| /programs/ssl/ |
| A D | ssl_test_common_source.c | 49 size_t len = 0; in nss_keylog_export() local 61 len += sprintf(nss_keylog_line + len, in nss_keylog_export() 65 len += sprintf(nss_keylog_line + len, in nss_keylog_export() 69 len += sprintf(nss_keylog_line + len, " "); in nss_keylog_export() 72 len += sprintf(nss_keylog_line + len, in nss_keylog_export() 76 len += sprintf(nss_keylog_line + len, "\n"); in nss_keylog_export() 77 nss_keylog_line[len] = '\0'; in nss_keylog_export() 95 if (fwrite(nss_keylog_line, 1, len, f) != len) { in nss_keylog_export() 142 tmp_buf = mbedtls_calloc(1, len); in ssl_check_record() 146 memcpy(tmp_buf, buf, len); in ssl_check_record() [all …]
|
| A D | ssl_mail_client.c | 214 while (len && (ret = mbedtls_ssl_write(ssl, buf, len)) <= 0) { in write_ssl_data() 232 while (len && (ret = mbedtls_ssl_write(ssl, buf, len)) <= 0) { in write_ssl_and_get_response() 240 len = sizeof(data) - 1; in write_ssl_and_get_response() 258 len = ret; in write_ssl_and_get_response() 285 if (len && (ret = mbedtls_net_send(sock_fd, buf, len)) <= 0) { in write_and_get_response() 300 data[len] = '\0'; in write_and_get_response() 302 len = ret; in write_and_get_response() 323 int ret = 1, len; in main() local 727 if (len < 0 || (size_t) len >= sizeof(buf)) { in main() 743 if (len < 0 || (size_t) len >= sizeof(buf)) { in main() [all …]
|
| A D | ssl_context_info.c | 231 const uint8_t *end = b + len; in print_b64() 256 const uint8_t *end = b + len; in print_hex() 351 size_t len = 0; in read_next_b64_code() local 385 if (len < *max_len) { in read_next_b64_code() 386 (*b64)[len++] = c; in read_next_b64_code() 403 len++; in read_next_b64_code() 405 } else if (len > 0) { in read_next_b64_code() 413 len = pad = 0; in read_next_b64_code() 417 len = pad = 0; in read_next_b64_code() 420 len = pad = 0; in read_next_b64_code() [all …]
|
| A D | ssl_client1.c | 56 int ret = 1, len; in main() local 211 len = sprintf((char *) buf, GET_REQUEST); in main() 213 while ((ret = mbedtls_ssl_write(&ssl, buf, len)) <= 0) { in main() 220 len = ret; in main() 221 mbedtls_printf(" %d bytes written\n\n%s", len, (char *) buf); in main() 230 len = sizeof(buf) - 1; in main() 232 ret = mbedtls_ssl_read(&ssl, buf, len); in main() 255 len = ret; in main() 256 mbedtls_printf(" %d bytes read\n\n%s", len, (char *) buf); in main()
|
| A D | dtls_client.c | 72 int ret, len; in main() local 243 len = sizeof(MESSAGE) - 1; in main() 246 ret = mbedtls_ssl_write(&ssl, (unsigned char *) MESSAGE, len); in main() 255 len = ret; in main() 256 mbedtls_printf(" %d bytes written\n\n%s\n\n", len, MESSAGE); in main() 264 len = sizeof(buf) - 1; in main() 268 ret = mbedtls_ssl_read(&ssl, buf, len); in main() 291 len = ret; in main() 292 mbedtls_printf(" %d bytes read\n\n%s\n\n", len, buf); in main()
|
| A D | ssl_server.c | 67 int ret, len; in main() local 254 len = sizeof(buf) - 1; in main() 256 ret = mbedtls_ssl_read(&ssl, buf, len); in main() 280 len = ret; in main() 281 mbedtls_printf(" %d bytes read\n\n%s", len, (char *) buf); in main() 294 len = sprintf((char *) buf, HTTP_RESPONSE, in main() 297 while ((ret = mbedtls_ssl_write(&ssl, buf, len)) <= 0) { in main() 309 len = ret; in main() 310 mbedtls_printf(" %d bytes written\n\n%s\n", len, (char *) buf); in main()
|
