Searched refs:remaining (Results 1 – 22 of 22) sorted by relevance
26 size_t remaining; member33 pkt->remaining -= len; in packet_forward()41 return pkt->remaining; in PACKET_remaining()78 pkt->remaining = len; in PACKET_buf_init()86 pkt->remaining = 0; in PACKET_null_init()402 *len = pkt->remaining; in PACKET_copy_all()494 subpkt->remaining = length; in PACKET_get_length_prefixed_1()517 subpkt->remaining = length; in PACKET_as_length_prefixed_1()543 subpkt->remaining = length; in PACKET_get_length_prefixed_2()567 subpkt->remaining = length; in PACKET_as_length_prefixed_2()[all …]
142 size_t len, remaining; in client_hello_select_server_ctx() local151 &remaining) || in client_hello_select_server_ctx()152 remaining <= 2) in client_hello_select_server_ctx()157 if (len + 2 != remaining) in client_hello_select_server_ctx()159 remaining = len; in client_hello_select_server_ctx()164 if (remaining == 0 || *p++ != TLSEXT_NAMETYPE_host_name) in client_hello_select_server_ctx()166 remaining--; in client_hello_select_server_ctx()168 if (remaining <= 2) in client_hello_select_server_ctx()172 if (len + 2 > remaining) in client_hello_select_server_ctx()174 remaining = len; in client_hello_select_server_ctx()
27 The remaining functions described on this page are deprecated.
59 If there are any invalid CT logs in a file, they are skipped and the remaining
34 and I<*pdata_len> to have the number of remaining bytes.
39 remaining bytes.
79 The deprecated type and the remaining deprecated functions
113 using B<lh_I<TYPE>_doall>() to deallocate any remaining entries in the119 remaining entries in the hash table (see below).
74 of the remaining parameters can be NULL if the application is not interested in
204 Also the remaining parameters are interpreted as described for OSSL_HTTP_open()216 The remaining parameters are interpreted as described for OSSL_HTTP_open()
103 contains only the remaining data to be read. If the close status of the
99 The remaining functions utilise the internal I<kinv> and I<r> values used
73 process any partial block of data remaining in the B<ctx> object. The output
280 The remaining functions return 1 for success and 0 or a negative value for
381 The remaining functions return 1 for success and 0 or a negative value for
171 It initializes the remaining fields to their default values - for instance,
546 command name exists, and the remaining commands take a command identifier and
350 an initial call and supply the remaining parameters in subsequent calls, all of
3930 unsigned int remaining; in aes_ocb_cipher() local3932 remaining = AES_BLOCK_SIZE - (*buf_len); in aes_ocb_cipher()3933 if (remaining > len) { in aes_ocb_cipher()3938 memcpy(buf + (*buf_len), in, remaining); in aes_ocb_cipher()3943 len -= remaining; in aes_ocb_cipher()3944 in += remaining; in aes_ocb_cipher()
181 /* Add any remaining 16 byte blocks (128 bit each) */
273 All of the remaining functions should return 1 for success or 0 on error.
8551 * Implement remaining functionality needed to support GOST ciphersuites.10045 Also deactivate the remaining ciphersuites from11187 Also deactivate the remaining ciphersuites from13245 * Finish off removing the remaining LHASH function pointer casts.15468 otherwise, if SSL_VERIFY_NONE is set, remaining error codes15948 * Add command line password options to the remaining applications.18223 * Get rid of remaining C++-style comments which strict C compilers hate.
Completed in 53 milliseconds