/openssl/crypto/bn/ |
H A D | bn_s390x.c | 28 size_t size; in s390x_mod_exp_hw() local 33 size = BN_num_bytes(m); in s390x_mod_exp_hw() 38 me.inputdatalength = size; in s390x_mod_exp_hw() 40 me.outputdatalength = size; in s390x_mod_exp_hw() 84 size_t size, plen, qlen; in s390x_crt() local 104 part += 2 * size; in s390x_crt() 107 part += 2 * size; in s390x_crt() 109 part += size + 8; in s390x_crt() 111 part += size; in s390x_crt() 113 part += size + 8; in s390x_crt() [all …]
|
H A D | bn_ctx.c | 35 unsigned used, size; member 51 unsigned int depth, size; member 163 ctx->stack.size, ctx->pool.size); in BN_CTX_free() 251 st->depth = st->size = 0; in BN_STACK_init() 263 if (st->depth == st->size) { in BN_STACK_push() 266 st->size ? (st->size * 3 / 2) : BN_CTX_START_FRAMES; in BN_STACK_push() 275 st->size = newsize; in BN_STACK_push() 293 p->used = p->size = 0; in BN_POOL_init() 318 if (p->used == p->size) { in BN_POOL_get() 338 p->size += BN_CTX_POOL_SIZE; in BN_POOL_get()
|
/openssl/crypto/bio/ |
H A D | bss_bio.c | 67 size_t size; member 84 b->size = 17 * 1024; in bio_new() 111 size_t size = size_; in bio_read() local 137 if (size <= peer_b->size) in bio_read() 149 if (peer_b->len < size) in bio_read() 150 size = peer_b->len; in bio_read() 154 rest = size; in bio_read() 186 return size; in bio_read() 293 if (b->len == b->size) { in bio_write() 374 num = b->size - b->len; in bio_nwrite0() [all …]
|
H A D | bf_readbuff.c | 25 static int readbuffer_read(BIO *h, char *buf, int size); 27 static int readbuffer_gets(BIO *h, char *str, int size); 218 static int readbuffer_gets(BIO *b, char *buf, int size) in readbuffer_gets() argument 225 if (buf == NULL || size == 0) in readbuffer_gets() 227 --size; /* the passed in size includes the terminator - so remove it here */ in readbuffer_gets() 239 (num_chars < ctx->ibuf_len) && (num_chars < size); in readbuffer_gets() 249 size -= num_chars; in readbuffer_gets() 252 if (found_newline || size == 0) { in readbuffer_gets() 263 if (!readbuffer_resize(ctx, 1 + size)) in readbuffer_gets() 275 for (i = 0; i < size; ++i) { in readbuffer_gets()
|
/openssl/test/ |
H A D | bio_comp_test.c | 37 static int do_bio_comp_test(const BIO_METHOD *meth, size_t size) in do_bio_comp_test() argument 54 osize = BIO_write(bcomp, original, size); in do_bio_comp_test() 55 if (!TEST_int_eq(osize, size) in do_bio_comp_test() 65 rsize = BIO_read(bexp, result, size); in do_bio_comp_test() 67 if (!TEST_int_eq(size, rsize) in do_bio_comp_test() 83 int size = sizes[n % 4]; in do_bio_comp() local 92 TEST_info("zeros of size %d\n", size); in do_bio_comp() 96 TEST_info("ones of size %d\n", size); in do_bio_comp() 100 TEST_info("sequential of size %d\n", size); in do_bio_comp() 105 TEST_info("random of size %d\n", size); in do_bio_comp() [all …]
|
H A D | params_conversion_test.c | 32 size_t size; member 140 pc->size = sizeof(ref_i32); in param_conversion_load_stanza() 149 pc->size = sizeof(ref_i64); in param_conversion_load_stanza() 158 pc->size = sizeof(ref_u32); in param_conversion_load_stanza() 167 pc->size = sizeof(ref_u64); in param_conversion_load_stanza() 176 pc->size = sizeof(ref_d); in param_conversion_load_stanza() 206 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 227 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 248 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 269 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() [all …]
|
H A D | modes_internal_test.c | 28 size_t size; member 189 size_t len = aes_cts128_vectors[num].size; in execute_cts128() 196 size_t tail, size; in execute_cts128() local 216 if (!TEST_true(len == size || len + 16 == size) in execute_cts128() 858 if (A.size == 1) in test_gcm128() 860 if (P.size == 1) in test_gcm128() 862 if (C.size == 1) in test_gcm128() 869 memset(out, 0, P.size); in test_gcm128() 877 && !TEST_mem_eq(out, P.size, C.data, P.size))) in test_gcm128() 881 memset(out, 0, P.size); in test_gcm128() [all …]
