&session_id); 1472 if (PACKET_remaining(pkt) == 0 && !hrr) { 1475 || PACKET_remaining(pkt) != 0) { 1842 || PACKET_remaining(pkt) != cert_list_len 1843 || PACKET_remaining(pkt) == 0) { 1848 for (chainidx = 0; PACKET_remaining(pkt); chainidx++) { 1886 PACKET_remaining(pkt) == 0)) { 2012 if (PACKET_remaining(&psk_identity_hint) > PSK_MAX_IDENTITY_LEN) [all...] |
| extensions_clnt.c | 1261 if (PACKET_remaining(pkt) != ilen) { 1300 if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) { 1345 if (PACKET_remaining(pkt) > 0) { 1381 ecpointformats_len = PACKET_remaining(&ecptformatlist); 1418 PACKET_remaining(pkt), 1430 if (PACKET_remaining(pkt) > 0) { 1460 if (!SSL_IS_TLS13(s) && PACKET_remaining(pkt) > 0) { 1501 size_t size = PACKET_remaining(pkt); 1540 PACKET_data(pkt), PACKET_remaining(pkt), 1562 while (PACKET_remaining(pkt)) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ |
| asn1_dsa.c | 205 if (PACKET_remaining(&tmppkt) > 0 && tmp == 0) { 212 (int)PACKET_remaining(&contpkt), n) 247 || PACKET_remaining(&contpkt) != 0)
|
| /src/crypto/external/bsd/openssl/dist/crypto/ |
| asn1_dsa.c | 205 if (PACKET_remaining(&tmppkt) > 0 && tmp == 0) { 212 (int)PACKET_remaining(&contpkt), n) == NULL) 246 || PACKET_remaining(&contpkt) != 0)
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| qlog_event_helpers.c | 477 PACKET_remaining(&orig_pkt)); 479 ignore_res(PACKET_forward(pkt, PACKET_remaining(pkt))); 491 rem_before = PACKET_remaining(pkt); 496 rem_after = PACKET_remaining(pkt); 512 while (PACKET_remaining(&pkt) > 0) { 516 if (adv > PACKET_remaining(&pkt)) 517 adv = PACKET_remaining(&pkt);
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| extensions_srvr.c | 113 || PACKET_remaining(&sni) == 0) { 141 if (PACKET_remaining(&hostname) > TLSEXT_MAXLEN_host_name) { 183 if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) { 247 || PACKET_remaining(&ec_point_format_list) == 0) { 268 if (s->ext.session_ticket_cb && !s->ext.session_ticket_cb(SSL_CONNECTION_GET_USER_SSL(s), PACKET_data(pkt), PACKET_remaining(pkt), s->ext.session_ticket_cb_arg)) { 284 || PACKET_remaining(&supported_sig_algs) == 0) { 309 || PACKET_remaining(&supported_sig_algs) == 0) { 366 if (PACKET_remaining(&responder_id_list) > 0) { 376 while (PACKET_remaining(&responder_id_list) > 0) { 382 || PACKET_remaining(&responder_id) == 0) [all...] |
| extensions_clnt.c | 1326 if (PACKET_remaining(pkt) != ilen) { 1364 if (PACKET_remaining(pkt) != 1 || !PACKET_get_1(pkt, &value)) { 1406 if (PACKET_remaining(pkt) > 0) { 1438 ecpointformats_len = PACKET_remaining(&ecptformatlist); 1472 if (s->ext.session_ticket_cb != NULL && !s->ext.session_ticket_cb(ssl, PACKET_data(pkt), PACKET_remaining(pkt), s->ext.session_ticket_cb_arg)) { 1481 if (PACKET_remaining(pkt) > 0) { 1509 if (!SSL_CONNECTION_IS_TLS13(s) && PACKET_remaining(pkt) > 0) { 1547 size_t size = PACKET_remaining(pkt); 1585 PACKET_data(pkt), PACKET_remaining(pkt), 1606 while (PACKET_remaining(pkt)) [all...] |
| /src/crypto/external/apache2/openssl/dist/fuzz/ |
| quic-srtm.c | 63 while (PACKET_remaining(&pkt) > 0) {
|