Lines Matching refs:ext

122     OPENSSL_free(s->ext.session_ticket);
409 ctx->ext.supported_groups_default
412 if (ctx->ext.supported_groups_default == NULL) {
417 memcpy(ctx->ext.supported_groups_default,
420 ctx->ext.supported_groups_default_len = num_deflt_grps;
513 if (s->ext.supportedgroups == NULL) {
514 *pgroups = s->ctx->ext.supported_groups_default;
515 *pgroupslen = s->ctx->ext.supported_groups_default_len;
517 *pgroups = s->ext.supportedgroups;
518 *pgroupslen = s->ext.supportedgroups_len;
837 if (s->ext.ecpointformats) {
838 *pformats = s->ext.ecpointformats;
839 *num_formats = s->ext.ecpointformats_len;
888 if (s->ext.peer_ecpointformats == NULL)
891 for (i = 0; i < s->ext.peer_ecpointformats_len; i++) {
892 if (s->ext.peer_ecpointformats[i] == comp_id)
1740 s->ext.ticket_expected = 0;
1766 * s->ext.ticket_expected be set to 1.
1769 * Sets s->ext.ticket_expected to 1 if the server will have to issue
1773 * s->ctx->ext.ticket_key_cb asked to renew the client's ticket.
1774 * Otherwise, s->ext.ticket_expected is set to 0.
1806 if (!SSL_IS_TLS13(s) && s->ext.session_secret_cb) {
1835 if (tctx->ext.ticket_key_evp_cb != NULL || tctx->ext.ticket_key_cb != NULL)
1837 if (tctx->ext.ticket_key_evp_cb != NULL)
1843 if (tctx->ext.ticket_key_evp_cb != NULL)
1844 rv = tctx->ext.ticket_key_evp_cb(s, nctick,
1850 else if (tctx->ext.ticket_key_cb != NULL)
1852 rv = tctx->ext.ticket_key_cb(s, nctick,
1870 if (memcmp(etick, tctx->ext.tick_key_name,
1879 || ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key,
1880 sizeof(tctx->ext.secure->tick_hmac_key),
1883 tctx->ext.secure->tick_aes_key,
2035 if (s->ext.session_secret_cb == NULL || SSL_IS_TLS13(s)) {
2040 s->ext.ticket_expected = 1;
3365 ctx->ext.max_fragment_len_mode = mode;
3377 ssl->ext.max_fragment_len_mode = mode;
3383 return session->ext.max_fragment_len_mode;
3397 if (ctx->ext.ticket_key_evp_cb == NULL
3398 && ctx->ext.ticket_key_cb != NULL) {