Home
last modified time | relevance | path

Searched refs:size (Results 1 – 25 of 395) sorted by relevance

12345678910>>...16

/openssl/crypto/bn/
H A Dbn_s390x.c28 size_t size; in s390x_mod_exp_hw() local
33 size = BN_num_bytes(m); in s390x_mod_exp_hw()
38 me.inputdatalength = size; in s390x_mod_exp_hw()
40 me.outputdatalength = size; in s390x_mod_exp_hw()
84 size_t size, plen, qlen; in s390x_crt() local
104 part += 2 * size; in s390x_crt()
107 part += 2 * size; in s390x_crt()
109 part += size + 8; in s390x_crt()
111 part += size; in s390x_crt()
113 part += size + 8; in s390x_crt()
[all …]
H A Dbn_ctx.c35 unsigned used, size; member
51 unsigned int depth, size; member
163 ctx->stack.size, ctx->pool.size); in BN_CTX_free()
251 st->depth = st->size = 0; in BN_STACK_init()
263 if (st->depth == st->size) { in BN_STACK_push()
266 st->size ? (st->size * 3 / 2) : BN_CTX_START_FRAMES; in BN_STACK_push()
275 st->size = newsize; in BN_STACK_push()
293 p->used = p->size = 0; in BN_POOL_init()
318 if (p->used == p->size) { in BN_POOL_get()
338 p->size += BN_CTX_POOL_SIZE; in BN_POOL_get()
/openssl/crypto/bio/
H A Dbss_bio.c67 size_t size; member
84 b->size = 17 * 1024; in bio_new()
111 size_t size = size_; in bio_read() local
137 if (size <= peer_b->size) in bio_read()
149 if (peer_b->len < size) in bio_read()
150 size = peer_b->len; in bio_read()
154 rest = size; in bio_read()
186 return size; in bio_read()
293 if (b->len == b->size) { in bio_write()
374 num = b->size - b->len; in bio_nwrite0()
[all …]
H A Dbf_readbuff.c25 static int readbuffer_read(BIO *h, char *buf, int size);
27 static int readbuffer_gets(BIO *h, char *str, int size);
218 static int readbuffer_gets(BIO *b, char *buf, int size) in readbuffer_gets() argument
225 if (buf == NULL || size == 0) in readbuffer_gets()
227 --size; /* the passed in size includes the terminator - so remove it here */ in readbuffer_gets()
239 (num_chars < ctx->ibuf_len) && (num_chars < size); in readbuffer_gets()
249 size -= num_chars; in readbuffer_gets()
252 if (found_newline || size == 0) { in readbuffer_gets()
263 if (!readbuffer_resize(ctx, 1 + size)) in readbuffer_gets()
275 for (i = 0; i < size; ++i) { in readbuffer_gets()
/openssl/test/
H A Dbio_comp_test.c37 static int do_bio_comp_test(const BIO_METHOD *meth, size_t size) in do_bio_comp_test() argument
54 osize = BIO_write(bcomp, original, size); in do_bio_comp_test()
55 if (!TEST_int_eq(osize, size) in do_bio_comp_test()
65 rsize = BIO_read(bexp, result, size); in do_bio_comp_test()
67 if (!TEST_int_eq(size, rsize) in do_bio_comp_test()
83 int size = sizes[n % 4]; in do_bio_comp() local
92 TEST_info("zeros of size %d\n", size); in do_bio_comp()
96 TEST_info("ones of size %d\n", size); in do_bio_comp()
100 TEST_info("sequential of size %d\n", size); in do_bio_comp()
105 TEST_info("random of size %d\n", size); in do_bio_comp()
[all …]
H A Dparams_conversion_test.c32 size_t size; member
140 pc->size = sizeof(ref_i32); in param_conversion_load_stanza()
149 pc->size = sizeof(ref_i64); in param_conversion_load_stanza()
158 pc->size = sizeof(ref_u32); in param_conversion_load_stanza()
167 pc->size = sizeof(ref_u64); in param_conversion_load_stanza()
176 pc->size = sizeof(ref_d); in param_conversion_load_stanza()
206 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test()
227 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test()
248 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test()
269 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test()
[all …]
H A Dmodes_internal_test.c28 size_t size; member
189 size_t len = aes_cts128_vectors[num].size; in execute_cts128()
