Home
last modified time | relevance | path

Searched refs:buf (Results 1 – 25 of 28) sorted by relevance

12

/ssl/
A Dssl_buffer.cc122 if (!buf->empty()) { in dtls_read_buffer_next_packet()
131 BIO_read(ssl->rbio.get(), buf->data(), static_cast<int>(buf->cap())); in dtls_read_buffer_next_packet()
143 if (len > buf->cap()) { in tls_read_buffer_extend_to()
152 int ret = BIO_read(ssl->rbio.get(), buf->data() + buf->size(), in tls_read_buffer_extend_to()
261 while (!buf->empty()) { in tls_write_buffer_flush()
262 int ret = BIO_write(ssl->wbio.get(), buf->data(), buf->size()); in tls_write_buffer_flush()
269 buf->Clear(); in tls_write_buffer_flush()
275 if (buf->empty()) { in dtls_write_buffer_flush()
279 int ret = BIO_write(ssl->wbio.get(), buf->data(), buf->size()); in dtls_write_buffer_flush()
285 buf->Clear(); in dtls_write_buffer_flush()
[all …]
A Dssl_cert.cc172 UniquePtr<CRYPTO_BUFFER> buf( in ssl_parse_cert_chain() local
174 if (!buf || // in ssl_parse_cert_chain()
205 CBS buf = *in; in ssl_cert_skip_to_spki() local
233 CBS buf = *in; in ssl_cert_extract_issuer() local
265 CBS buf = *in, tbs_cert; in ssl_cert_parse_pubkey() local
266 if (!ssl_cert_skip_to_spki(&buf, &tbs_cert)) { in ssl_cert_parse_pubkey()
301 CBS buf = *in; in ssl_cert_check_key_usage() local
609 return buf != nullptr && in SSL_set_signed_cert_timestamp_list()
616 UniquePtr<CRYPTO_BUFFER> buf( in SSL_CTX_set_ocsp_response() local
627 UniquePtr<CRYPTO_BUFFER> buf( in SSL_set_ocsp_response() local
[all …]
A Dssl_privkey.cc727 char buf[kMaxSignatureAlgorithmNameLen]; in parse_sigalgs_list() local
750 buf[buf_used] = 0; in parse_sigalgs_list()
752 if (strcmp(buf, "RSA") == 0) { in parse_sigalgs_list()
755 strcmp(buf, "PSS") == 0) { in parse_sigalgs_list()
757 } else if (strcmp(buf, "ECDSA") == 0) { in parse_sigalgs_list()
778 buf[buf_used] = 0; in parse_sigalgs_list()
798 if (strcmp(buf, "SHA1") == 0) { in parse_sigalgs_list()
800 } else if (strcmp(buf, "SHA256") == 0) { in parse_sigalgs_list()
802 } else if (strcmp(buf, "SHA384") == 0) { in parse_sigalgs_list()
835 if (buf_used == sizeof(buf) - 1) { in parse_sigalgs_list()
[all …]
A Dssl_transcript.cc102 CBS buf, header; in HashBuffer() local
103 CBS_init(&buf, reinterpret_cast<uint8_t *>(buffer_->data), buffer_->length); in HashBuffer()
104 if (!CBS_get_bytes(&buf, &header, 4) || // in HashBuffer()
105 !CBS_skip(&buf, 8) || // in HashBuffer()
107 !EVP_DigestUpdate(ctx, CBS_data(&buf), CBS_len(&buf))) { in HashBuffer()
A Dd1_pkt.cc270 SSLBuffer *buf = &ssl->s3->write_buffer; in dtls1_write_record() local
275 assert(buf->empty()); in dtls1_write_record()
284 if (!buf->EnsureCap(dtls_seal_prefix_len(ssl, epoch), in dtls1_write_record()
286 !dtls_seal_record(ssl, &record_number, buf->remaining().data(), in dtls1_write_record()
