Lines Matching defs:client
1611 * If we are a client, cert_chain includes the peer's own certificate; if
1856 * If we are a client and haven't received the ServerHello etc then we
2048 /* If we are a client and haven't sent the Finished we better do that */
2220 /* We are a server writing to an unauthenticated client */
2835 * - whether this is called by the client or the server,
2845 * If we don't know if we are the client or the server yet then we assume
2846 * client.
2866 * - The function will return the servername requested by the client in
2923 * is indicated to the callback. In this case, the client application has to
2925 * the server supports NPN, but advertises an empty list then the client
2927 * fallback case was enacted. 3) Otherwise, the client finds the first
2930 * which protocol a client should use. 4) If the client doesn't support any
2938 const unsigned char *client, unsigned int client_len)
2942 if (!PACKET_buf_init(&cpkt, client, client_len)
2964 if (PACKET_buf_init(&cpkt, client, client_len)) {
2974 /* Ignore spurious trailing bytes in the client list */
2993 * client's requested protocol for this connection and returns 0. If the
2994 * client didn't request any protocol, then *data is set to NULL. Note that
2995 * the client can request any protocol it chooses. The value returned from
3030 * client needs to select a protocol from the server's provided list. |out|
3034 * callback can assume that |in| is syntactically valid. The client must
3127 * from the client's list of offered protocols.
3366 /* Use specific client engine automatically... ignore errors */
3396 * client that early data will be accepted when constructing a TLS 1.3
3397 * session ticket, and the client will accordingly send us early data
3398 * when using that ticket (if the client has early data to send).
3414 * support for early_data, but if a client were to send us some (e.g.
3750 * SSL_VERIFY_PEER is requested to verify the client identity, we have no