196 size_t tail, size; in execute_cts128() local
216 if (!TEST_true(len == size || len + 16 == size) in execute_cts128()
858 if (A.size == 1) in test_gcm128()
860 if (P.size == 1) in test_gcm128()
862 if (C.size == 1) in test_gcm128()
869 memset(out, 0, P.size); in test_gcm128()
877 && !TEST_mem_eq(out, P.size, C.data, P.size))) in test_gcm128()
881 memset(out, 0, P.size); in test_gcm128()
[all …]
H A Dbio_pw_callback_test.c72 static int callback_copy_password(char *buf, int size) in callback_copy_password() argument
99 memset(buf, 'e', size); in callback_copy_password()
100 ret = size; in callback_copy_password()
103 memset(buf, 'e', size); in callback_copy_password()
110 static int read_callback(char *buf, int size, int rwflag, void *u) in read_callback() argument
122 if (!TEST_int_gt(size, 0)) in read_callback()
126 ret = callback_copy_password(buf, size); in read_callback()
132 static int write_callback(char *buf, int size, int rwflag, void *u) in write_callback() argument
144 if (!TEST_int_gt(size, 0)) in write_callback()
148 ret = callback_copy_password(buf, size); in write_callback()
[all …]
H A Dquic_stream_test.c355 if (rec_len > size) { in test_single_copy_read()
356 rec_len = size; in test_single_copy_read()
360 size -= rec_len; in test_single_copy_read()
366 if (*fin || size == 0) in test_single_copy_read()
507 queued_min = off + size; in test_rstream_random()
513 if (queued_max < off + size) in test_rstream_random()
514 queued_max = off + size; in test_rstream_random()
524 if (off + size > data_size) in test_rstream_random()
525 off = data_size - size; in test_rstream_random()
527 queued_min = off + size; in test_rstream_random()
[all …]
H A Dsecmemtest.c139 const int size = 64; in test_sec_mem_clear() local
144 || !TEST_ptr(p = OPENSSL_secure_malloc(size))) in test_sec_mem_clear()
147 for (i = 0; i < size; i++) in test_sec_mem_clear()
151 for (i = 0; i < size; i++) in test_sec_mem_clear()
163 for (i = sizeof(void *) * 2; i < size; i++) in test_sec_mem_clear()
/openssl/include/openssl/
H A Dbuffer.h35 # define BUF_strndup(s, size) OPENSSL_strndup(s, size) argument
36 # define BUF_memdup(data, size) OPENSSL_memdup(data, size) argument
37 # define BUF_strlcpy(dst, src, size) OPENSSL_strlcpy(dst, src, size) argument
38 # define BUF_strlcat(dst, src, size) OPENSSL_strlcat(dst, src, size) argument
/openssl/doc/man3/
H A DSSL_CTX_set_max_cert_list.pod11 long SSL_CTX_set_max_cert_list(SSL_CTX *ctx, long size);
14 long SSL_set_max_cert_list(SSL *ssl, long size);
19 SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's
20 certificate chain for all SSL objects created from B<ctx> to be <size> bytes.
24 SSL_CTX_get_max_cert_list() returns the currently set maximum size for B<ctx>.
26 SSL_set_max_cert_list() sets the maximum size allowed for the peer's
27 certificate chain for B<ssl> to be <size> bytes. This setting stays valid
30 SSL_get_max_cert_list() returns the currently set maximum size for B<ssl>.
41 The default value for the maximum certificate chain size is 100kB (30kB
45 without special extensions have a typical size of 1-2kB).
[all …]
H A DSSL_CTX_sess_set_cache_size.pod5 SSL_CTX_sess_set_cache_size, SSL_CTX_sess_get_cache_size - manipulate session cache size
16 SSL_CTX_sess_set_cache_size() sets the size of the internal session cache
20 SSL_CTX_sess_get_cache_size() returns the currently valid session cache size.
24 The internal session cache size is SSL_SESSION_CACHE_MAX_SIZE_DEFAULT,
25 currently 1024*20, so that up to 20000 sessions can be held. This size
27 case is the size 0, which is used for unlimited size.