|
H A D | bio_pw_callback_test.c | 72 static int callback_copy_password(char *buf, int size) in callback_copy_password() argument 99 memset(buf, 'e', size); in callback_copy_password() 100 ret = size; in callback_copy_password() 103 memset(buf, 'e', size); in callback_copy_password() 110 static int read_callback(char *buf, int size, int rwflag, void *u) in read_callback() argument 122 if (!TEST_int_gt(size, 0)) in read_callback() 126 ret = callback_copy_password(buf, size); in read_callback() 132 static int write_callback(char *buf, int size, int rwflag, void *u) in write_callback() argument 144 if (!TEST_int_gt(size, 0)) in write_callback() 148 ret = callback_copy_password(buf, size); in write_callback() [all …]
|
H A D | quic_stream_test.c | 355 if (rec_len > size) { in test_single_copy_read() 356 rec_len = size; in test_single_copy_read() 360 size -= rec_len; in test_single_copy_read() 366 if (*fin || size == 0) in test_single_copy_read() 507 queued_min = off + size; in test_rstream_random() 513 if (queued_max < off + size) in test_rstream_random() 514 queued_max = off + size; in test_rstream_random() 524 if (off + size > data_size) in test_rstream_random() 525 off = data_size - size; in test_rstream_random() 527 queued_min = off + size; in test_rstream_random() [all …]
|
H A D | secmemtest.c | 139 const int size = 64; in test_sec_mem_clear() local 144 || !TEST_ptr(p = OPENSSL_secure_malloc(size))) in test_sec_mem_clear() 147 for (i = 0; i < size; i++) in test_sec_mem_clear() 151 for (i = 0; i < size; i++) in test_sec_mem_clear() 163 for (i = sizeof(void *) * 2; i < size; i++) in test_sec_mem_clear()
|
/openssl/include/openssl/ |
H A D | buffer.h | 35 # define BUF_strndup(s, size) OPENSSL_strndup(s, size) argument 36 # define BUF_memdup(data, size) OPENSSL_memdup(data, size) argument 37 # define BUF_strlcpy(dst, src, size) OPENSSL_strlcpy(dst, src, size) argument 38 # define BUF_strlcat(dst, src, size) OPENSSL_strlcat(dst, src, size) argument
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_max_cert_list.pod | 11 long SSL_CTX_set_max_cert_list(SSL_CTX *ctx, long size); 14 long SSL_set_max_cert_list(SSL *ssl, long size); 19 SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's 20 certificate chain for all SSL objects created from B<ctx> to be <size> bytes. 24 SSL_CTX_get_max_cert_list() returns the currently set maximum size for B<ctx>. 26 SSL_set_max_cert_list() sets the maximum size allowed for the peer's 27 certificate chain for B<ssl> to be <size> bytes. This setting stays valid 30 SSL_get_max_cert_list() returns the currently set maximum size for B<ssl>. 41 The default value for the maximum certificate chain size is 100kB (30kB 45 without special extensions have a typical size of 1-2kB). [all …]
|
H A D | SSL_CTX_sess_set_cache_size.pod | 5 SSL_CTX_sess_set_cache_size, SSL_CTX_sess_get_cache_size - manipulate session cache size 16 SSL_CTX_sess_set_cache_size() sets the size of the internal session cache 20 SSL_CTX_sess_get_cache_size() returns the currently valid session cache size. 24 The internal session cache size is SSL_SESSION_CACHE_MAX_SIZE_DEFAULT, 25 currently 1024*20, so that up to 20000 sessions can be held. This size 27 case is the size 0, which is used for unlimited size. 29 If adding the session makes the cache exceed its size, then unused 35 If the size of the session cache is reduced and more sessions are already 42 SSL_CTX_sess_set_cache_size() returns the previously valid size. 44 SSL_CTX_sess_get_cache_size() returns the currently valid size.
