Lines Matching defs:server
828 s->server = (ctx->method->ssl_accept == ssl_undefined_function) ? 0 : 1;
1612 * we are a server, it does not.
1914 if (!s->server) {
2172 if (s->server
2220 /* We are a server writing to an unauthenticated client */
2353 || SSL_IS_FIRST_HANDSHAKE(s) || !s->server
2655 if ((s == NULL) || !s->server)
2795 if (!s->server
2835 * - whether this is called by the client or the server,
2845 * If we don't know if we are the client or the server yet then we assume
2848 int server = s->handshake_func == NULL ? 0 : s->server;
2852 if (server) {
2855 * In TLSv1.3 on the server SNI is not associated with the session
2862 * - If a servername was accepted by the server in the original
2880 * servername accepted by the server then it will return that
2886 * by the server then it will return that servername.
2922 * selecting the protocol is: 1) If the server doesn't support NPN then this
2925 * the server supports NPN, but advertises an empty list then the client
2928 * protocol in the server's list that it supports and selects this protocol.
2929 * This is because it's assumed that the server has better information about
2931 * of the server's advertised protocols, then this is treated the same as
2936 const unsigned char *server,
2958 * For each protocol in server preference order, see if we support it.
2960 if (PACKET_buf_init(&spkt, server, server_len)) {
2980 /* Ignore spurious trailing bytes in the server list */
2984 * There's no overlap between our protocols and the server's list. We use
3012 * a TLS server needs a list of supported protocols for Next Protocol
3030 * client needs to select a protocol from the server's provided list. |out|
3033 * server's advertised protocols are provided in |in| and |inlen|. The
3140 * (not including the leading length-prefix byte). If the server didn't
3753 * Do not cache (on the server) these sessions that are not resumable
3756 if (s->server && s->session->sid_ctx_length == 0
3764 * Add the session to the internal cache. In server side TLSv1.3 we
3776 || !s->server
3784 * Add the session to the external cache. We do this even in server side
3967 s->server = 1;
3976 s->server = 0;
4141 ret->server = s->server;
4143 if (s->server)
4868 return s->server;
5881 if (!ssl->server) {