| A D | ssl_fork_server.c | 69 int ret = 1, len, cnt = 0, pid; in main() local 286 len = sizeof(buf) - 1; in main() 288 ret = mbedtls_ssl_read(&ssl, buf, len); in main() 313 len = ret; in main() 314 mbedtls_printf("pid %d: %d bytes read\n\n%s", pid, len, (char *) buf); in main() 328 len = sprintf((char *) buf, HTTP_RESPONSE, in main() 332 while ((ret = mbedtls_ssl_write(&ssl, buf, len)) <= 0) { in main() 346 len = ret; in main() 348 pid, len, cnt, (char *) buf); in main()
|
| A D | dtls_server.c | 80 int ret, len; in main() local 309 len = sizeof(buf) - 1; in main() 313 ret = mbedtls_ssl_read(&ssl, buf, len); in main() 333 len = ret; in main() 334 printf(" %d bytes read\n\n%s\n\n", len, buf); in main() 343 ret = mbedtls_ssl_write(&ssl, buf, len); in main() 352 len = ret; in main() 353 printf(" %d bytes written\n\n%s\n\n", len, buf); in main()
|
| A D | ssl_pthread_server.c | 102 int ret, len; in handle_ssl_connection() local 148 len = sizeof(buf) - 1; in handle_ssl_connection() 150 ret = mbedtls_ssl_read(&ssl, buf, len); in handle_ssl_connection() 175 len = ret; in handle_ssl_connection() 177 thread_id, len, (char *) buf); in handle_ssl_connection() 191 len = sprintf((char *) buf, HTTP_RESPONSE, in handle_ssl_connection() 194 while ((ret = mbedtls_ssl_write(&ssl, buf, len)) <= 0) { in handle_ssl_connection() 208 len = ret; in handle_ssl_connection() 210 thread_id, len, (char *) buf); in handle_ssl_connection()
|
| A D | ssl_test_lib.c | 50 static int dummy_entropy(void *data, unsigned char *output, size_t len) in dummy_entropy() argument 56 ret = mbedtls_entropy_func(data, output, len); in dummy_entropy() 57 for (i = 0; i < len; i++) { in dummy_entropy() 327 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 334 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 353 int delayed_recv(void *ctx, unsigned char *buf, size_t len) in delayed_recv() argument 363 ret = mbedtls_net_recv(ctx, buf, len); in delayed_recv() 370 int delayed_send(void *ctx, const unsigned char *buf, size_t len) in delayed_send() argument 380 ret = mbedtls_net_send(ctx, buf, len); in delayed_send()
|
| A D | ssl_client2.c | 730 len = (size_t) ret; in build_http_request() 745 memset(buf + len, 'A', request_size - len - tail_len); in build_http_request() 749 strncpy((char *) buf + len, GET_REQUEST_END, buf_size - len); in build_http_request() 750 len += tail_len; in build_http_request() 758 if (len >= 2) { in build_http_request() 761 if (len >= 1) { in build_http_request() 766 *request_len = len; in build_http_request() 2610 if (len == 0) { in main() 2712 len = ret; in main() 2773 len = ret; in main() [all …]
|
| A D | ssl_test_lib.h | 252 int delayed_recv(void *ctx, unsigned char *buf, size_t len); 253 int delayed_send(void *ctx, const unsigned char *buf, size_t len);
|
| A D | ssl_server2.c | 3731 len = ret; in main() 3732 buf[len] = '\0'; in main() 3786 len = opt.buffer_size; in main() 3831 len = ret; in main() 3832 buf[len] = '\0'; in main() 3887 memset(buf + len, 'B', opt.response_size - len); in main() 3888 len += opt.response_size - len; in main() 3894 len = opt.response_size; in main() 3897 if (len >= 2) { in main() 3898 buf[len - 2] = '\r'; in main() [all …]
|
| /programs/test/ |