287 &ciphertext_len, buf->remaining().size(), type, in dtls1_write_record()
289 buf->Clear(); in dtls1_write_record()
292 buf->DidWrite(ciphertext_len); in dtls1_write_record()
A Ds3_pkt.cc156 SSLBuffer *buf = &ssl->s3->write_buffer; in do_tls_write() local
157 if (in.size() > SSL3_RT_MAX_PLAIN_LENGTH || buf->size() > 0) { in do_tls_write()
194 if (!buf->EnsureCap(pending_flight.size() + tls_seal_align_prefix_len(ssl), in do_tls_write()
201 OPENSSL_memcpy(buf->remaining().data(), pending_flight.data(), in do_tls_write()
205 buf->DidWrite(pending_flight.size()); in do_tls_write()
210 if (!tls_seal_record(ssl, buf->remaining().data(), &ciphertext_len, in do_tls_write()
211 buf->remaining().size(), type, in.data(), in.size())) { in do_tls_write()
214 buf->DidWrite(ciphertext_len); in do_tls_write()
A Dssl_cipher.cc553 return strncmp(rule, buf, buf_len) == 0 && rule[buf_len] == '\0'; in rule_equals()
820 const char *l, *buf; in ssl_cipher_process_rulestr() local
898 buf = l; in ssl_cipher_process_rulestr()
921 if (rule_equals(cipher->name, buf, buf_len) || in ssl_cipher_process_rulestr()
922 rule_equals(cipher->standard_name, buf, buf_len)) { in ssl_cipher_process_rulestr()
931 if (rule_equals(kCipherAliases[j].name, buf, buf_len)) { in ssl_cipher_process_rulestr()
973 if (buf_len != 8 || strncmp(buf, "STRENGTH", 8) != 0) { in ssl_cipher_process_rulestr()
1541 if (buf == NULL) { in SSL_CIPHER_description()
1543 buf = (char *)OPENSSL_malloc(len); in SSL_CIPHER_description()
1544 if (buf == NULL) { in SSL_CIPHER_description()
[all …]
A Dssl_test.cc3191 EXPECT_EQ(-1, SSL_read(ssl, buf, sizeof(buf))); in TEST_P()
4453 ERR_error_string_n(err, buf, sizeof(buf)); in ExpectSingleError()
6281 snprintf(buf, sizeof(buf) - 1, "0x%02x", v); in SigAlgsToString()
6282 buf[sizeof(buf) - 1] = 0; in SigAlgsToString()
8565 ASSERT_EQ(int(sizeof(buf)), SSL_read(server.get(), buf, sizeof(buf))); in TEST()
8573 ASSERT_EQ(int(sizeof(buf)), SSL_read(server.get(), buf, sizeof(buf))); in TEST()
8578 ASSERT_EQ(int(sizeof(buf)), SSL_read(server.get(), buf, sizeof(buf))); in TEST()
9839 ret = SSL_read(client.get(), buf, sizeof(buf)); in TEST()
9891 ret = SSL_read(client.get(), buf, sizeof(buf)); in TEST()
9896 ret = SSL_read(client.get(), buf, sizeof(buf)); in TEST()
[all …]
A Dssl_lib.cc910 int SSL_read(SSL *ssl, void *buf, int num) { in SSL_read() argument
911 int ret = SSL_peek(ssl, buf, num); in SSL_read()
925 int SSL_peek(SSL *ssl, void *buf, int num) { in SSL_peek() argument
940 OPENSSL_memcpy(buf, ssl->s3->pending_app_data.data(), todo); in SSL_peek()
944 int SSL_write(SSL *ssl, const void *buf, int num) { in SSL_write() argument
1519 size_t SSL_get_finished(const SSL *ssl, void *buf, size_t count) { in SSL_get_finished() argument
1529 return copy_finished(buf, count, ssl->s3->previous_client_finished); in SSL_get_finished()
