* Peeks ahead into "read_ahead" data to see if we have a whole record waiting
* for us in the buffer.
*/
-static int have_whole_app_data_record_waiting(SSL *s)
+static int ssl3_record_app_data_waiting(SSL *s)
{
SSL3_BUFFER *rbuf;
int left, len;
&& s->enc_read_ctx != NULL
&& (EVP_CIPHER_flags(EVP_CIPHER_CTX_cipher(s->enc_read_ctx))
& EVP_CIPH_FLAG_PIPELINE)
- && have_whole_app_data_record_waiting(s));
+ && ssl3_record_app_data_waiting(s));
/*
}
/*-
- * ssl3_enc encrypts/decrypts the record in |s->wrec| / |s->rrec|, respectively.
+ * ssl3_enc encrypts/decrypts |numpipes| records in |inrecs|
*
* Returns:
* 0: (in non-constant time) if the record is publically invalid (i.e. too
}
/*-
- * tls1_enc encrypts/decrypts the record in |s->wrec| / |s->rrec|, respectively.
+ * tls1_enc encrypts/decrypts |numpipes| in |recs|.
*
* Returns:
* 0: (in non-constant time) if the record is publically invalid (i.e. too