Lines Matching refs:ext

594     OPENSSL_free(s->ext.peer_quic_transport_params_draft);
595 s->ext.peer_quic_transport_params_draft = NULL;
596 s->ext.peer_quic_transport_params_draft_len = 0;
597 OPENSSL_free(s->ext.peer_quic_transport_params);
598 s->ext.peer_quic_transport_params = NULL;
599 s->ext.peer_quic_transport_params_len = 0;
619 * s->ext.quic_transport_params
620 * s->ext.quic_transport_params_len
813 s->ext.max_fragment_len_mode = ctx->ext.max_fragment_len_mode;
824 s->ext.debug_cb = 0;
825 s->ext.debug_arg = NULL;
826 s->ext.ticket_expected = 0;
827 s->ext.status_type = ctx->ext.status_type;
828 s->ext.status_expected = 0;
829 s->ext.ocsp.ids = NULL;
830 s->ext.ocsp.exts = NULL;
831 s->ext.ocsp.resp = NULL;
832 s->ext.ocsp.resp_len = 0;
835 if (ctx->ext.ecpointformats) {
836 s->ext.ecpointformats =
837 OPENSSL_memdup(ctx->ext.ecpointformats,
838 ctx->ext.ecpointformats_len);
839 if (!s->ext.ecpointformats) {
840 s->ext.ecpointformats_len = 0;
843 s->ext.ecpointformats_len =
844 ctx->ext.ecpointformats_len;
846 if (ctx->ext.supportedgroups) {
847 s->ext.supportedgroups =
848 OPENSSL_memdup(ctx->ext.supportedgroups,
849 ctx->ext.supportedgroups_len
850 * sizeof(*ctx->ext.supportedgroups));
851 if (!s->ext.supportedgroups) {
852 s->ext.supportedgroups_len = 0;
855 s->ext.supportedgroups_len = ctx->ext.supportedgroups_len;
859 s->ext.npn = NULL;
862 if (s->ctx->ext.alpn) {
863 s->ext.alpn = OPENSSL_malloc(s->ctx->ext.alpn_len);
864 if (s->ext.alpn == NULL) {
865 s->ext.alpn_len = 0;
868 memcpy(s->ext.alpn, s->ctx->ext.alpn, s->ctx->ext.alpn_len);
869 s->ext.alpn_len = s->ctx->ext.alpn_len;
1120 if (s->ext.hostname == NULL) {
1286 OPENSSL_free(s->ext.hostname);
1288 OPENSSL_free(s->ext.ecpointformats);
1289 OPENSSL_free(s->ext.peer_ecpointformats);
1290 OPENSSL_free(s->ext.supportedgroups);
1291 OPENSSL_free(s->ext.peer_supportedgroups);
1292 sk_X509_EXTENSION_pop_free(s->ext.ocsp.exts, X509_EXTENSION_free);
1294 sk_OCSP_RESPID_pop_free(s->ext.ocsp.ids, OCSP_RESPID_free);
1298 OPENSSL_free(s->ext.scts);
1300 OPENSSL_free(s->ext.ocsp.resp);
1301 OPENSSL_free(s->ext.alpn);
1302 OPENSSL_free(s->ext.tls13_cookie);
1310 OPENSSL_free(s->ext.quic_transport_params);
1311 OPENSSL_free(s->ext.peer_quic_transport_params_draft);
1312 OPENSSL_free(s->ext.peer_quic_transport_params);
1342 OPENSSL_free(s->ext.npn);
2026 if (s->ext.early_data == SSL_EARLY_DATA_ACCEPTED) {
2054 return s->ext.early_data;
2274 || ((s->session == NULL || s->session->ext.max_early_data == 0)
2452 if ((SSL_in_init(s) && s->ext.extra_tickets_expected == 0)
2456 s->ext.extra_tickets_expected++;
2970 return s->session->ext.hostname;
2995 if (s->ext.hostname == NULL
2998 return s->session->ext.hostname;
3000 if (!SSL_IS_TLS13(s) && s->hit && s->session->ext.hostname != NULL)
3001 return s->session->ext.hostname;
3005 return s->ext.hostname;
3102 *data = s->ext.npn;
3106 *len = (unsigned int)s->ext.npn_len;
3124 ctx->ext.npn_advertised_cb = cb;
3125 ctx->ext.npn_advertised_cb_arg = arg;
3142 ctx->ext.npn_select_cb = cb;
3143 ctx->ext.npn_select_cb_arg = arg;
3171 OPENSSL_free(ctx->ext.alpn);
3172 ctx->ext.alpn = NULL;
3173 ctx->ext.alpn_len = 0;
3185 OPENSSL_free(ctx->ext.alpn);
3186 ctx->ext.alpn = alpn;
3187 ctx->ext.alpn_len = protos_len;
3203 OPENSSL_free(ssl->ext.alpn);
3204 ssl->ext.alpn = NULL;
3205 ssl->ext.alpn_len = 0;
3217 OPENSSL_free(ssl->ext.alpn);
3218 ssl->ext.alpn = alpn;
3219 ssl->ext.alpn_len = protos_len;
3233 ctx->ext.alpn_select_cb = cb;
3234 ctx->ext.alpn_select_cb_arg = arg;
3435 if ((ret->ext.secure = OPENSSL_secure_zalloc(sizeof(*ret->ext.secure))) == NULL)
3446 if ((RAND_bytes_ex(libctx, ret->ext.tick_key_name,
3447 sizeof(ret->ext.tick_key_name), 0) <= 0)
3448 || (RAND_priv_bytes_ex(libctx, ret->ext.secure->tick_hmac_key,
3449 sizeof(ret->ext.secure->tick_hmac_key), 0) <= 0)
3450 || (RAND_priv_bytes_ex(libctx, ret->ext.secure->tick_aes_key,
3451 sizeof(ret->ext.secure->tick_aes_key), 0) <= 0))
3454 if (RAND_priv_bytes_ex(libctx, ret->ext.cookie_hmac_key,
3455 sizeof(ret->ext.cookie_hmac_key), 0) <= 0)
3490 ret->ext.status_type = TLSEXT_STATUSTYPE_nothing;
3603 OPENSSL_free(a->ext.ecpointformats);
3604 OPENSSL_free(a->ext.supportedgroups);
3605 OPENSSL_free(a->ext.supported_groups_default);
3606 OPENSSL_free(a->ext.alpn);
3607 OPENSSL_secure_free(a->ext.secure);
5156 if (s->ext.scts != NULL) {
5157 const unsigned char *p = s->ext.scts;
5158 STACK_OF(SCT) *scts = o2i_SCT_LIST(NULL, &p, s->ext.scts_len);
5186 if (s->ext.ocsp.resp == NULL || s->ext.ocsp.resp_len == 0)
5189 p = s->ext.ocsp.resp;
5190 rsp = d2i_OCSP_RESPONSE(NULL, &p, (int)s->ext.ocsp.resp_len);
5552 RAW_EXTENSION *ext;
5559 ext = s->clienthello->pre_proc_exts + i;
5560 if (ext->present)
5573 ext = s->clienthello->pre_proc_exts + i;
5574 if (ext->present) {
5575 if (ext->received_order >= num)
5577 present[ext->received_order] = ext->type;
5972 if (ret > 0 && s->ext.cookieok)