| A D | udp_proxy.c | 230 size_t len; in get_options() local 312 if (len < 1) { in msg_type() 324 if (len < 13 + 12) { in msg_type() 379 size_t len; member 433 if (sizeof(buf->data) - buf->len < len) { in ctx_buffer_append() 440 memcpy(buf->data + buf->len, data, len); in ctx_buffer_append() 442 buf->len += len; in ctx_buffer_append() 447 return (int) len; in ctx_buffer_append() 484 unsigned len; member 687 cur.len = ret; in handle_message() [all …]
|
| /programs/pkey/ |
| A D | gen_key.c | 46 size_t len, size_t *olen) in dev_random_entropy_poll() argument 49 size_t ret, left = len; in dev_random_entropy_poll() 73 *olen = len; in dev_random_entropy_poll() 131 size_t len = 0; in write_private_key() local 139 len = strlen((char *) output_buf); in write_private_key() 145 len = ret; in write_private_key() 146 c = output_buf + sizeof(output_buf) - len; in write_private_key() 153 if (fwrite(c, 1, len, f) != len) { in write_private_key() 187 size_t len = 0; in show_ecp_key() local 193 if ((len & 1) == 0 || point_bin[0] != 0x04) { in show_ecp_key() [all …]
|
| /programs/util/ |
| A D | pem2der.c | 55 size_t len = 0; in convert_pem_to_der() local 85 ret = mbedtls_base64_decode(NULL, 0, &len, (const unsigned char *) s1, s2 - s1); in convert_pem_to_der() 90 if (len > *olen) { in convert_pem_to_der() 94 if ((ret = mbedtls_base64_decode(output, len, &len, (const unsigned char *) s1, in convert_pem_to_der() 99 *olen = len; in convert_pem_to_der()
|
| /programs/fuzz/ |
| A D | fuzz_dtlsclient.c | 37 size_t len; in LLVMFuzzerTestOneInput() local 108 len = sizeof(buf) - 1; in LLVMFuzzerTestOneInput() 109 ret = mbedtls_ssl_read(&ssl, buf, len); in LLVMFuzzerTestOneInput()
|
| A D | fuzz_client.c | 41 size_t len; in LLVMFuzzerTestOneInput() local 163 len = sizeof(buf) - 1; in LLVMFuzzerTestOneInput() 164 ret = mbedtls_ssl_read(&ssl, buf, len); in LLVMFuzzerTestOneInput()
|
| A D | fuzz_dtlsserver.c | 41 size_t len; in LLVMFuzzerTestOneInput() local 145 len = sizeof(buf) - 1; in LLVMFuzzerTestOneInput() 146 ret = mbedtls_ssl_read(&ssl, buf, len); in LLVMFuzzerTestOneInput()
|
| A D | fuzz_server.c | 41 size_t len; in LLVMFuzzerTestOneInput() local 180 len = sizeof(buf) - 1; in LLVMFuzzerTestOneInput() 181 ret = mbedtls_ssl_read(&ssl, buf, len); in LLVMFuzzerTestOneInput()
|
| A D | README.md | 64 if len(portAndPl) == 2:
|
| /programs/x509/ |
| A D | cert_write.c | 215 size_t len = 0; in write_certificate() local 224 len = ret; in write_certificate() 225 output_start = output_buf + 4096 - len; in write_certificate() 232 len = strlen((char *) output_buf); in write_certificate() 240 if (fwrite(output_start, 1, len, f) != len) { in write_certificate() 251 const char *ibuf, size_t *len) in parse_serial_decimal_format() argument 266 *len = 0; in parse_serial_decimal_format() 269 if (obufmax < (*len + 1)) { in parse_serial_decimal_format() 276 if ((val != 0) || (*len != 0)) { in parse_serial_decimal_format() 278 (*len)++; in parse_serial_decimal_format() [all …]
|
| A D | cert_req.c | 117 size_t len = 0; in write_certificate_request() local 124 len = strlen((char *) output_buf); in write_certificate_request() 130 if (fwrite(output_buf, 1, len, f) != len) { in write_certificate_request() 271 cur->node.san.unstructured_name.len = sizeof(ip); in main() 304 cur->node.san.unstructured_name.len = strlen(q); in main()
|