29 If adding the session makes the cache exceed its size, then unused
35 If the size of the session cache is reduced and more sessions are already
42 SSL_CTX_sess_set_cache_size() returns the previously valid size.
44 SSL_CTX_sess_get_cache_size() returns the currently valid size.
H A DBIO_f_buffer.pod20 long BIO_set_read_buffer_size(BIO *b, long size);
21 long BIO_set_write_buffer_size(BIO *b, long size);
22 long BIO_set_buffer_size(BIO *b, long size);
39 set the read, write or both read and write buffer sizes to B<size>. The initial
40 buffer size is DEFAULT_BUFFER_SIZE, currently 4096. Any attempt to reduce the
41 buffer size below DEFAULT_BUFFER_SIZE is ignored. Any buffered data is cleared
45 bytes of B<buf>. If B<num> is larger than the current buffer size the buffer
60 BIO_gets() or exact size BIO_read_ex() functionality if the following
64 doing so will force a full read of the size of the internal buffer of
/openssl/crypto/
H A Dparam_build.c28 size_t size; member
61 pd->size = size; in param_push()
77 OSSL_PARAM_BLD_DEF *pd = param_push(bld, key, size, size, type, 0); in param_push_num()
83 if (size > sizeof(pd->num)) { in param_push_num()
87 memcpy(&pd->num, num, size); in param_push_num()
320 param[i].data_size = pd->size; in param_bld_convert()
346 memset(p, 0, pd->size); in param_bld_convert()
348 ((char *)p)[pd->size] = '\0'; in param_bld_convert()
351 if (pd->size > sizeof(pd->num)) in param_bld_convert()
352 memset(p, 0, pd->size); in param_bld_convert()
[all …]
H A Dbsearch.c14 int size, int (*cmp) (const void *, const void *), in ossl_bsearch() argument
27 p = &(base_[i * size]); in ossl_bsearch()
39 while (i > 0 && (*cmp) (key, &(base_[(i - 1) * size])) == 0) in ossl_bsearch()
41 p = &(base_[i * size]); in ossl_bsearch()
/openssl/crypto/asn1/
H A Dx_int64.c58 if ((it->size & INTxx_FLAG_ZERO_DEFAULT) == INTxx_FLAG_ZERO_DEFAULT in uint64_i2c()
61 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint64_i2c()
94 if ((it->size & INTxx_FLAG_SIGNED) == 0 && neg) { in uint64_c2i()
98 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint64_c2i()
115 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED) in uint64_print()
151 if ((it->size & INTxx_FLAG_ZERO_DEFAULT) == INTxx_FLAG_ZERO_DEFAULT in uint32_i2c()
154 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint32_i2c()
195 if ((it->size & INTxx_FLAG_SIGNED) == 0 && neg) { in uint32_c2i()
206 if (((it->size & INTxx_FLAG_SIGNED) != 0 && utmp > INT32_MAX) in uint32_c2i()
207 || ((it->size & INTxx_FLAG_SIGNED) == 0 && utmp > UINT32_MAX)) { in uint32_c2i()
[all …]
H A Dx_long.c51 memcpy(pval, &it->size, COPY_SIZE(*pval, it->size)); in ASN1_ITEM_start()
57 memcpy(pval, &it->size, COPY_SIZE(*pval, it->size)); in long_free()
93 if (ltmp == it->size) in long_i2c()
181 if (ltmp == it->size) { in long_c2i()
/openssl/crypto/hmac/
H A Dhmac_s390x.c115 if (ctx->plat.s390x.size != in s390x_HMAC_init()
117 OPENSSL_clear_free(ctx->plat.s390x.buf, ctx->plat.s390x.size); in s390x_HMAC_init()
118 ctx->plat.s390x.size = 0; in s390x_HMAC_init()
123 ctx->plat.s390x.size = ctx->plat.s390x.blk_size * in s390x_HMAC_init()
196 if (ctx->plat.s390x.num == ctx->plat.s390x.size) { in s390x_HMAC_update()
202 remain = ctx->plat.s390x.size - ctx->plat.s390x.num; in s390x_HMAC_update()
221 if (len > ctx->plat.s390x.size) { in s390x_HMAC_update()
237 if (!ossl_assert(len <= ctx->plat.s390x.size)) in s390x_HMAC_update()
305 dctx->plat.s390x.size = sctx->plat.s390x.size; in s390x_HMAC_CTX_copy()
313 OPENSSL_clear_free(ctx->plat.s390x.buf, ctx->plat.s390x.size); in s390x_HMAC_CTX_cleanup()
[all …]
/openssl/test/ssl-tests/
H A D13-fragmentation.cnf.in19 # Default fragment size is 512.
