Lines Matching defs:data
605 CRYPTO_EX_DATA ex_data; /* application specific data */
620 /* Max number of bytes that can be sent as early data */
684 * We check that the amount of unreadable early data doesn't exceed
688 * We make a small allowance. We assume 5 records of actual data plus the end
689 * of early data alert record. Each record has a tag and a content type byte.
712 /* Raw packet data for the extension */
713 PACKET data;
808 int ssl_hmac_update(SSL_HMAC *ctx, const unsigned char *data, size_t len);
883 const unsigned char *data, int len,
921 /* Default password callback user data. */
1008 * If we're using more than one pipeline how should we divide the data
1013 * Maximum amount of data to send in one fragment. actual record size can
1155 * sent as early data.
1160 * The maximum number of bytes of early data that a server will tolerate
1222 * is so data can be read and written to different handlers
1300 * is no more data in the read or write buffers
1542 /* extra application data */
1567 * If we're using more than one pipeline how should we divide the data
1572 * Maximum amount of data to send in one fragment. actual record size can
1584 const unsigned char *data, int len, void *arg);
1590 /* Raw extension data, if seen */
1592 /* Length of raw extension data, if seen */
1655 /* Are we expecting to receive early data? */
1657 /* Is the session suitable for early data? */
1749 /* Default password callback user data. */
1758 * sent as early data.
1762 * The maximum number of bytes of early data that a server will tolerate
1768 * The number of bytes of early data received so far. If we accepted early
1769 * data then this is a count of the plaintext bytes. If we rejected it then
1882 void *data;
1888 pitem *pitem_new(unsigned char *prio64be, void *data);
1947 * serverinfo data for this certificate. The data is in TLS Extension
1951 * uint8_t data[length];
2564 void dtls1_get_message_header(unsigned char *data,
2609 const unsigned char *data, size_t datalen,
2778 const unsigned char *data,
2839 int ssl_hmac_old_update(SSL_HMAC *ctx, const unsigned char *data, size_t len);