Lines Matching refs:in_msg
2707 ssl->in_msg[0] == MBEDTLS_SSL_HS_FINISHED) {
2723 ssl->in_msg[0] == MBEDTLS_SSL_HS_FINISHED) {
3091 memcmp(ssl->in_msg + 6, "\0\0\0", 3) != 0 ||
3092 memcmp(ssl->in_msg + 9, ssl->in_msg + 1, 3) != 0) {
3100 return MBEDTLS_GET_UINT24_BE(ssl->in_msg, 9);
3105 return MBEDTLS_GET_UINT24_BE(ssl->in_msg, 6);
3218 return MBEDTLS_GET_UINT24_BE(ssl->in_msg, 1);
3234 ssl->in_msglen, ssl->in_msg[0], ssl->in_hslen));
3239 unsigned int recv_msg_seq = MBEDTLS_GET_UINT16_BE(ssl->in_msg, 4);
3250 ssl->in_msg[0] != MBEDTLS_SSL_HS_CLIENT_HELLO))) {
3264 ssl->in_msg[0] != MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST) {
3310 ret = ssl->handshake->update_checksum(ssl, ssl->in_msg, ssl->in_hslen);
3935 * Check for an epoch 0 ClientHello. We can't use in_msg here to
4303 ssl->in_msg[0] = 1;
4349 memcpy(ssl->in_msg, hs_buf->data, ssl->in_hslen);
4430 unsigned recv_msg_seq = MBEDTLS_GET_UINT16_BE(ssl->in_msg, 4);
4546 memcpy(hs_buf->data, ssl->in_msg, 6);
4555 if (memcmp(hs_buf->data, ssl->in_msg, 4) != 0) {
4578 memcpy(msg + frag_off, ssl->in_msg + 12, frag_len);
4666 memmove(ssl->in_msg, ssl->in_msg + ssl->in_hslen,
4670 ssl->in_msg, ssl->in_msglen);
4891 ssl->in_iv = ssl->in_msg = ssl->in_len + 2;
5020 ssl->in_msg = rec.buf + rec.data_offset;
5047 if (ssl->in_msg[0] != 1) {
5049 ssl->in_msg[0]));
5093 ssl->in_msg[0], ssl->in_msg[1]));
5098 if (ssl->in_msg[0] == MBEDTLS_SSL_ALERT_LEVEL_FATAL) {
5100 ssl->in_msg[1]));
5104 if (ssl->in_msg[0] == MBEDTLS_SSL_ALERT_LEVEL_WARNING &&
5105 ssl->in_msg[1] == MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY) {
5111 if (ssl->in_msg[0] == MBEDTLS_SSL_ALERT_LEVEL_WARNING &&
5112 ssl->in_msg[1] == MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION) {
5323 * and ssl->in_msg pointing to the beginning of the record
5326 * When decrypting a protected record, ssl->in_msg
5357 ssl->in_msg = ssl->in_iv;
5579 (ssl->in_msg[0] != MBEDTLS_SSL_HS_NEW_SESSION_TICKET)) {
5636 (ssl->in_msg[0] != MBEDTLS_SSL_HS_HELLO_REQUEST ||
5652 ssl->in_msg[0] != MBEDTLS_SSL_HS_CLIENT_HELLO) {
5915 ssl->in_offt = ssl->in_msg;