2512 char *SSL_get_shared_ciphers(const SSL *ssl, char *buf, int len) { in SSL_get_shared_ciphers() argument
2516 buf[0] = '\0'; in SSL_get_shared_ciphers()
2517 return buf; in SSL_get_shared_ciphers()
[all …]
A Dd1_both.cc983 uint8_t buf[2 + 16 * DTLS_MAX_ACK_BUFFER]; in send_ack() local
985 CBB_init_fixed(&cbb, buf, sizeof(buf)); in send_ack()
994 uint8_t record[DTLS1_3_RECORD_HEADER_WRITE_LENGTH + sizeof(buf) + in send_ack()
A Dtls13_both.cc223 UniquePtr<CRYPTO_BUFFER> buf( in tls13_process_certificate() local
225 if (!buf || // in tls13_process_certificate()
226 !PushToStack(certs.get(), std::move(buf))) { in tls13_process_certificate()
A Dssl_x509.cc50 uint8_t *buf = NULL; in x509_to_buffer() local
51 int cert_len = i2d_X509(x509, &buf); in x509_to_buffer()
56 UniquePtr<CRYPTO_BUFFER> buffer(CRYPTO_BUFFER_new(buf, cert_len, NULL)); in x509_to_buffer()
57 OPENSSL_free(buf); in x509_to_buffer()
/ssl/test/
A Dpacketed_bio.cc153 uint8_t buf[8]; in PacketedRead() local
154 ret = ReadAll(next, buf, sizeof(buf)); in PacketedRead()
159 uint64_t timeout = CRYPTO_load_u64_be(buf); in PacketedRead()
178 uint8_t buf[4]; in PacketedRead() local
179 ret = ReadAll(next, buf, sizeof(buf)); in PacketedRead()
184 uint32_t mtu = CRYPTO_load_u32_be(buf); in PacketedRead()
194 uint8_t buf[8]; in PacketedRead() local
195 ret = ReadAll(next, buf, sizeof(buf)); in PacketedRead()
251 ret = ReadAll(next, buf.data(), buf.size()); in PacketedRead()
258 outl = static_cast<int>(buf.size()); in PacketedRead()
[all …]
A Dmock_quic_transport.cc53 uint8_t *buf = out.data(); in ReadAll() local
60 buf += ret; in ReadAll()
163 std::vector<uint8_t> buf(len); in ReadHandshake() local
164 if (!ReadAll(bio_.get(), bssl::Span(buf))) { in ReadHandshake()
167 return SSL_provide_quic_data(ssl_, level, buf.data(), buf.size()); in ReadHandshake()
201 std::vector<uint8_t> buf(len); in ReadApplicationData() local
202 if (!ReadAll(bio_.get(), bssl::Span(buf))) { in ReadApplicationData()
205 if (SSL_provide_quic_data(ssl_, level, buf.data(), buf.size()) != 1) { in ReadApplicationData()
222 uint8_t *buf = out; in ReadApplicationData() local
225 buf = pending_app_data_.data(); in ReadApplicationData()
[all …]
A Dhandshake_util.cc141 char buf[256]; in CheckIdempotentError() local
142 ERR_error_string_n(err, buf, sizeof(buf)); in CheckIdempotentError()
143 fprintf(stderr, "Wanted: %d %d %s\n", ret, ssl_err, buf); in CheckIdempotentError()
144 ERR_error_string_n(err2, buf, sizeof(buf)); in CheckIdempotentError()
213 char buf[64]; in Proxy() local
216 (bytes = read_eintr(wfd, buf, sizeof(buf))) > 0) { in Proxy()
217 char *b = buf; in Proxy()
561 std::vector<uint8_t> buf(kBufSize); in RunHandshaker() local
562 ssize_t len = read_eintr(control.fd(), buf.data(), buf.size()); in RunHandshaker()
567 buf.resize(len); in RunHandshaker()
