Home
last modified time | relevance | path

Searched refs:size (Results 1 – 25 of 330) sorted by relevance

12345678910>>...14

/openssl/crypto/bio/
H A Dbss_bio.c67 size_t size; member
84 b->size = 17 * 1024; in bio_new()
111 size_t size = size_; in bio_read() local
137 if (size <= peer_b->size) in bio_read()
149 if (peer_b->len < size) in bio_read()
150 size = peer_b->len; in bio_read()
154 rest = size; in bio_read()
186 return size; in bio_read()
293 if (b->len == b->size) { in bio_write()
374 num = b->size - b->len; in bio_nwrite0()
[all …]
H A Dbf_readbuff.c25 static int readbuffer_read(BIO *h, char *buf, int size);
27 static int readbuffer_gets(BIO *h, char *str, int size);
218 static int readbuffer_gets(BIO *b, char *buf, int size) in readbuffer_gets() argument
225 if (size == 0) in readbuffer_gets()
227 --size; /* the passed in size includes the terminator - so remove it here */ in readbuffer_gets()
236 (num_chars < ctx->ibuf_len) && (num_chars < size); in readbuffer_gets()
246 size -= num_chars; in readbuffer_gets()
249 if (found_newline || size == 0) { in readbuffer_gets()
260 if (!readbuffer_resize(ctx, 1 + size)) in readbuffer_gets()
272 for (i = 0; i < size; ++i) { in readbuffer_gets()
H A Dbf_prefix.c17 static int prefix_read(BIO *b, char *buf, size_t size, size_t *numread);
19 static int prefix_gets(BIO *b, char *str, int size);
76 static int prefix_read(BIO *b, char *in, size_t size, size_t *numread) in prefix_read() argument
78 return BIO_read_ex(BIO_next(b), in, size, numread); in prefix_read()
199 static int prefix_gets(BIO *b, char *buf, int size) in prefix_gets() argument
201 return BIO_gets(BIO_next(b), buf, size); in prefix_gets()
/openssl/include/openssl/
H A Dbuffer.h35 # define BUF_strndup(s, size) OPENSSL_strndup(s, size) argument
36 # define BUF_memdup(data, size) OPENSSL_memdup(data, size) argument
37 # define BUF_strlcpy(dst, src, size) OPENSSL_strlcpy(dst, src, size) argument
38 # define BUF_strlcat(dst, src, size) OPENSSL_strlcat(dst, src, size) argument
/openssl/test/
H A Dparams_conversion_test.c32 size_t size; member
140 pc->size = sizeof(ref_i32); in param_conversion_load_stanza()
149 pc->size = sizeof(ref_i64); in param_conversion_load_stanza()
158 pc->size = sizeof(ref_u32); in param_conversion_load_stanza()
167 pc->size = sizeof(ref_u64); in param_conversion_load_stanza()
176 pc->size = sizeof(ref_d); in param_conversion_load_stanza()
206 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test()
227 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test()
248 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test()
269 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test()
[all …]
H A Dmodes_internal_test.c28 size_t size; member
188 size_t len = aes_cts128_vectors[num].size; in execute_cts128()
195 size_t tail, size; in execute_cts128() local
215 if (!TEST_true(len == size || len + 16 == size) in execute_cts128()
857 if (A.size == 1) in test_gcm128()
859 if (P.size == 1) in test_gcm128()
861 if (C.size == 1) in test_gcm128()
868 memset(out, 0, P.size); in test_gcm128()
876 && !TEST_mem_eq(out, P.size, C.data, P.size))) in test_gcm128()
880 memset(out, 0, P.size); in test_gcm128()
[all …]
H A Dsecmemtest.c139 const int size = 64; in test_sec_mem_clear() local
144 || !TEST_ptr(p = OPENSSL_secure_malloc(size))) in test_sec_mem_clear()
147 for (i = 0; i < size; i++) in test_sec_mem_clear()
151 for (i = 0; i < size; i++) in test_sec_mem_clear()
163 for (i = sizeof(void *) * 2; i < size; i++) in test_sec_mem_clear()
/openssl/doc/man3/
H A DSSL_CTX_set_max_cert_list.pod11 long SSL_CTX_set_max_cert_list(SSL_CTX *ctx, long size);
14 long SSL_set_max_cert_list(SSL *ssl, long size);
19 SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's
20 certificate chain for all SSL objects created from B<ctx> to be <size> bytes.
24 SSL_CTX_get_max_cert_list() returns the currently set maximum size for B<ctx>.
26 SSL_set_max_cert_list() sets the maximum size allowed for the peer's
27 certificate chain for B<ssl> to be <size> bytes. This setting stays valid
30 SSL_get_max_cert_list() returns the currently set maximum size for B<ssl>.
