Lines Matching defs:out
339 coap_dgram_read(BIO *a, char *out, int outl) {
343 if (out != NULL) {
346 memcpy(out, data->pdu, outl);
349 memcpy(out, data->pdu, data->pdu_len);
726 coap_sock_read(BIO *a, char *out, int outl) {
730 if (out != NULL) {
731 ret =(int)session->sock.lfunc[COAP_LAYER_TLS].l_read(session, (u_char *)out,
1061 const unsigned char **out,
1077 *out = tout;
1087 /* Flush out existing errors */
2324 const unsigned char *out;
2350 size_t len = SSL_client_hello_get0_ciphers(ssl, &out);
2354 if (len && SSL_bytes_to_cipher_list(ssl, out, len,
2398 &out, &outlen)) {
2401 switch (out[ii]) {
2432 if (SSL_client_hello_get0_ext(ssl, TLSEXT_TYPE_server_name, &out, &outlen) &&
2434 (((out[0]<<8) + out[1] +2) == (int)outlen) &&
2435 out[2] == TLSEXT_NAMETYPE_host_name &&
2436 (((out[3]<<8) + out[4] +2 +3) == (int)outlen)) {
2438 out += 5;
2442 memcpy(sni_tmp, out, outlen);
2528 const unsigned char *out;
2552 if (SSL_client_hello_get0_ext(ssl, TLSEXT_TYPE_server_name, &out, &outlen) &&
2554 (((out[0]<<8) + out[1] +2) == (int)outlen) &&
2555 out[2] == TLSEXT_NAMETYPE_host_name &&
2556 (((out[3]<<8) + out[4] +2 +3) == (int)outlen)) {
2558 out += 5;
2563 memcpy(sni_tmp, out, outlen);
3095 * return 1 timed out
3096 * 0 still timing out
3134 /* Got a ClientHello, sent-out a VerifyRequest */