Lines Matching defs:data
165 OPENSSL_free(t->data);
211 t->data, t->dlen) <= 0)
272 uint8_t mtype, const unsigned char *data, size_t dlen)
312 if (!data) {
325 t->data = OPENSSL_malloc(dlen);
326 if (t->data == NULL) {
331 memcpy(t->data, data, dlen);
336 const unsigned char *p = data;
342 if (!d2i_X509(&cert, &p, ilen) || p < data ||
343 dlen != (size_t)(p - data)) {
380 if (!d2i_PUBKEY(&pkey, &p, ilen) || p < data ||
381 dlen != (size_t)(p - data)) {
1113 uint8_t *mtype, const unsigned char **data, size_t *dlen)
1126 if (data)
1127 *data = dane->mtlsa->data;
1140 uint8_t mtype, const unsigned char *data, size_t dlen)
1142 return dane_tlsa_add(&s->dane, usage, selector, mtype, data, dlen);
1544 * observed while scanning the new data. (Note that SSL_pending() is
1557 * processed or unprocessed data available or 0 otherwise (as opposed to the
1559 * account read_ahead data. A 1 return simply indicates that we have data.
1560 * That data may not result in any application data, or we may fail to parse
1564 /* Check buffered app data if any first */
1571 rdata = item->data;
2194 * We disable partial write for early data because we don't keep track
2918 * SSL_CTX_set_next_proto_select_cb. The protocol data is assumed to be a
2992 * SSL_get0_next_proto_negotiated sets *data and *len to point to the
2994 * client didn't request any protocol, then *data is set to NULL. Note that
2999 void SSL_get0_next_proto_negotiated(const SSL *s, const unsigned char **data,
3002 *data = s->ext.npn;
3003 if (*data == NULL) {
3139 * On return it sets |*data| to point to |*len| bytes of protocol name
3143 void SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
3146 *data = ssl->s3.alpn_selected;
3147 if (*data == NULL)
3396 * client that early data will be accepted when constructing a TLS 1.3
3397 * session ticket, and the client will accordingly send us early data
3398 * when using that ticket (if the client has early data to send).
3399 * However, in order for the early data to actually be consumed by
3401 * SSL_read_early_data(); otherwise we'll just skip past the early data
3404 * calls to SSL_CTX_set_max_early_data() in order to use early data,
3405 * eliminating the bandwidth-wasting early data in the case described
3785 * TLSv1.3 without early data because some applications just want to
4137 /* copy app data, a little dangerous perhaps */
5030 * Look for data collected during ServerHello and parse if found.
5481 *out = PACKET_data(&r->data);
5483 *outlen = PACKET_remaining(&r->data);