Lines Matching defs:data
330 * to fit one buffer into another. Size checks, ensuring that no data is
1477 * all application-set variables, function pointers and data.
1479 * If partial is non-zero, keep data in the input buffer and client ID.
1617 * all application-set variables, function pointers and data.
3485 * Session ticket if any, plus associated data
3677 * Session ticket and associated data
4262 * // serialized data.
4281 * serialized_session_tls12 data;
4283 * serialized_session_tls13 data;
4468 * We may have not been able to send to the peer all the handshake data
4472 * We proceed to the next handshake step only when all data from the
4477 * In the case of TLS 1.3, handshake step handlers do not send data to the
4815 * Opaque keys are not stored in the handshake's data and it's the user
4999 * The format of the serialized data is:
5006 * // serialized data.
5030 * 3. value can be re-derived from other data (eg session keys from MS)
5066 /* There must be no pending incoming or outgoing data */
5068 MBEDTLS_SSL_DEBUG_MSG(1, ("There is pending incoming data"));
5072 MBEDTLS_SSL_DEBUG_MSG(1, ("There is pending outgoing data"));
5110 * Session (length + data)
8577 * data.
8579 MBEDTLS_SSL_DEBUG_MSG(3, ("switching to new transform spec for outbound data"));
8827 * Some data just needs copying into the structure
9303 * For each step, prepend 1 byte with the length of the data as
9329 unsigned char *data, size_t data_len,
9351 data, data_len)) != PSA_SUCCESS) {
9385 unsigned char *data, size_t data_len,
9416 if ((ret = mbedtls_md_update(&ctx, data, data_len)) != 0) {