Home
last modified time | relevance | path

Searched refs:len (Results 1 – 23 of 23) sorted by relevance

/programs/ssl/
A Dssl_test_common_source.c49 size_t len = 0; in nss_keylog_export() local
61 len += sprintf(nss_keylog_line + len, in nss_keylog_export()
65 len += sprintf(nss_keylog_line + len, in nss_keylog_export()
69 len += sprintf(nss_keylog_line + len, " "); in nss_keylog_export()
72 len += sprintf(nss_keylog_line + len, in nss_keylog_export()
76 len += sprintf(nss_keylog_line + len, "\n"); in nss_keylog_export()
77 nss_keylog_line[len] = '\0'; in nss_keylog_export()
95 if (fwrite(nss_keylog_line, 1, len, f) != len) { in nss_keylog_export()
142 tmp_buf = mbedtls_calloc(1, len); in ssl_check_record()
146 memcpy(tmp_buf, buf, len); in ssl_check_record()
[all …]
A Dssl_mail_client.c214 while (len && (ret = mbedtls_ssl_write(ssl, buf, len)) <= 0) { in write_ssl_data()
232 while (len && (ret = mbedtls_ssl_write(ssl, buf, len)) <= 0) { in write_ssl_and_get_response()
240 len = sizeof(data) - 1; in write_ssl_and_get_response()
258 len = ret; in write_ssl_and_get_response()
285 if (len && (ret = mbedtls_net_send(sock_fd, buf, len)) <= 0) { in write_and_get_response()
300 data[len] = '\0'; in write_and_get_response()
302 len = ret; in write_and_get_response()
323 int ret = 1, len; in main() local
727 if (len < 0 || (size_t) len >= sizeof(buf)) { in main()
743 if (len < 0 || (size_t) len >= sizeof(buf)) { in main()
[all …]
A Dssl_context_info.c231 const uint8_t *end = b + len; in print_b64()
256 const uint8_t *end = b + len; in print_hex()
351 size_t len = 0; in read_next_b64_code() local
385 if (len < *max_len) { in read_next_b64_code()
386 (*b64)[len++] = c; in read_next_b64_code()
403 len++; in read_next_b64_code()
405 } else if (len > 0) { in read_next_b64_code()
413 len = pad = 0; in read_next_b64_code()
417 len = pad = 0; in read_next_b64_code()
420 len = pad = 0; in read_next_b64_code()
[all …]
A Dssl_client1.c56 int ret = 1, len; in main() local
211 len = sprintf((char *) buf, GET_REQUEST); in main()
213 while ((ret = mbedtls_ssl_write(&ssl, buf, len)) <= 0) { in main()
220 len = ret; in main()
221 mbedtls_printf(" %d bytes written\n\n%s", len, (char *) buf); in main()
230 len = sizeof(buf) - 1; in main()
232 ret = mbedtls_ssl_read(&ssl, buf, len); in main()
255 len = ret; in main()
256 mbedtls_printf(" %d bytes read\n\n%s", len, (char *) buf); in main()
A Ddtls_client.c72 int ret, len; in main() local
243 len = sizeof(MESSAGE) - 1; in main()
246 ret = mbedtls_ssl_write(&ssl, (unsigned char *) MESSAGE, len); in main()
255 len = ret; in main()
256 mbedtls_printf(" %d bytes written\n\n%s\n\n", len, MESSAGE); in main()
264 len = sizeof(buf) - 1; in main()
268 ret = mbedtls_ssl_read(&ssl, buf, len); in main()
291 len = ret; in main()
292 mbedtls_printf(" %d bytes read\n\n%s\n\n", len, buf); in main()
A Dssl_server.c67 int ret, len; in main() local
254 len = sizeof(buf) - 1; in main()
256 ret = mbedtls_ssl_read(&ssl, buf, len); in main()
280 len = ret; in main()
281 mbedtls_printf(" %d bytes read\n\n%s", len, (char *) buf); in main()
294 len = sprintf((char *) buf, HTTP_RESPONSE, in main()
297 while ((ret = mbedtls_ssl_write(&ssl, buf, len)) <= 0) { in main()
309 len = ret; in main()
