/apps/lib/ |
A D | app_params.c | 101 static void print_param_utf8(const char **s_ptr, size_t len) in print_param_utf8() argument 114 if (len > 0) in print_param_utf8() 115 BIO_write(bio_out, s, (int)len); in print_param_utf8() 120 static void print_param_octet(const unsigned char **bytes_ptr, size_t len) in print_param_octet() argument 126 BIO_printf(bio_out, "<%zu bytes>", len); in print_param_octet() 135 if (len == 0) { in print_param_octet() 140 if (len > MAX_OCTET_STRING_OUTPUT_BYTES) { in print_param_octet() 141 len = MAX_OCTET_STRING_OUTPUT_BYTES; in print_param_octet() 145 for (i = 0; i < len; i++) in print_param_octet()
|
A D | columns.c | 17 int len, maxlen = 0; in calculate_columns() local 21 if ((len = (int)strlen(f->name)) > maxlen) in calculate_columns() 22 maxlen = len; in calculate_columns()
|
A D | http_server.c | 270 int len; in http_server_get_asn1_req() local 314 len = BIO_gets(cbio, reqbuf, sizeof(reqbuf)); in http_server_get_asn1_req() 315 if (len == 0) in http_server_get_asn1_req() 318 if (len < 0) { in http_server_get_asn1_req() 382 len = urldecode(url); in http_server_get_asn1_req() 383 if (len < 0) { in http_server_get_asn1_req() 390 if ((getbio = BIO_new_mem_buf(url, len)) == NULL in http_server_get_asn1_req() 393 "could not allocate base64 bio with size = %d", len); in http_server_get_asn1_req() 418 len = BIO_gets(cbio, inbuf, sizeof(inbuf)); in http_server_get_asn1_req() 419 if (len <= 0) { in http_server_get_asn1_req()
|
A D | log.c | 33 static int print_syslog(const char *str, size_t len, void *levPtr) in print_syslog() argument 36 int ilen = len > MAXERRLEN ? MAXERRLEN : len; in print_syslog()
|
A D | s_cb.c | 491 (void *)bio, (void *)argp, len, ret); in bio_dump_callback() 663 size_t len, SSL *ssl, void *arg) in msg_cb() argument 687 if (len == 2) { in msg_cb() 703 if (len > 0) in msg_cb() 731 if (len > 0) { in msg_cb() 735 num = len; in msg_cb() 741 if (i < len) in msg_cb() 849 BIO_dump(bio, (const char *)data, len); in tlsext_cb() 1247 size_t outlen = 2 * len + 1; in hexencode() 1252 opt_getprog(), len); in hexencode() [all …]
|
A D | apps.c | 1423 if (i < len - 1) in print_array() 2070 int len, ret; in bio_to_mem() local 2078 len = maxlen; in bio_to_mem() 2080 len = 1024; in bio_to_mem() 2081 len = BIO_read(in, tbuf, len); in bio_to_mem() 2082 if (len < 0) { in bio_to_mem() 2086 if (len == 0) in bio_to_mem() 2088 if (BIO_write(mem, tbuf, len) != len) { in bio_to_mem() 2168 size_t len; in next_protos_parse() local 2173 len = strlen(in); in next_protos_parse() [all …]
|
A D | vms_term_sock.c | 132 len; in main() local 147 len = recv (TermSock, TermBuff, sizeof(TermBuff), 0) ; in main() 148 TermBuff[len] = '\0'; in main()
|
A D | opt.c | 149 size_t len = strlen(prog); in opt_appname() local 152 BIO_snprintf(prog + len, sizeof(prog) - len - 1, " %s", argv0); in opt_appname()
|
/apps/ |
A D | mac.c | 58 size_t len = strlen(name) + strlen(arg) + 2; in alloc_mac_algorithm_name() local 66 res = app_malloc(len, "algorithm name"); in alloc_mac_algorithm_name() 67 BIO_snprintf(res, len, "%s:%s", name, arg); in alloc_mac_algorithm_name() 83 size_t len; in mac_main() local 200 if (!EVP_MAC_final(ctx, NULL, &len, 0)) { in mac_main() 204 if (len > BUFSIZE) { in mac_main() 209 if (!EVP_MAC_final(ctx, buf, &len, BUFSIZE)) { in mac_main() 215 BIO_write(out, buf, (int)len); in mac_main() 217 for (i = 0; i < (int)len; ++i) in mac_main()
