Lines Matching defs:os

384     ASN1_OCTET_STRING os, *osp;
388 osp = &os;
412 os.data = NULL;
413 os.length = 0;
416 if (os.length != 3) {
422 ((unsigned long)os.data[0] << 16L) |
423 ((unsigned long)os.data[1] << 8L) | (unsigned long)os.data[2];
427 if (os.length != 2) {
433 ((unsigned long)os.data[0] << 8L) | (unsigned long)os.data[1];
449 if (os.length > i)
450 os.length = i;
451 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */
452 os.length = sizeof(ret->session_id);
454 ret->session_id_length = os.length;
455 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id));
456 memcpy(ret->session_id, os.data, os.length);
459 if (os.length > SSL_MAX_MASTER_KEY_LENGTH)
462 ret->master_key_length = os.length;
463 memcpy(ret->master_key, os.data, ret->master_key_length);
465 os.length = 0;
468 os.length = 0;
470 if (os.data) {
471 if (os.length > SSL_MAX_KRB5_PRINCIPAL_LENGTH)
474 ret->krb5_client_princ_len = os.length;
475 memcpy(ret->krb5_client_princ, os.data, ret->krb5_client_princ_len);
476 OPENSSL_free(os.data);
477 os.data = NULL;
478 os.length = 0;
485 if (os.length > SSL_MAX_KEY_ARG_LENGTH)
488 ret->key_arg_length = os.length;
489 memcpy(ret->key_arg, os.data, ret->key_arg_length);
490 if (os.data != NULL)
491 OPENSSL_free(os.data);
519 os.length = 0;
520 os.data = NULL;
523 if (os.data != NULL) {
524 if (os.length > SSL_MAX_SID_CTX_LENGTH) {
529 ret->sid_ctx_length = os.length;
530 memcpy(ret->sid_ctx, os.data, os.length);
532 OPENSSL_free(os.data);
533 os.data = NULL;
534 os.length = 0;
549 os.length = 0;
550 os.data = NULL;
552 if (os.data) {
553 ret->tlsext_hostname = BUF_strndup((char *)os.data, os.length);
554 OPENSSL_free(os.data);
555 os.data = NULL;
556 os.length = 0;
562 os.length = 0;
563 os.data = NULL;
565 if (os.data) {
566 ret->psk_identity_hint = BUF_strndup((char *)os.data, os.length);
567 OPENSSL_free(os.data);
568 os.data = NULL;
569 os.length = 0;
573 os.length = 0;
574 os.data = NULL;
576 if (os.data) {
577 ret->psk_identity = BUF_strndup((char *)os.data, os.length);
578 OPENSSL_free(os.data);
579 os.data = NULL;
580 os.length = 0;
597 os.length = 0;
598 os.data = NULL;
600 if (os.data) {
601 ret->tlsext_tick = os.data;
602 ret->tlsext_ticklen = os.length;
603 os.data = NULL;
604 os.length = 0;
609 os.length = 0;
610 os.data = NULL;
612 if (os.data) {
613 ret->compress_meth = os.data[0];
614 OPENSSL_free(os.data);
615 os.data = NULL;
620 os.length = 0;
621 os.data = NULL;
623 if (os.data) {
624 ret->srp_username = BUF_strndup((char *)os.data, os.length);
625 OPENSSL_free(os.data);
626 os.data = NULL;
627 os.length = 0;