[all …]
A Dsettings_writer.cc33 char buf[DECIMAL_SIZE(int)]; in Init() local
34 snprintf(buf, sizeof(buf), "%d", i); in Init()
35 path_ = config->write_settings + buf; in Init()
A Dbssl_shim.cc124 char buf[1024]; in reset() local
125 if (recv(sock_, buf, sizeof(buf), 0) <= 0) { in reset()
224 uint8_t buf; in DoRead() local
236 int ret2 = SSL_peek(ssl, buf.get(), ret); in DoRead()
243 ret2 = SSL_read(ssl, buf.get(), ret); in DoRead()
1142 auto buf = std::make_unique<uint8_t[]>(kBufLen); in DoExchange() local
1143 OPENSSL_memset(buf.get(), 0x42, kBufLen); in DoExchange()
1152 if (WriteAll(ssl, buf.get(), len) < 0) { in DoExchange()
1199 int n = DoRead(ssl, buf.get(), read_size); in DoExchange()
1251 buf[i] ^= 0xff; in DoExchange()
[all …]
A Dtest_config.cc1529 bssl::UniquePtr<CRYPTO_BUFFER> buf( in CredentialFromConfig() local
1532 if (buf == nullptr || in CredentialFromConfig()
1539 bssl::UniquePtr<CRYPTO_BUFFER> buf( in CredentialFromConfig() local
1542 if (buf == nullptr || in CredentialFromConfig()
1549 bssl::UniquePtr<CRYPTO_BUFFER> buf( in CredentialFromConfig() local
1553 cred.get(), buf.get())) { in CredentialFromConfig()
1621 auto buf = std::make_unique<uint8_t[]>(in.size() / 2); in HexDecode() local
1628 buf[i] = (high << 4) | low; in HexDecode()
2125 buf[0] = 0; in SetupCtx()
2126 buf[1] = 0; in SetupCtx()
[all …]
A Dfuzzer.h318 int TestOneInput(const uint8_t *buf, size_t len) { in TestOneInput() argument
324 CBS_init(&cbs, buf, len); in TestOneInput()
/ssl/test/runner/
A Ddeterministic.go30 func (d *deterministicRand) Read(buf []byte) (int, error) {
31 clear(buf)
38 cipher.XORKeyStream(buf, buf)
40 return len(buf), nil
A Drecordingconn.go59 buf := make([]byte, len(data))
60 copy(buf, data)
61 r.flows = append(r.flows, flow{flowType, message, buf})
A Drunner.go1014 buf := make([]byte, len(shimPrefix))
1015 _, err := io.ReadFull(tlsConn, buf)
1019 if string(buf) != shimPrefix {
1108 buf := make([]byte, len(shimPrefix))
1109 _, err := io.ReadFull(tlsConn, buf)
1113 if string(buf) != shimPrefix {
1132 buf := make([]byte, len(testMessage))
1134 bufTmp := make([]byte, len(buf)+1)
1146 if n != len(buf) {
1149 copy(buf, bufTmp)
[all …]
A Dshim_dispatcher.go93 var buf [8]byte
94 if _, err := io.ReadFull(conn, buf[:]); err != nil {
99 shimID := binary.LittleEndian.Uint64(buf[:])
A Dconn.go900 buf := c.rawInput.AvailableBuffer()
901 nread, err := io.ReadAtLeast(c.conn, buf[:cap(buf)], n)
902 c.rawInput.Write(buf[:nread])
1394 var buf [maxPlaintext]byte
1395 n, _ := c.pendingFlight.Read(buf[:])
1396 if _, err := c.doWriteRecord(recordTypeHandshake, buf[:n]); err != nil {
/ssl/test/runner/kyber/
A Dkyber.go240 var buf [3]byte
242 keccak.Read(buf[:])
243 d1 := uint16(buf[0]) + 256*uint16(buf[1]%16)
244 d2 := uint16(buf[1])/16 + 16*uint16(buf[2])

Completed in 138 milliseconds

12