Lines Matching refs:from
188 static int ssl_dane_dup(SSL *to, SSL *from)
193 if (!DANETLS_ENABLED(&from->dane))
196 num = sk_danetls_record_num(from->dane.trecs);
198 to->dane.flags = from->dane.flags;
208 danetls_record *t = sk_danetls_record_value(from->dane.trecs, i);
377 * the chain with untrusted Full(0) certificates from DNS, in case
378 * they are missing from the chain.
2338 * Note that this function behaves differently from what one might
2979 * attempted and the session from the original handshake had a
2985 * - If the session from the original handshake had a servername accepted
3017 * expected that this function is called from the callback set by
3095 * the client can request any protocol it chooses. The value returned from
3130 * client needs to select a protocol from the server's provided list. |out|
3227 * from the client's list of offered protocols.
3238 * SSL_get0_alpn_selected gets the selected ALPN protocol (if any) from |ssl|.
3420 * If these aren't available from the provider we'll get NULL returns.
4478 * so setter APIs must prevent invalid lengths from entering the system.
4485 * inherit it from the new SSL_CTX as well. If however the context does
5111 * Moves SCTs from the |src| stack to the |dst| stack.
5223 * Attempts to extract SCTs from the peer certificate.
5408 * the wheat from the chaff it should return success. Failure in this case
5962 /* Ensure there is no state left over from a previous invocation */