Lines Matching refs:from
188 static int ssl_dane_dup(SSL *to, SSL *from)
193 if (!DANETLS_ENABLED(&from->dane))
196 num = sk_danetls_record_num(from->dane.trecs);
198 to->dane.flags = from->dane.flags;
208 danetls_record *t = sk_danetls_record_value(from->dane.trecs, i);
366 * the chain with untrusted Full(0) certificates from DNS, in case
367 * they are missing from the chain.
2238 * Note that this function behaves differently from what one might
2879 * attempted and the session from the original handshake had a
2885 * - If the session from the original handshake had a servername accepted
2917 * expected that this function is called from the callback set by
2995 * the client can request any protocol it chooses. The value returned from
3030 * client needs to select a protocol from the server's provided list. |out|
3127 * from the client's list of offered protocols.
3138 * SSL_get0_alpn_selected gets the selected ALPN protocol (if any) from |ssl|.
3320 * If these aren't available from the provider we'll get NULL returns.
4359 * so setter APIs must prevent invalid lengths from entering the system.
4366 * inherit it from the new SSL_CTX as well. If however the context does
4992 * Moves SCTs from the |src| stack to the |dst| stack.
5104 * Attempts to extract SCTs from the peer certificate.
5289 * the wheat from the chaff it should return success. Failure in this case
5846 /* Ensure there is no state left over from a previous invocation */