Lines Matching defs:data

165     OPENSSL_free(t->data);
211 t->data, t->dlen) <= 0)
272 uint8_t mtype, const unsigned char *data, size_t dlen)
312 if (!data) {
325 t->data = OPENSSL_malloc(dlen);
326 if (t->data == NULL) {
331 memcpy(t->data, data, dlen);
336 const unsigned char *p = data;
342 if (!d2i_X509(&cert, &p, ilen) || p < data ||
343 dlen != (size_t)(p - data)) {
363 * certificate, and just use the TLSA data as an opaque blob
391 if (!d2i_PUBKEY(&pkey, &p, ilen) || p < data ||
392 dlen != (size_t)(p - data)) {
1177 uint8_t *mtype, const unsigned char **data, size_t *dlen)
1190 if (data)
1191 *data = dane->mtlsa->data;
1204 uint8_t mtype, const unsigned char *data, size_t dlen)
1206 return dane_tlsa_add(&s->dane, usage, selector, mtype, data, dlen);
1626 * observed while scanning the new data. (Note that SSL_pending() is
1639 * processed or unprocessed data available or 0 otherwise (as opposed to the
1641 * account read_ahead data. A 1 return simply indicates that we have data.
1642 * That data may not result in any application data, or we may fail to parse
1646 /* Check buffered app data if any first */
1653 rdata = item->data;
2294 * We disable partial write for early data because we don't keep track
3018 * SSL_CTX_set_next_proto_select_cb. The protocol data is assumed to be a
3092 * SSL_get0_next_proto_negotiated sets *data and *len to point to the
3094 * client didn't request any protocol, then *data is set to NULL. Note that
3099 void SSL_get0_next_proto_negotiated(const SSL *s, const unsigned char **data,
3102 *data = s->ext.npn;
3103 if (*data == NULL) {
3239 * On return it sets |*data| to point to |*len| bytes of protocol name
3243 void SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
3246 *data = ssl->s3.alpn_selected;
3247 if (*data == NULL)
3496 * client that early data will be accepted when constructing a TLS 1.3
3497 * session ticket, and the client will accordingly send us early data
3498 * when using that ticket (if the client has early data to send).
3499 * However, in order for the early data to actually be consumed by
3501 * SSL_read_early_data(); otherwise we'll just skip past the early data
3504 * calls to SSL_CTX_set_max_early_data() in order to use early data,
3505 * eliminating the bandwidth-wasting early data in the case described
3884 * TLSv1.3 without early data because some applications just want to
4256 /* copy app data, a little dangerous perhaps */
5149 * Look for data collected during ServerHello and parse if found.
5600 *out = PACKET_data(&r->data);
5602 *outlen = PACKET_remaining(&r->data);