|
A D | dgst.c | 579 BIO_write(out, buf, (int)len); in print_out() 586 for (i = 0; i < (int)len; i++) in print_out() 602 for (i = 0; i < (int)len; i++) { in print_out() 626 size_t len = BUFSIZE; in do_fp() local 658 len = tmplen; in do_fp() 669 len = xoflen; in do_fp() 670 if (len > BUFSIZE) { in do_fp() 677 if (!EVP_DigestFinalXOF(ctx, buf, len)) { in do_fp() 683 if ((int)len < 0) in do_fp() 690 OPENSSL_clear_free(allocated_buf, len); in do_fp() [all …]
|
A D | engine.c | 58 int len = (int)(strlen(s) + 1); in append_buf() local 62 *size = ((len + expand - 1) / expand) * expand; in append_buf() 68 len += 2 + blen; in append_buf() 70 if (len > *size) { in append_buf() 71 *size = ((len + expand - 1) / expand) * expand; in append_buf() 171 int len; in util_verbose() local 178 if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num, in util_verbose() 181 name = app_malloc(len + 1, "name buffer"); in util_verbose() 186 if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num, in util_verbose() 189 if (len > 0) { in util_verbose() [all …]
|
A D | srp.c | 130 int len; in srp_verify_user() local 135 len = password_callback(password, sizeof(password)-1, 0, &cb_tmp); in srp_verify_user() 136 if (len > 0) { in srp_verify_user() 137 password[len] = 0; in srp_verify_user() 154 OPENSSL_cleanse(password, len); in srp_verify_user() 167 int len; in srp_create_user() local 171 len = password_callback(password, sizeof(password)-1, 1, &cb_tmp); in srp_create_user() 172 if (len > 0) { in srp_create_user() 173 password[len] = 0; in srp_create_user() 183 OPENSSL_cleanse(password, len); in srp_create_user()
|
A D | s_client.c | 289 size_t len; member 436 ossl_ssize_t len = 0; in tlsa_import_rr() local 931 int serverinfo_count = 0, start = 0, len; in s_client_main() local 1510 len = (int)strlen(p); in s_client_main() 1548 len = atoi(opt_arg()); in s_client_main() 1549 switch (len) { in s_client_main() 1565 prog, len); in s_client_main() 3710 long len; in ldap_ExtendedResponse_parse() local 3965 *len = 0; in user_data_process() 4083 *len = *off = 0; in user_data_process() [all …]
|
A D | asn1parse.c | 324 int len; in do_generate() local 346 len = i2d_ASN1_TYPE(atyp, NULL); in do_generate() 348 if (len <= 0) in do_generate() 351 if (!BUF_MEM_grow(buf, len)) in do_generate() 359 return len; in do_generate()
|
A D | kdf.c | 54 size_t len = strlen(name) + strlen(arg) + 2; in alloc_kdf_algorithm_name() local 62 res = app_malloc(len, "algorithm name"); in alloc_kdf_algorithm_name() 63 BIO_snprintf(res, len, "%s:%s", name, arg); in alloc_kdf_algorithm_name()
|
A D | fipsinstall.c | 335 size_t len) in print_mac() argument 340 hexstr = OPENSSL_buf2hexstr(mac, (long)len); in print_mac() 519 long len; in verify_config() local 537 buf1 = OPENSSL_hexstr2buf(s, &len); in verify_config() 539 || (size_t)len != module_mac_len in verify_config() 555 buf2 = OPENSSL_hexstr2buf(s, &len); in verify_config() 557 || (size_t)len != install_mac_len in verify_config()
|
A D | ts.c | 449 int len; in create_query() local 473 if ((len = create_digest(data_bio, digest, md, &data)) == 0) in create_query() 475 if (!TS_MSG_IMPRINT_set_msg(msg_imprint, data, len)) in create_query() 561 int len = (bits - 1) / 8 + 1; in create_nonce() local 564 if (len > (int)sizeof(buf)) in create_nonce() 566 if (RAND_bytes(buf, len) <= 0) in create_nonce() 570 for (i = 0; i < len && !buf[i]; ++i) in create_nonce() 575 nonce->length = len - i; in create_nonce()
