Lines Matching defs:out
450 /* Figure out if we're doing DTLS versions or TLS versions */
929 * any new session built out of this id/id_len and the ssl_version in use
2935 int SSL_select_next_proto(unsigned char **out, unsigned char *outlen,
2945 *out = NULL;
2954 *out = (unsigned char *)PACKET_data(&csubpkt);
2969 *out = (unsigned char *)PACKET_data(&ssubpkt);
3014 * returned by setting |out| to point to it and |outlen| to its length. This
3030 * client needs to select a protocol from the server's provided list. |out|
3153 int SSL_export_keying_material(SSL *s, unsigned char *out, size_t olen,
3162 return s->method->ssl3_enc->export_keying_material(s, out, olen, label,
3167 int SSL_export_keying_material_early(SSL *s, unsigned char *out, size_t olen,
3175 return tls13_export_keying_material_early(s, out, olen, label, llen,
4500 size_t SSL_get_client_random(const SSL *ssl, unsigned char *out, size_t outlen)
4506 memcpy(out, ssl->s3.client_random, outlen);
4510 size_t SSL_get_server_random(const SSL *ssl, unsigned char *out, size_t outlen)
4516 memcpy(out, ssl->s3.server_random, outlen);
4521 unsigned char *out, size_t outlen)
4527 memcpy(out, session->master_key, outlen);
4828 int ssl_handshake_hash(SSL *s, unsigned char *out, size_t outlen,
4848 || EVP_DigestFinal_ex(ctx, out, NULL) <= 0) {
5280 * when some are invalid, and < 0 on various internal errors (out of
5283 * Therefore, we error out only in the unexpected case that the return
5290 * ought to correspond to an inability to carry out its duties.
5395 size_t SSL_client_hello_get0_random(SSL *s, const unsigned char **out)
5399 if (out != NULL)
5400 *out = s->clienthello->random;
5404 size_t SSL_client_hello_get0_session_id(SSL *s, const unsigned char **out)
5408 if (out != NULL)
5409 *out = s->clienthello->session_id;
5413 size_t SSL_client_hello_get0_ciphers(SSL *s, const unsigned char **out)
5417 if (out != NULL)
5418 *out = PACKET_data(&s->clienthello->ciphersuites);
5422 size_t SSL_client_hello_get0_compression_methods(SSL *s, const unsigned char **out)
5426 if (out != NULL)
5427 *out = s->clienthello->compressions;
5431 int SSL_client_hello_get1_extensions_present(SSL *s, int **out, size_t *outlen)
5437 if (s->clienthello == NULL || out == NULL || outlen == NULL)
5445 *out = NULL;
5461 *out = present;
5469 int SSL_client_hello_get0_ext(SSL *s, unsigned int type, const unsigned char **out,
5480 if (out != NULL)
5481 *out = PACKET_data(&r->data);
5526 char *out = NULL;
5545 if ((out = cursor = OPENSSL_malloc(out_len)) == NULL) {
5566 ssl->ctx->keylog_callback(ssl, (const char *)out);
5567 OPENSSL_clear_free(out, out_len);