Lines Matching defs:data
241 unsigned char *data;
268 SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len);
280 /* Reconstruct the type/len fields prior to extension data */
377 static unsigned char *data;
382 { &data, "data", hexdecode },
398 /* The data field is last, so len is its length */
399 ret = SSL_dane_tlsa_add(con, usage, selector, mtype, data, len);
400 OPENSSL_free(data);
511 "Size used to split data for encrypt pipelines"},
651 {"early_data", OPT_EARLY_DATA, '<', "File to send as early data"},
765 * Session data gets dumped on connection for TLSv1.2 and below, and on
1599 next_proto.data =
1601 if (next_proto.data == NULL) {
1606 next_proto.data = NULL;
1842 if (next_proto.data != NULL)
2661 BIO_write(sbio, atyp->value.sequence->data,
2695 BIO_printf(bio_err, "Cannot open early data file\n");
2711 BIO_printf(bio_err, "Error writing early data\n");
3060 * If we ended with an alert being sent, but still with data in the
3064 * the connection including any buffered alert data before it has
3067 * TCP-RST. This seems to allow the peer to read the alert data.
3073 * data. [In testing context this ensures that alerts are passed on...]
3092 OPENSSL_free(next_proto.data);
3314 BIO_printf(bio, "Early data was not sent\n");
3318 BIO_printf(bio, "Early data was rejected\n");
3322 BIO_printf(bio, "Early data was accepted\n");
3469 /* There is more data, but we don't care... */