/openssl/crypto/ |
H A D | param_build.c | 253 const char *buf, size_t bsize) in OSSL_PARAM_BLD_push_utf8_string() argument 258 if (bsize == 0) in OSSL_PARAM_BLD_push_utf8_string() 259 bsize = strlen(buf); in OSSL_PARAM_BLD_push_utf8_string() 261 pd = param_push(bld, key, bsize, bsize + 1, OSSL_PARAM_UTF8_STRING, secure); in OSSL_PARAM_BLD_push_utf8_string() 269 char *buf, size_t bsize) in OSSL_PARAM_BLD_push_utf8_ptr() argument 273 if (bsize == 0) in OSSL_PARAM_BLD_push_utf8_ptr() 274 bsize = strlen(buf); in OSSL_PARAM_BLD_push_utf8_ptr() 275 pd = param_push(bld, key, bsize, sizeof(buf), OSSL_PARAM_UTF8_PTR, 0); in OSSL_PARAM_BLD_push_utf8_ptr() 283 const void *buf, size_t bsize) in OSSL_PARAM_BLD_push_octet_string() argument 289 pd = param_push(bld, key, bsize, bsize, OSSL_PARAM_OCTET_STRING, secure); in OSSL_PARAM_BLD_push_octet_string() [all …]
|
H A D | params.c | 1152 size_t bsize) in OSSL_PARAM_construct_BN() argument 1155 buf, bsize); in OSSL_PARAM_construct_BN() 1447 size_t bsize) in OSSL_PARAM_construct_utf8_string() argument 1449 if (buf != NULL && bsize == 0) in OSSL_PARAM_construct_utf8_string() 1450 bsize = strlen(buf); in OSSL_PARAM_construct_utf8_string() 1451 return ossl_param_construct(key, OSSL_PARAM_UTF8_STRING, buf, bsize); in OSSL_PARAM_construct_utf8_string() 1455 size_t bsize) in OSSL_PARAM_construct_octet_string() argument 1524 size_t bsize) in OSSL_PARAM_construct_utf8_ptr() argument 1526 return ossl_param_construct(key, OSSL_PARAM_UTF8_PTR, buf, bsize); in OSSL_PARAM_construct_utf8_ptr() 1530 size_t bsize) in OSSL_PARAM_construct_octet_ptr() argument [all …]
|
/openssl/test/ |
H A D | punycode_test.c | 157 unsigned int bsize = OSSL_NELEM(buffer); in test_punycode() local 161 buffer, &bsize))) in test_punycode() 166 if (!TEST_mem_eq(buffer, bsize * sizeof(*buffer), in test_punycode() 229 unsigned int bsize = OSSL_NELEM(buf) - 1; in test_puny_overrun() local 231 if (!TEST_false(ossl_punycode_decode(in, strlen(in), buf, &bsize))) { in test_puny_overrun() 232 if (TEST_mem_eq(buf, bsize * sizeof(*buf), out, sizeof(out))) in test_puny_overrun()
|
H A D | ectest.c | 2072 size_t bsize; in ossl_parameter_test() local 2745 bsize = 1 + 2 * bsize; /* UNCOMPRESSED_POINT format */ in custom_generator_test() 2764 bsize, ctx), bsize) in custom_generator_test() 2781 bsize, ctx), bsize) in custom_generator_test() 2783 || !TEST_mem_eq(b1, bsize, b2, bsize)) in custom_generator_test() 2859 bsize = 1 + 2 * bsize; /* UNCOMPRESSED_POINT format */ in custom_params_test() 2874 buf1, bsize, ctx), bsize) in custom_params_test() 2918 buf1, bsize, ctx), bsize) in custom_params_test() 2930 buf2, bsize, ctx), bsize) in custom_params_test() 2932 || !TEST_mem_eq(buf1, bsize, buf2, bsize)) in custom_params_test() [all …]
|
/openssl/include/openssl/ |
H A D | param_build.h | 52 const char *buf, size_t bsize); 54 char *buf, size_t bsize); 56 const void *buf, size_t bsize); 58 void *buf, size_t bsize);
|
H A D | params.h | 86 size_t bsize); 89 size_t bsize); 91 size_t bsize); 93 size_t bsize); 95 size_t bsize);
|
H A D | evp.h | 2029 const unsigned char *buf, size_t bsize);
|
/openssl/doc/man3/ |
H A D | OSSL_PARAM_int.pod | 66 size_t bsize); 68 size_t bsize); 70 size_t bsize); 72 size_t bsize); 74 size_t bsize); 190 A parameter with name I<key>, storage I<buf>, size I<bsize> and return 196 If I<bsize> is zero, the string length is determined using strlen(3). 197 Generally pass zero for I<bsize> instead of calling strlen(3) yourself. 205 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize> 210 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize> [all …]
|
H A D | OSSL_PARAM_BLD.pod | 37 const char *buf, size_t bsize); 39 char *buf, size_t bsize); 41 const void *buf, size_t bsize); 43 void *buf, size_t bsize); 106 The length of the string I<bsize> should not include the terminating NUL byte. 112 object that references the octet string specified by I<buf> and <bsize>. 118 The length of the string I<bsize> should not include the terminating NUL byte.
|
H A D | EVP_PKEY_settable_params.pod | 23 const unsigned char *buf, size_t bsize); 50 size I<bsize> into a key I<pkey> for the associated field I<key_name>.
|
/openssl/apps/ |
H A D | enc.c | 132 int bsize = BSIZE, verbose = 0, debug = 0, olb64 = 0, nosalt = 0; in enc_main() local 255 bsize = (int)n; in enc_main() 350 if (base64 && bsize < 80) in enc_main() 351 bsize = 80; in enc_main() 353 BIO_printf(bio_err, "bufsize=%d\n", bsize); in enc_main() 372 buff = app_malloc(EVP_ENCODE_LENGTH(bsize), "evp buffer"); in enc_main() 690 inl = BIO_read(rbio, (char *)buff, bsize); in enc_main()
|
/openssl/crypto/evp/ |
H A D | p_lib.c | 2319 int bsize = 0; in EVP_PKEY_set_bn_param() local 2327 bsize = BN_num_bytes(bn); in EVP_PKEY_set_bn_param() 2328 if (!ossl_assert(bsize <= (int)sizeof(buffer))) in EVP_PKEY_set_bn_param() 2331 if (BN_bn2nativepad(bn, buffer, bsize) < 0) in EVP_PKEY_set_bn_param() 2333 params[0] = OSSL_PARAM_construct_BN(key_name, buffer, bsize); in EVP_PKEY_set_bn_param() 2352 const unsigned char *buf, size_t bsize) in EVP_PKEY_set_octet_string_param() argument 2360 (unsigned char *)buf, bsize); in EVP_PKEY_set_octet_string_param()
|