|
A D | req.c | 69 static int req_check_len(int len, int n_min, int n_max); 1439 static int req_check_len(int len, int n_min, int n_max) in req_check_len() argument 1441 if (n_min > 0 && len < n_min) { in req_check_len() 1446 if (n_max >= 0 && len > n_max) { in req_check_len() 1513 int len; in set_keygen_ctx() local 1516 len = (int)(p - gstr); in set_keygen_ctx() 1518 len = (int)strlen(gstr); in set_keygen_ctx() 1520 if (strncmp(gstr, "param", len) == 0) { in set_keygen_ctx() 1530 keytypelen = len; in set_keygen_ctx() 1534 gstr = gstr + len + 1; in set_keygen_ctx()
|
A D | x509.c | 1181 size_t len = p != NULL ? (size_t)(p - CAfile) : strlen(CAfile); in x509_load_serial() local 1183 buf = app_malloc(len + sizeof(POSTFIX), "serial# buffer"); in x509_load_serial() 1184 memcpy(buf, CAfile, len); in x509_load_serial() 1185 memcpy(buf + len, POSTFIX, sizeof(POSTFIX)); in x509_load_serial() 1258 int cnt = 0, len = 0; in parse_ext_names() local 1261 len = (int)strlen(names); in parse_ext_names() 1263 while (q - names <= len) { in parse_ext_names()
|
A D | cmp.c | 2584 size_t len; in prev_item() local 2596 len = end - beg; in prev_item() 2597 if (len > SECTION_NAME_MAX) { in prev_item() 2600 len = SECTION_NAME_MAX; in prev_item() 2602 memcpy(opt_item, beg, len); in prev_item() 2603 opt_item[len] = '\0'; in prev_item() 3306 long len; in print_keyspec() local 3356 len = BIO_get_mem_data(mem, &p); in print_keyspec() 3357 if (len > INT_MAX) in print_keyspec() 3360 CMP_info2("%.*s", (int)len, p); in print_keyspec()
|
A D | s_server.c | 868 size_t len; member 872 unsigned int *len, void *arg) in next_proto_cb() argument 877 *len = (unsigned int)next_proto->len; in next_proto_cb() 886 size_t len; member 910 (unsigned int)alpn_ctx->len, in, inlen) != OPENSSL_NPN_NEGOTIATED) in alpn_cb() 2069 next_proto.data = next_protos_parse(&next_proto.len, next_proto_neg_in); in s_server_main() 2076 alpn_ctx.data = next_protos_parse(&alpn_ctx.len, alpn_in); in s_server_main() 2641 static long int count_reads_callback(BIO *bio, int cmd, const char *argp, size_t len, in count_reads_callback() argument 2658 ret = (int)bio_dump_callback(bio, cmd, argp, len, argi, argl, ret, processed); in count_reads_callback()
|
A D | speed.c | 2732 int len = (int)strlen(hmac_key); in speed_main() local 2747 (char *)hmac_key, len); in speed_main() 3139 size_t len = sizeof("cmac()") + strlen(evp_mac_ciphername); in speed_main() local 3152 evp_cmac_name = app_malloc(len, "CMAC name"); in speed_main() 3153 BIO_snprintf(evp_cmac_name, len, "cmac(%s)", evp_mac_ciphername); in speed_main() 5136 size_t len = mblengths[j]; in multiblock_speed() local 5147 mb_param.len = len; in multiblock_speed() 5156 mb_param.len = len; in multiblock_speed() 5165 len += 16; in multiblock_speed() 5166 aad[11] = (unsigned char)(len >> 8); in multiblock_speed() [all …]
|
A D | pkcs12.c | 54 void hex_prin(BIO *out, unsigned char *buf, int len); 1331 void hex_prin(BIO *out, unsigned char *buf, int len) in hex_prin() argument 1334 for (i = 0; i < len; i++) in hex_prin()
|
/apps/include/ |
A D | s_apps.h | 44 long bio_dump_callback(BIO *bio, int cmd, const char *argp, size_t len, 49 size_t len, SSL *ssl, void *arg); 51 int len, void *arg);
|