41 The default value for the maximum certificate chain size is 100kB (30kB
45 without special extensions have a typical size of 1-2kB).
[all …]
H A DSSL_CTX_sess_set_cache_size.pod5 SSL_CTX_sess_set_cache_size, SSL_CTX_sess_get_cache_size - manipulate session cache size
16 SSL_CTX_sess_set_cache_size() sets the size of the internal session cache
20 SSL_CTX_sess_get_cache_size() returns the currently valid session cache size.
24 The internal session cache size is SSL_SESSION_CACHE_MAX_SIZE_DEFAULT,
25 currently 1024*20, so that up to 20000 sessions can be held. This size
27 case is the size 0, which is used for unlimited size.
29 If adding the session makes the cache exceed its size, then unused
35 If the size of the session cache is reduced and more sessions are already
42 SSL_CTX_sess_set_cache_size() returns the previously valid size.
44 SSL_CTX_sess_get_cache_size() returns the currently valid size.
H A DEVP_PKEY_get_size.pod23 EVP_PKEY_get_size() returns the maximum suitable size for the output
26 L<EVP_SealInit(3)>, but it isn't limited there. The returned size is
31 that's being performed says otherwise, the size returned by
34 to take note of the size given back by the function that performs the
48 return a positive number, or 0 if this size isn't available.
54 buffer and still pass a pointer to an integer and get the exact size
57 exact buffer size, then allocate the buffer in between, and call that
60 buffer size, but may be useful in cases where it's desirable to know
64 used to get the output size for EVP_DigestSignFinal(), according to
H A DBIO_f_buffer.pod20 long BIO_set_read_buffer_size(BIO *b, long size);
21 long BIO_set_write_buffer_size(BIO *b, long size);
22 long BIO_set_buffer_size(BIO *b, long size);
39 set the read, write or both read and write buffer sizes to B<size>. The initial
40 buffer size is DEFAULT_BUFFER_SIZE, currently 4096. Any attempt to reduce the
41 buffer size below DEFAULT_BUFFER_SIZE is ignored. Any buffered data is cleared
45 bytes of B<buf>. If B<num> is larger than the current buffer size the buffer
60 BIO_gets() or exact size BIO_read_ex() functionality if the following
64 doing so will force a full read of the size of the internal buffer of
H A DBUF_MEM_new.pod22 void BUF_reverse(unsigned char *out, const unsigned char *in, size_t size);
29 BUF_MEM_new() allocates a new buffer of zero size.
38 BUF_MEM_grow() changes the size of an already existing buffer to
40 size.
45 BUF_reverse() reverses B<size> bytes at B<in> into B<out>. If B<in>
55 zero on error or the new size (i.e., B<len>).
/openssl/crypto/
H A Dparam_build.c28 size_t size; member
63 pd->size = size; in param_push()
79 OSSL_PARAM_BLD_DEF *pd = param_push(bld, key, size, size, type, 0); in param_push_num()
85 if (size > sizeof(pd->num)) { in param_push_num()
89 memcpy(&pd->num, num, size); in param_push_num()
334 param[i].data_size = pd->size; in param_bld_convert()
360 memset(p, 0, pd->size); in param_bld_convert()
362 ((char *)p)[pd->size] = '\0'; in param_bld_convert()
365 if (pd->size > sizeof(pd->num)) in param_bld_convert()
366 memset(p, 0, pd->size); in param_bld_convert()
[all …]
H A Dbsearch.c14 int size, int (*cmp) (const void *, const void *), in ossl_bsearch() argument
27 p = &(base_[i * size]); in ossl_bsearch()
39 while (i > 0 && (*cmp) (key, &(base_[(i - 1) * size])) == 0) in ossl_bsearch()
41 p = &(base_[i * size]); in ossl_bsearch()
H A Dpunycode.c258 size_t size = 0; in ossl_a2ulabel() local
270 size += delta + 1; in ossl_a2ulabel()
272 if (size >= *outlen - 1) in ossl_a2ulabel()
292 size += utfsize; in ossl_a2ulabel()
293 if (size >= *outlen - 1) in ossl_a2ulabel()
305 size++; in ossl_a2ulabel()
306 if (size >= *outlen - 1) in ossl_a2ulabel()
H A Do_str.c75 size_t OPENSSL_strlcpy(char *dst, const char *src, size_t size) in OPENSSL_strlcpy() argument
78 for (; size > 1 && *src; size--) { in OPENSSL_strlcpy()
82 if (size) in OPENSSL_strlcpy()
87 size_t OPENSSL_strlcat(char *dst, const char *src, size_t size) in OPENSSL_strlcat() argument
90 for (; size > 0 && *dst; size--, dst++) in OPENSSL_strlcat()
