Lines Matching refs:buf

1514 	char buf[256];  in PHP_FUNCTION()  local
1533 char buf[32]; in PHP_FUNCTION() local
1534 snprintf(buf, sizeof(buf), "%08lx", X509_subject_name_hash(cert)); in PHP_FUNCTION()
1535 add_assoc_string(return_value, "hash", buf, 1); in PHP_FUNCTION()
1602 OBJ_obj2txt(buf, sizeof(buf)-1, X509_EXTENSION_get_object(extension), 1); in PHP_FUNCTION()
1603 extname = buf; in PHP_FUNCTION()
4209 char buf[512]; in PHP_FUNCTION() local
4218 RETURN_STRING(ERR_error_string(val, buf), 1); in PHP_FUNCTION()
4350 unsigned char *buf = NULL, **eks; in PHP_FUNCTION() local
4413 buf = emalloc(data_len + EVP_CIPHER_CTX_block_size(&ctx)); in PHP_FUNCTION()
4416 …if (!EVP_SealInit(&ctx, cipher, eks, eksl, NULL, pkeys, nkeys) || !EVP_SealUpdate(&ctx, buf, &len1… in PHP_FUNCTION()
4418 efree(buf); in PHP_FUNCTION()
4423 EVP_SealFinal(&ctx, buf + len1, &len2); in PHP_FUNCTION()
4427 buf[len1 + len2] = '\0'; in PHP_FUNCTION()
4428 buf = erealloc(buf, len1 + len2 + 1); in PHP_FUNCTION()
4429 ZVAL_STRINGL(sealdata, (char *)buf, len1 + len2, 0); in PHP_FUNCTION()
4449 efree(buf); in PHP_FUNCTION()
4477 unsigned char *buf; in PHP_FUNCTION() local
4506 buf = emalloc(data_len + 1); in PHP_FUNCTION()
4508 …pher, (unsigned char *)ekey, ekey_len, NULL, pkey) && EVP_OpenUpdate(&ctx, buf, &len1, (unsigned c… in PHP_FUNCTION()
4509 if (!EVP_OpenFinal(&ctx, buf + len1, &len2) || (len1 + len2 == 0)) { in PHP_FUNCTION()
4510 efree(buf); in PHP_FUNCTION()
4514 buf[len1 + len2] = '\0'; in PHP_FUNCTION()
4515 ZVAL_STRINGL(opendata, erealloc(buf, len1 + len2 + 1), len1 + len2, 0); in PHP_FUNCTION()
4519 efree(buf); in PHP_FUNCTION()
4578 char buf[1024]; in php_openssl_apply_verification_policy() local
4615 int name_len = X509_NAME_get_text_by_NID(name, NID_commonName, buf, sizeof(buf)); in php_openssl_apply_verification_policy()
4620 } else if (name_len != strlen(buf)) { in php_openssl_apply_verification_policy()
4621 …_error_docref(NULL TSRMLS_CC, E_WARNING, "Peer certificate CN=`%.*s' is malformed", name_len, buf); in php_openssl_apply_verification_policy()
4625 match = strcasecmp(cnmatch, buf) == 0; in php_openssl_apply_verification_policy()
4626 if (!match && strlen(buf) > 3 && buf[0] == '*' && buf[1] == '.') { in php_openssl_apply_verification_policy()
4629 if (strchr(buf+2, '.')) { in php_openssl_apply_verification_policy()
4630 char *tmp = strstr(cnmatch, buf+1); in php_openssl_apply_verification_policy()
4632 match = tmp && strcasecmp(tmp, buf+2) && tmp == strchr(cnmatch, '.'); in php_openssl_apply_verification_policy()
4638 …C, E_WARNING, "Peer certificate CN=`%.*s' did not match expected CN=`%s'", name_len, buf, cnmatch); in php_openssl_apply_verification_policy()
4647 static int passwd_callback(char *buf, int num, int verify, void *data) /* {{{ */ in passwd_callback() argument
4658 memcpy(buf, Z_STRVAL_PP(val), Z_STRLEN_PP(val)+1); in passwd_callback()