Lines Matching refs:fragment
75 /* zero length fragment gets zero frag->fragment */
76 frag->fragment = buf;
103 OPENSSL_free(frag->fragment);
155 /* We must be writing a fragment other than the first one */
158 /* This is the first attempt at writing out this fragment */
162 * Each fragment that was already sent must at least have
173 * message header for this fragment.
180 * fragment offset from our last attempt. We do not need
285 * single fragment
320 * We save the fragment offset for the next fragment so we have it
322 * next fragment yet so just set that to 0 for now. It will be
346 /* bad fragment received */
454 if (s->d1->r_msg_hdr.frag_off == 0) { /* first fragment */
482 * Returns 1 if there is a buffered fragment available, 0 if not, or -1 on a
488 * (0) check whether the desired fragment is available
490 * (1) copy over the fragment to s->init_buf->data[]
569 memcpy(&p[frag->msg_header.frag_off], frag->fragment,
660 /* read the body of the fragment (header has already been read */
662 frag->fragment + msg_hdr->frag_off,
728 * If we already have an entry and this one is a fragment, don't discard
770 * read the body of the fragment (header has already been read
773 frag->fragment, frag_len, 0,
818 /* see if we have the required fragment already */
860 /* parse the message fragment header */
954 * XDTLS: an incorrectly formatted fragment should cause the handshake
1129 memcpy(frag->fragment, s->init_buf->data, s->init_num);
1213 memcpy(s->init_buf->data, frag->fragment,