310 mbedtls_printf(" %d bytes written\n\n%s\n", len, (char *) buf); in main()
A Dssl_fork_server.c69 int ret = 1, len, cnt = 0, pid; in main() local
286 len = sizeof(buf) - 1; in main()
288 ret = mbedtls_ssl_read(&ssl, buf, len); in main()
313 len = ret; in main()
314 mbedtls_printf("pid %d: %d bytes read\n\n%s", pid, len, (char *) buf); in main()
328 len = sprintf((char *) buf, HTTP_RESPONSE, in main()
332 while ((ret = mbedtls_ssl_write(&ssl, buf, len)) <= 0) { in main()
346 len = ret; in main()
348 pid, len, cnt, (char *) buf); in main()
A Ddtls_server.c80 int ret, len; in main() local
309 len = sizeof(buf) - 1; in main()
313 ret = mbedtls_ssl_read(&ssl, buf, len); in main()
333 len = ret; in main()
334 printf(" %d bytes read\n\n%s\n\n", len, buf); in main()
343 ret = mbedtls_ssl_write(&ssl, buf, len); in main()
352 len = ret; in main()
353 printf(" %d bytes written\n\n%s\n\n", len, buf); in main()
A Dssl_pthread_server.c102 int ret, len; in handle_ssl_connection() local
148 len = sizeof(buf) - 1; in handle_ssl_connection()
150 ret = mbedtls_ssl_read(&ssl, buf, len); in handle_ssl_connection()
175 len = ret; in handle_ssl_connection()
177 thread_id, len, (char *) buf); in handle_ssl_connection()
191 len = sprintf((char *) buf, HTTP_RESPONSE, in handle_ssl_connection()
194 while ((ret = mbedtls_ssl_write(&ssl, buf, len)) <= 0) { in handle_ssl_connection()
208 len = ret; in handle_ssl_connection()
210 thread_id, len, (char *) buf); in handle_ssl_connection()
A Dssl_test_lib.c50 static int dummy_entropy(void *data, unsigned char *output, size_t len) in dummy_entropy() argument
56 ret = mbedtls_entropy_func(data, output, len); in dummy_entropy()
57 for (i = 0; i < len; i++) { in dummy_entropy()
327 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
334 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
353 int delayed_recv(void *ctx, unsigned char *buf, size_t len) in delayed_recv() argument
363 ret = mbedtls_net_recv(ctx, buf, len); in delayed_recv()
370 int delayed_send(void *ctx, const unsigned char *buf, size_t len) in delayed_send() argument
380 ret = mbedtls_net_send(ctx, buf, len); in delayed_send()
A Dssl_client2.c730 len = (size_t) ret; in build_http_request()
745 memset(buf + len, 'A', request_size - len - tail_len); in build_http_request()
749 strncpy((char *) buf + len, GET_REQUEST_END, buf_size - len); in build_http_request()
750 len += tail_len; in build_http_request()
758 if (len >= 2) { in build_http_request()
761 if (len >= 1) { in build_http_request()
766 *request_len = len; in build_http_request()
2610 if (len == 0) { in main()
2712 len = ret; in main()
2773 len = ret; in main()
[all …]
A Dssl_test_lib.h252 int delayed_recv(void *ctx, unsigned char *buf, size_t len);
253 int delayed_send(void *ctx, const unsigned char *buf, size_t len);
A Dssl_server2.c3731 len = ret; in main()
3732 buf[len] = '\0'; in main()
3786 len = opt.buffer_size; in main()
3831 len = ret; in main()
3832 buf[len] = '\0'; in main()
3887 memset(buf + len, 'B', opt.response_size - len); in main()
3888 len += opt.response_size - len; in main()
3894 len = opt.response_size; in main()
3897 if (len >= 2) { in main()
3898 buf[len - 2] = '\r'; in main()
[all …]
/programs/test/
