/openssl-master/crypto/err/ |
A D | err_blocks.c | 53 size_t buf_size = 0; in ERR_vset_error() local 67 buf_size = es->err_data_size[i]; in ERR_vset_error() 83 if (buf_size < ERR_MAX_DATA_SIZE in ERR_vset_error() 86 buf_size = ERR_MAX_DATA_SIZE; in ERR_vset_error() 90 printed_len = BIO_vsnprintf(buf, buf_size, fmt, args); in ERR_vset_error() 105 buf_size = printed_len + 1; in ERR_vset_error() 116 err_set_data(es, es->top, buf, buf_size, flags); in ERR_vset_error()
|
/openssl-master/apps/ |
A D | passwd.c | 513 size_t buf_size = 0; in shacrypt() local 537 buf_size = 32; in shacrypt() 541 buf_size = 64; in shacrypt() 623 for (n = passwd_len; n > buf_size; n -= buf_size) { in shacrypt() 624 if (!EVP_DigestUpdate(md, buf, buf_size)) in shacrypt() 634 (n & 1) ? buf_size : passwd_len)) in shacrypt() 654 for (cp = p_bytes, n = passwd_len; n > buf_size; n -= buf_size, cp += buf_size) in shacrypt() 655 memcpy(cp, temp_buf, buf_size); in shacrypt() 671 for (cp = s_bytes, n = salt_len; n > buf_size; n -= buf_size, cp += buf_size) in shacrypt() 672 memcpy(cp, temp_buf, buf_size); in shacrypt() [all …]
|
A D | s_time.c | 131 size_t buf_size; in s_time_main() local 203 buf_size = strlen(www_path) + fmt_http_get_cmd_size; in s_time_main() 204 if (buf_size > sizeof(buf)) { in s_time_main()
|
A D | req.c | 67 int n_min, int n_max, char *buf, const int buf_size, 71 static int join(char buf[], size_t buf_size, const char *name, 1397 int n_min, int n_max, char *buf, const int buf_size, in build_data() argument 1406 if (!join(buf, buf_size, value, "\n", desc1)) in build_data() 1412 if (!fgets(buf, buf_size, stdin)) in build_data() 1425 if (!join(buf, buf_size, def, "\n", desc2)) in build_data() 1481 static int join(char buf[], size_t buf_size, const char *name, in join() argument 1486 if (name_len + tail_len + 1 > buf_size) { in join()
|
/openssl-master/include/openssl/ |
A D | http.h | 40 OSSL_HTTP_REQ_CTX *OSSL_HTTP_REQ_CTX_new(BIO *wbio, BIO *rbio, int buf_size); 68 int buf_size, int overall_timeout); 81 int buf_size, const STACK_OF(CONF_VALUE) *headers, 90 int buf_size, const STACK_OF(CONF_VALUE) *headers,
|
A D | ocsp.h.in | 174 const OCSP_REQUEST *req, int buf_size); 179 # define OCSP_REQ_CTX_new(io, buf_size) \ argument 180 OSSL_HTTP_REQ_CTX_new(io, io, buf_size)
|
/openssl-master/crypto/http/ |
A D | http_client.c | 46 int buf_size; /* Buffer size */ member 102 rctx->buf_size = buf_size > 0 ? buf_size : OSSL_HTTP_DEFAULT_MAX_LINE_LEN; in OSSL_HTTP_REQ_CTX_new() 103 rctx->buf = OPENSSL_malloc(rctx->buf_size); in OSSL_HTTP_REQ_CTX_new() 492 n = BIO_read(rctx->rbio, rctx->buf, rctx->buf_size); in OSSL_HTTP_REQ_CTX_nbio() 544 n = BIO_read(rctx->req, rctx->buf, rctx->buf_size); in OSSL_HTTP_REQ_CTX_nbio() 589 if (n >= rctx->buf_size) { in OSSL_HTTP_REQ_CTX_nbio() 595 n = BIO_gets(rctx->mem, (char *)rctx->buf, rctx->buf_size); in OSSL_HTTP_REQ_CTX_nbio() 605 if (n == rctx->buf_size) { in OSSL_HTTP_REQ_CTX_nbio() 937 buf_size, overall_timeout); in OSSL_HTTP_open() 1087 buf_size, timeout); in OSSL_HTTP_get() [all …]
|
/openssl-master/crypto/ocsp/ |
A D | ocsp_http.c | 16 const OCSP_REQUEST *req, int buf_size) in OCSP_sendreq_new() argument 18 OSSL_HTTP_REQ_CTX *rctx = OSSL_HTTP_REQ_CTX_new(io, io, buf_size); in OCSP_sendreq_new()
|
/openssl-master/doc/man3/ |
A D | OCSP_sendreq_new.pod | 21 const OCSP_REQUEST *req, int buf_size); 45 of I<buf_size>. If I<buf_size> is zero a default value of 4KiB is used.
|
A D | OSSL_HTTP_transfer.pod | 25 int buf_size, int overall_timeout); 38 int buf_size, const STACK_OF(CONF_VALUE) *headers, 47 int buf_size, const STACK_OF(CONF_VALUE) *headers, 125 The I<buf_size> parameter specifies the response header maximum line length. 127 I<buf_size> is also used as the number of content bytes that are read at a time.
|
A D | OSSL_HTTP_REQ_CTX.pod | 27 OSSL_HTTP_REQ_CTX *OSSL_HTTP_REQ_CTX_new(BIO *wbio, BIO *rbio, int buf_size); 65 I<wbio>), and the maximum expected response header line length I<buf_size>. 68 I<buf_size> is also used as the number of content bytes that are read at a time.
|