Lines Matching refs:ext

123     OPENSSL_free(s->ext.session_ticket);
410 ctx->ext.supported_groups_default
413 if (ctx->ext.supported_groups_default == NULL) {
418 memcpy(ctx->ext.supported_groups_default,
421 ctx->ext.supported_groups_default_len = num_deflt_grps;
514 if (s->ext.supportedgroups == NULL) {
515 *pgroups = s->ctx->ext.supported_groups_default;
516 *pgroupslen = s->ctx->ext.supported_groups_default_len;
518 *pgroups = s->ext.supportedgroups;
519 *pgroupslen = s->ext.supportedgroups_len;
858 if (s->ext.ecpointformats) {
859 *pformats = s->ext.ecpointformats;
860 *num_formats = s->ext.ecpointformats_len;
909 if (s->ext.peer_ecpointformats == NULL)
912 for (i = 0; i < s->ext.peer_ecpointformats_len; i++) {
913 if (s->ext.peer_ecpointformats[i] == comp_id)
1761 s->ext.ticket_expected = 0;
1787 * s->ext.ticket_expected be set to 1.
1790 * Sets s->ext.ticket_expected to 1 if the server will have to issue
1794 * s->ctx->ext.ticket_key_cb asked to renew the client's ticket.
1795 * Otherwise, s->ext.ticket_expected is set to 0.
1827 if (!SSL_IS_TLS13(s) && s->ext.session_secret_cb) {
1856 if (tctx->ext.ticket_key_evp_cb != NULL || tctx->ext.ticket_key_cb != NULL)
1858 if (tctx->ext.ticket_key_evp_cb != NULL)
1864 if (tctx->ext.ticket_key_evp_cb != NULL)
1865 rv = tctx->ext.ticket_key_evp_cb(s, nctick,
1871 else if (tctx->ext.ticket_key_cb != NULL)
1873 rv = tctx->ext.ticket_key_cb(s, nctick,
1891 if (memcmp(etick, tctx->ext.tick_key_name,
1900 || ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key,
1901 sizeof(tctx->ext.secure->tick_hmac_key),
1904 tctx->ext.secure->tick_aes_key,
2056 if (s->ext.session_secret_cb == NULL || SSL_IS_TLS13(s)) {
2061 s->ext.ticket_expected = 1;
3386 ctx->ext.max_fragment_len_mode = mode;
3398 ssl->ext.max_fragment_len_mode = mode;
3404 return session->ext.max_fragment_len_mode;
3418 if (ctx->ext.ticket_key_evp_cb == NULL
3419 && ctx->ext.ticket_key_cb != NULL) {