Lines Matching refs:sent
22 static int final_renegotiate(SSL *s, unsigned int context, int sent);
24 static int final_server_name(SSL *s, unsigned int context, int sent);
25 static int final_ec_pt_formats(SSL *s, unsigned int context, int sent);
34 static int final_alpn(SSL *s, unsigned int context, int sent);
51 static int final_ems(SSL *s, unsigned int context, int sent);
53 static int final_key_share(SSL *s, unsigned int context, int sent);
57 static int final_sig_algs(SSL *s, unsigned int context, int sent);
58 static int final_early_data(SSL *s, unsigned int context, int sent);
59 static int final_maxfragmentlen(SSL *s, unsigned int context, int sent);
61 static int final_psk(SSL *s, unsigned int context, int sent);
77 /* Parse extension sent from client to server */
83 /* Construct extension sent from server to client */
86 /* Construct extension sent from client to server */
91 * initialised even if the extension was not present. |sent| is set to 1 if
94 int (*final)(SSL *s, unsigned int context, int sent);
614 * be sent in the ClientHello and CertificateRequest. Unsolicited
615 * extensions can be sent in the NewSessionTicket. We only do this for
879 * finalisers |sent| is set to 1 if we saw the extension during parsing, and 0
883 static int final_renegotiate(SSL *s, unsigned int context, int sent)
892 && !sent) {
904 && !sent) {
935 static int final_server_name(SSL *s, unsigned int context, int sent)
962 if (sent && ret == SSL_TLSEXT_ERR_OK && !s->hit) {
1033 static int final_ec_pt_formats(SSL *s, unsigned int context, int sent)
1120 static int final_alpn(SSL *s, unsigned int context, int sent)
1122 if (!s->server && !sent && s->session->ext.alpn_selected != NULL)
1196 static int final_ems(SSL *s, unsigned int context, int sent)
1281 static int final_sig_algs(SSL *s, unsigned int context, int sent)
1283 if (!sent && SSL_IS_TLS13(s) && !s->hit) {
1292 static int final_key_share(SSL *s, unsigned int context, int sent)
1314 && !sent
1336 * the client sent a key_share extension
1363 * previously sent HRR - so how can this be anything other
1374 if (s->hello_retry_request == SSL_HRR_NONE && sent
1409 SSLfatal(s, sent ? SSL_AD_HANDSHAKE_FAILURE
1420 * previously sent HRR - so how can this be anything other
1443 if (!sent && !tls13_generate_handshake_secret(s, NULL, 0)) {
1638 static int final_early_data(SSL *s, unsigned int context, int sent)
1640 if (!sent)
1645 && sent
1681 static int final_maxfragmentlen(SSL *s, unsigned int context, int sent)
1685 * BUT MFL extension packet was not resent (i.e. sent == 0)
1688 && !sent ) {
1716 static int final_psk(SSL *s, unsigned int context, int sent)
1718 if (s->server && sent && s->clienthello != NULL