53 name => "small-app-data-large-fragment-size",
69 # Exceeds the 64kB write buffer size.
87 name => "large-app-data-large-fragment-size",
96 name => "large-app-data-odd-fragment-size",
104 # When the buffer / fragment size ratio is sufficiently large,
161 # Here fragment size == app data size < buffer size,
189 # Default Application data size is 256.
/openssl/ssl/quic/
H A Dquic_rstream.c76 static int read_internal(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, in read_internal() argument
89 if (l > size) { in read_internal()
90 l = size; in read_internal()
105 size -= max_len; in read_internal()
117 size -= l; in read_internal()
120 if (size == 0) in read_internal()
152 int ossl_quic_rstream_read(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, in ossl_quic_rstream_read() argument
157 if (!read_internal(qrs, buf, size, readbytes, fin, 1)) in ossl_quic_rstream_read()
167 int ossl_quic_rstream_peek(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, in ossl_quic_rstream_peek() argument
170 return read_internal(qrs, buf, size, readbytes, fin, 0); in ossl_quic_rstream_peek()
/openssl/crypto/comp/
H A Dc_zstd.c50 return OPENSSL_zalloc(size); in zstd_alloc()
196 inbuf.size = ilen; in zstd_stateful_compress_block()
199 outbuf.size = olen; in zstd_stateful_compress_block()
225 } while (inbuf.pos < inbuf.size); in zstd_stateful_compress_block()
228 if (inbuf.pos < inbuf.size) in zstd_stateful_compress_block()
255 inbuf.size = ilen; in zstd_stateful_expand_block()
258 outbuf.size = olen; in zstd_stateful_expand_block()
275 if (inbuf.pos < inbuf.size) in zstd_stateful_expand_block()
597 ctx->decompress.inbuf.size = 0; in bio_zstd_read()
603 outBuf.size = (size_t)outl; in bio_zstd_read()
[all …]
/openssl/doc/man7/
H A DEVP_MAC-BLAKE2.pod30 All these parameters (except for "block-size") can be set with
32 Furthermore, the "size" parameter can be retrieved with
34 The length of the "size" parameter should not exceed that of a B<size_t>.
35 Likewise, the "block-size" parameter can be retrieved with
59 =item "size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer>
61 Sets the MAC size.
66 =item "block-size" (B<OSSL_MAC_PARAM_BLOCK_SIZE>) <unsigned integer>
68 Gets the MAC block size.
/openssl/fuzz/
H A Dquic-client.c121 size_t size; in FuzzerTestOneInput() local
247 size = buf[0] + (buf[1] << 8); in FuzzerTestOneInput()
248 if (size > len - 2) in FuzzerTestOneInput()
251 if (size > 0) in FuzzerTestOneInput()
252 BIO_write(in, buf+2, size); in FuzzerTestOneInput()
253 len -= size + 2; in FuzzerTestOneInput()
254 buf += size + 2; in FuzzerTestOneInput()
/openssl/test/recipes/30-test_evp_data/
H A Devpmac_siphash.txt132 Ctrl = size:8
146 Ctrl = size:16
154 Ctrl = size:0
159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
162 Ctrl = size:13
166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
177 Ctrl = size:0
188 Ctrl = size:8

Completed in 73 milliseconds

12345678910>>...16