Lines Matching refs:data
48 ret = ssl3_write_bytes(s, type, &s->init_buf->data[s->init_off],
62 (unsigned char *)&s->init_buf->data[s->init_off],
67 s->msg_callback(1, s->version, type, s->init_buf->data,
206 * Size of the to-be-signed TLS13 data, without the hash size itself:
231 /* Set the first 64 bytes of to-be-signed data to octet 32 */
302 /* Get the data to be signed */
400 const unsigned char *data;
479 if (!PACKET_get_bytes(pkt, &data, len)) {
509 BUF_reverse(gost_data, data, len);
510 data = gost_data;
531 if (EVP_DigestVerifyFinal(mctx, data, len) <= 0) {
536 j = EVP_DigestVerify(mctx, data, len, hdata, hdatalen);
791 * To get this far we must have read encrypted data from the client. We
1168 p = (unsigned char *)s->init_buf->data;
1203 s->init_msg = s->init_buf->data;
1251 s->init_msg = s->init_buf->data;
1263 s->init_msg = s->init_buf->data + SSL3_HM_HEADER_LENGTH;
1300 if (*(s->init_buf->data) == SSL3_MT_FINISHED && !ssl3_take_mac(s)) {
1308 if (!ssl3_finish_mac(s, (unsigned char *)s->init_buf->data,
1315 s->msg_callback(0, SSL2_VERSION, 0, s->init_buf->data,
1331 s->init_buf->data + SERVER_HELLO_RANDOM_OFFSET,
1333 if (!ssl3_finish_mac(s, (unsigned char *)s->init_buf->data,
1342 s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, s->init_buf->data,
1810 if (!PACKET_as_length_prefixed_1(&suppversions->data, &versionslist)) {
1811 /* Trailing or invalid data? */
1834 /* Trailing data? */
2229 || !ssl3_finish_mac(s, (unsigned char *)s->init_buf->data,
2349 /* Create a buffer containing data to be signed for server key exchange */