Lines Matching defs:out

461     /* Figure out if we're doing DTLS versions or TLS versions */
993 * any new session built out of this id/id_len and the ssl_version in use
3035 int SSL_select_next_proto(unsigned char **out, unsigned char *outlen,
3045 *out = NULL;
3054 *out = (unsigned char *)PACKET_data(&csubpkt);
3069 *out = (unsigned char *)PACKET_data(&ssubpkt);
3114 * returned by setting |out| to point to it and |outlen| to its length. This
3130 * client needs to select a protocol from the server's provided list. |out|
3253 int SSL_export_keying_material(SSL *s, unsigned char *out, size_t olen,
3262 return s->method->ssl3_enc->export_keying_material(s, out, olen, label,
3267 int SSL_export_keying_material_early(SSL *s, unsigned char *out, size_t olen,
3275 return tls13_export_keying_material_early(s, out, olen, label, llen,
4619 size_t SSL_get_client_random(const SSL *ssl, unsigned char *out, size_t outlen)
4625 memcpy(out, ssl->s3.client_random, outlen);
4629 size_t SSL_get_server_random(const SSL *ssl, unsigned char *out, size_t outlen)
4635 memcpy(out, ssl->s3.server_random, outlen);
4640 unsigned char *out, size_t outlen)
4646 memcpy(out, session->master_key, outlen);
4947 int ssl_handshake_hash(SSL *s, unsigned char *out, size_t outlen,
4967 || EVP_DigestFinal_ex(ctx, out, NULL) <= 0) {
5399 * when some are invalid, and < 0 on various internal errors (out of
5402 * Therefore, we error out only in the unexpected case that the return
5409 * ought to correspond to an inability to carry out its duties.
5514 size_t SSL_client_hello_get0_random(SSL *s, const unsigned char **out)
5518 if (out != NULL)
5519 *out = s->clienthello->random;
5523 size_t SSL_client_hello_get0_session_id(SSL *s, const unsigned char **out)
5527 if (out != NULL)
5528 *out = s->clienthello->session_id;
5532 size_t SSL_client_hello_get0_ciphers(SSL *s, const unsigned char **out)
5536 if (out != NULL)
5537 *out = PACKET_data(&s->clienthello->ciphersuites);
5541 size_t SSL_client_hello_get0_compression_methods(SSL *s, const unsigned char **out)
5545 if (out != NULL)
5546 *out = s->clienthello->compressions;
5550 int SSL_client_hello_get1_extensions_present(SSL *s, int **out, size_t *outlen)
5556 if (s->clienthello == NULL || out == NULL || outlen == NULL)
5564 *out = NULL;
5580 *out = present;
5588 int SSL_client_hello_get0_ext(SSL *s, unsigned int type, const unsigned char **out,
5599 if (out != NULL)
5600 *out = PACKET_data(&r->data);
5642 char *out = NULL;
5661 if ((out = cursor = OPENSSL_malloc(out_len)) == NULL) {
5682 ssl->ctx->keylog_callback(ssl, (const char *)out);
5683 OPENSSL_clear_free(out, out_len);