Searched refs:next_proto (Results 1 – 3 of 3) sorted by relevance
291 static tlsextnextprotoctx next_proto; variable1717 next_proto.status = -1; in s_client_main()1719 next_proto.data = in s_client_main()1720 next_protos_parse(&next_proto.len, next_proto_neg_in); in s_client_main()1721 if (next_proto.data == NULL) { in s_client_main()1726 next_proto.data = NULL; in s_client_main()1966 if (next_proto.data != NULL) in s_client_main()1967 SSL_CTX_set_next_proto_select_cb(ctx, next_proto_cb, &next_proto); in s_client_main()3324 OPENSSL_free(next_proto.data); in s_client_main()3531 if (next_proto.status != -1) { in print_stuff()[all …]
658 tlsextnextprotoctx *next_proto = arg; in next_proto_cb() local660 *data = next_proto->data; in next_proto_cb()661 *len = next_proto->len; in next_proto_cb()1055 tlsextnextprotoctx next_proto = { NULL, 0 }; in s_server_main() local1840 next_proto.data = next_protos_parse(&next_proto.len, next_proto_neg_in); in s_server_main()1841 if (next_proto.data == NULL) in s_server_main()2105 if (next_proto.data) in s_server_main()2107 &next_proto); in s_server_main()2366 OPENSSL_free(next_proto.data); in s_server_main()
4334 PACKET next_proto, padding; in tls_process_next_proto() local4344 if (!PACKET_get_length_prefixed_1(pkt, &next_proto) in tls_process_next_proto()4351 if (!PACKET_memdup(&next_proto, &s->ext.npn, &next_proto_len)) { in tls_process_next_proto()
Completed in 57 milliseconds