92 return l + OPENSSL_strlcpy(dst, src, size); in OPENSSL_strlcat()
/openssl/crypto/asn1/
H A Dx_int64.c60 if ((it->size & INTxx_FLAG_ZERO_DEFAULT) == INTxx_FLAG_ZERO_DEFAULT in uint64_i2c()
63 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint64_i2c()
96 if ((it->size & INTxx_FLAG_SIGNED) == 0 && neg) { in uint64_c2i()
100 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint64_c2i()
117 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED) in uint64_print()
155 if ((it->size & INTxx_FLAG_ZERO_DEFAULT) == INTxx_FLAG_ZERO_DEFAULT in uint32_i2c()
158 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint32_i2c()
199 if ((it->size & INTxx_FLAG_SIGNED) == 0 && neg) { in uint32_c2i()
210 if (((it->size & INTxx_FLAG_SIGNED) != 0 && utmp > INT32_MAX) in uint32_c2i()
211 || ((it->size & INTxx_FLAG_SIGNED) == 0 && utmp > UINT32_MAX)) { in uint32_c2i()
[all …]
H A Dx_long.c51 memcpy(pval, &it->size, COPY_SIZE(*pval, it->size)); in ASN1_ITEM_start()
57 memcpy(pval, &it->size, COPY_SIZE(*pval, it->size)); in long_free()
93 if (ltmp == it->size) in long_i2c()
181 if (ltmp == it->size) { in long_c2i()
H A Df_int.c54 int a2i_ASN1_INTEGER(BIO *bp, ASN1_INTEGER *bs, char *buf, int size) in a2i_ASN1_INTEGER() argument
63 bufsize = BIO_gets(bp, buf, size); in a2i_ASN1_INTEGER()
131 bufsize = BIO_gets(bp, buf, size); in a2i_ASN1_INTEGER()
149 int a2i_ASN1_ENUMERATED(BIO *bp, ASN1_ENUMERATED *bs, char *buf, int size) in a2i_ASN1_ENUMERATED() argument
151 int rv = a2i_ASN1_INTEGER(bp, bs, buf, size); in a2i_ASN1_ENUMERATED()
/openssl/crypto/bn/
H A Dbn_ctx.c35 unsigned used, size; member
51 unsigned int depth, size; member
165 ctx->stack.size, ctx->pool.size); in BN_CTX_free()
253 st->depth = st->size = 0; in BN_STACK_init()
265 if (st->depth == st->size) { in BN_STACK_push()
268 st->size ? (st->size * 3 / 2) : BN_CTX_START_FRAMES; in BN_STACK_push()
279 st->size = newsize; in BN_STACK_push()
297 p->used = p->size = 0; in BN_POOL_init()
322 if (p->used == p->size) { in BN_POOL_get()
344 p->size += BN_CTX_POOL_SIZE; in BN_POOL_get()
/openssl/test/ssl-tests/
H A D13-fragmentation.cnf.in19 # Default fragment size is 512.
53 name => "small-app-data-large-fragment-size",
69 # Exceeds the 64kB write buffer size.
87 name => "large-app-data-large-fragment-size",
96 name => "large-app-data-odd-fragment-size",
104 # When the buffer / fragment size ratio is sufficiently large,
161 # Here fragment size == app data size < buffer size,
189 # Default Application data size is 256.
/openssl/test/recipes/30-test_evp_data/
H A Devpmac_siphash.txt132 Ctrl = size:8
146 Ctrl = size:16
154 Ctrl = size:0
159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
162 Ctrl = size:13
166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
177 Ctrl = size:0
188 Ctrl = size:8
/openssl/doc/man7/
H A DEVP_MAC-HMAC.pod60 =item "tls-data-size" (B<OSSL_MAC_PARAM_TLS_DATA_SIZE>) <unsigned integer>
70 =item "size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
72 The "size" parameter can also be retrieved with EVP_MAC_CTX_get_mac_size().
73 The length of the "size" parameter is equal to that of an B<unsigned int>.
79 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
81 Gets the MAC block size. The "block-size" parameter can also be retrieved with
H A DEVP_MAC-BLAKE2.pod31 Furthermore, the "size" parameter can be retrieved with
33 The length of the "size" parameter should not exceed that of a B<size_t>.
34 Likewise, the "block-size" parameter can be retrieved with
58 =item "size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
60 Sets the MAC size.
65 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
67 Gets the MAC block size.
H A DEVP_MAC-CMAC.pod56 =item "size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
58 The "size" parameter can also be retrieved with with EVP_MAC_CTX_get_mac_size().
59 The length of the "size" parameter is equal to that of an B<unsigned int>.
65 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
67 Gets the MAC block size. The "block-size" parameter can also be retrieved with

Completed in 54 milliseconds

12345678910>>...14