Lines Matching refs:len
1390 unsigned char *buf, size_t len) in dummy_ticket_parse() argument
1395 if ((ret = mbedtls_ssl_session_load(session, buf + 4, len - 4)) != 0) { in dummy_ticket_parse()
1519 int ret = 0, len, written, frags, exchanges_left; in main() local
3696 len = opt.buffer_size; in main()
3698 ret = mbedtls_ssl_read(&ssl, buf, len); in main()
3731 len = ret; in main()
3732 buf[len] = '\0'; in main()
3733 mbedtls_printf(" %d bytes read\n\n%s\n", len, (char *) buf); in main()
3737 if (buf[len - 1] == '\n') { in main()
3786 len = opt.buffer_size; in main()
3811 ret = mbedtls_ssl_read(&ssl, buf, len); in main()
3831 len = ret; in main()
3832 buf[len] = '\0'; in main()
3833 mbedtls_printf(" %d bytes read\n\n%s", len, (char *) buf); in main()
3881 len = sprintf((char *) buf, HTTP_RESPONSE, in main()
3886 len < opt.response_size) { in main()
3887 memset(buf + len, 'B', opt.response_size - len); in main()
3888 len += opt.response_size - len; in main()
3893 len > opt.response_size) { in main()
3894 len = opt.response_size; in main()
3897 if (len >= 2) { in main()
3898 buf[len - 2] = '\r'; in main()
3900 if (len >= 1) { in main()
3901 buf[len - 1] = '\n'; in main()
3906 for (written = 0, frags = 0; written < len; written += ret, frags++) { in main()
3907 while ((ret = mbedtls_ssl_write(&ssl, buf + written, len - written)) in main()
3931 ret = mbedtls_ssl_write(&ssl, buf, len); in main()