A Dudp_proxy.c230 size_t len; in get_options() local
312 if (len < 1) { in msg_type()
324 if (len < 13 + 12) { in msg_type()
379 size_t len; member
433 if (sizeof(buf->data) - buf->len < len) { in ctx_buffer_append()
440 memcpy(buf->data + buf->len, data, len); in ctx_buffer_append()
442 buf->len += len; in ctx_buffer_append()
447 return (int) len; in ctx_buffer_append()
484 unsigned len; member
687 cur.len = ret; in handle_message()
[all …]
/programs/pkey/
A Dgen_key.c46 size_t len, size_t *olen) in dev_random_entropy_poll() argument
49 size_t ret, left = len; in dev_random_entropy_poll()
73 *olen = len; in dev_random_entropy_poll()
131 size_t len = 0; in write_private_key() local
139 len = strlen((char *) output_buf); in write_private_key()
145 len = ret; in write_private_key()
146 c = output_buf + sizeof(output_buf) - len; in write_private_key()
153 if (fwrite(c, 1, len, f) != len) { in write_private_key()
187 size_t len = 0; in show_ecp_key() local
193 if ((len & 1) == 0 || point_bin[0] != 0x04) { in show_ecp_key()
[all …]
/programs/util/
A Dpem2der.c55 size_t len = 0; in convert_pem_to_der() local
85 ret = mbedtls_base64_decode(NULL, 0, &len, (const unsigned char *) s1, s2 - s1); in convert_pem_to_der()
90 if (len > *olen) { in convert_pem_to_der()
94 if ((ret = mbedtls_base64_decode(output, len, &len, (const unsigned char *) s1, in convert_pem_to_der()
99 *olen = len; in convert_pem_to_der()
/programs/fuzz/
A Dfuzz_dtlsclient.c37 size_t len; in LLVMFuzzerTestOneInput() local
108 len = sizeof(buf) - 1; in LLVMFuzzerTestOneInput()
109 ret = mbedtls_ssl_read(&ssl, buf, len); in LLVMFuzzerTestOneInput()
A Dfuzz_client.c41 size_t len; in LLVMFuzzerTestOneInput() local
163 len = sizeof(buf) - 1; in LLVMFuzzerTestOneInput()
164 ret = mbedtls_ssl_read(&ssl, buf, len); in LLVMFuzzerTestOneInput()
A Dfuzz_dtlsserver.c41 size_t len; in LLVMFuzzerTestOneInput() local
145 len = sizeof(buf) - 1; in LLVMFuzzerTestOneInput()
146 ret = mbedtls_ssl_read(&ssl, buf, len); in LLVMFuzzerTestOneInput()
A Dfuzz_server.c41 size_t len; in LLVMFuzzerTestOneInput() local
180 len = sizeof(buf) - 1; in LLVMFuzzerTestOneInput()
181 ret = mbedtls_ssl_read(&ssl, buf, len); in LLVMFuzzerTestOneInput()
A DREADME.md64 if len(portAndPl) == 2:
/programs/x509/
A Dcert_write.c215 size_t len = 0; in write_certificate() local
224 len = ret; in write_certificate()
225 output_start = output_buf + 4096 - len; in write_certificate()
232 len = strlen((char *) output_buf); in write_certificate()
240 if (fwrite(output_start, 1, len, f) != len) { in write_certificate()
251 const char *ibuf, size_t *len) in parse_serial_decimal_format() argument
266 *len = 0; in parse_serial_decimal_format()
269 if (obufmax < (*len + 1)) { in parse_serial_decimal_format()
276 if ((val != 0) || (*len != 0)) { in parse_serial_decimal_format()
278 (*len)++; in parse_serial_decimal_format()
[all …]
A Dcert_req.c117 size_t len = 0; in write_certificate_request() local
124 len = strlen((char *) output_buf); in write_certificate_request()
130 if (fwrite(output_buf, 1, len, f) != len) { in write_certificate_request()
271 cur->node.san.unstructured_name.len = sizeof(ip); in main()
304 cur->node.san.unstructured_name.len = strlen(q); in main()

Completed in 45 milliseconds