|
H A D | BIO_f_buffer.pod | 20 long BIO_set_read_buffer_size(BIO *b, long size); 21 long BIO_set_write_buffer_size(BIO *b, long size); 22 long BIO_set_buffer_size(BIO *b, long size); 39 set the read, write or both read and write buffer sizes to B<size>. The initial 40 buffer size is DEFAULT_BUFFER_SIZE, currently 4096. Any attempt to reduce the 41 buffer size below DEFAULT_BUFFER_SIZE is ignored. Any buffered data is cleared 45 bytes of B<buf>. If B<num> is larger than the current buffer size the buffer 60 BIO_gets() or exact size BIO_read_ex() functionality if the following 64 doing so will force a full read of the size of the internal buffer of
|
/openssl/crypto/ |
H A D | param_build.c | 28 size_t size; member 61 pd->size = size; in param_push() 77 OSSL_PARAM_BLD_DEF *pd = param_push(bld, key, size, size, type, 0); in param_push_num() 83 if (size > sizeof(pd->num)) { in param_push_num() 87 memcpy(&pd->num, num, size); in param_push_num() 320 param[i].data_size = pd->size; in param_bld_convert() 346 memset(p, 0, pd->size); in param_bld_convert() 348 ((char *)p)[pd->size] = '\0'; in param_bld_convert() 351 if (pd->size > sizeof(pd->num)) in param_bld_convert() 352 memset(p, 0, pd->size); in param_bld_convert() [all …]
|
H A D | bsearch.c | 14 int size, int (*cmp) (const void *, const void *), in ossl_bsearch() argument 27 p = &(base_[i * size]); in ossl_bsearch() 39 while (i > 0 && (*cmp) (key, &(base_[(i - 1) * size])) == 0) in ossl_bsearch() 41 p = &(base_[i * size]); in ossl_bsearch()
|
/openssl/crypto/asn1/ |
H A D | x_int64.c | 58 if ((it->size & INTxx_FLAG_ZERO_DEFAULT) == INTxx_FLAG_ZERO_DEFAULT in uint64_i2c() 61 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint64_i2c() 94 if ((it->size & INTxx_FLAG_SIGNED) == 0 && neg) { in uint64_c2i() 98 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint64_c2i() 115 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED) in uint64_print() 151 if ((it->size & INTxx_FLAG_ZERO_DEFAULT) == INTxx_FLAG_ZERO_DEFAULT in uint32_i2c() 154 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint32_i2c() 195 if ((it->size & INTxx_FLAG_SIGNED) == 0 && neg) { in uint32_c2i() 206 if (((it->size & INTxx_FLAG_SIGNED) != 0 && utmp > INT32_MAX) in uint32_c2i() 207 || ((it->size & INTxx_FLAG_SIGNED) == 0 && utmp > UINT32_MAX)) { in uint32_c2i() [all …]
|
H A D | x_long.c | 51 memcpy(pval, &it->size, COPY_SIZE(*pval, it->size)); in ASN1_ITEM_start() 57 memcpy(pval, &it->size, COPY_SIZE(*pval, it->size)); in long_free() 93 if (ltmp == it->size) in long_i2c() 181 if (ltmp == it->size) { in long_c2i()
|
/openssl/crypto/hmac/ |
H A D | hmac_s390x.c | 115 if (ctx->plat.s390x.size != in s390x_HMAC_init() 117 OPENSSL_clear_free(ctx->plat.s390x.buf, ctx->plat.s390x.size); in s390x_HMAC_init() 118 ctx->plat.s390x.size = 0; in s390x_HMAC_init() 123 ctx->plat.s390x.size = ctx->plat.s390x.blk_size * in s390x_HMAC_init() 196 if (ctx->plat.s390x.num == ctx->plat.s390x.size) { in s390x_HMAC_update() 202 remain = ctx->plat.s390x.size - ctx->plat.s390x.num; in s390x_HMAC_update() 221 if (len > ctx->plat.s390x.size) { in s390x_HMAC_update() 237 if (!ossl_assert(len <= ctx->plat.s390x.size)) in s390x_HMAC_update() 305 dctx->plat.s390x.size = sctx->plat.s390x.size; in s390x_HMAC_CTX_copy() 313 OPENSSL_clear_free(ctx->plat.s390x.buf, ctx->plat.s390x.size); in s390x_HMAC_CTX_cleanup() [all …]
|
/openssl/test/ssl-tests/ |
H A D | 13-fragmentation.cnf.in | 19 # Default fragment size is 512. 53 name => "small-app-data-large-fragment-size", 69 # Exceeds the 64kB write buffer size. 87 name => "large-app-data-large-fragment-size", 96 name => "large-app-data-odd-fragment-size", 104 # When the buffer / fragment size ratio is sufficiently large, 161 # Here fragment size == app data size < buffer size, 189 # Default Application data size is 256.
|
/openssl/ssl/quic/ |
H A D | quic_rstream.c | 76 static int read_internal(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, in read_internal() argument 89 if (l > size) { in read_internal() 90 l = size; in read_internal() 105 size -= max_len; in read_internal() 117 size -= l; in read_internal() 120 if (size == 0) in read_internal() 152 int ossl_quic_rstream_read(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, in ossl_quic_rstream_read() argument 157 if (!read_internal(qrs, buf, size, readbytes, fin, 1)) in ossl_quic_rstream_read() 167 int ossl_quic_rstream_peek(QUIC_RSTREAM *qrs, unsigned char *buf, size_t size, in ossl_quic_rstream_peek() argument 170 return read_internal(qrs, buf, size, readbytes, fin, 0); in ossl_quic_rstream_peek()
|
/openssl/crypto/comp/ |
H A D | c_zstd.c | 50 return OPENSSL_zalloc(size); in zstd_alloc() 196 inbuf.size = ilen; in zstd_stateful_compress_block() 199 outbuf.size = olen; in zstd_stateful_compress_block() 225 } while (inbuf.pos < inbuf.size); in zstd_stateful_compress_block() 228 if (inbuf.pos < inbuf.size) in zstd_stateful_compress_block() 255 inbuf.size = ilen; in zstd_stateful_expand_block() 258 outbuf.size = olen; in zstd_stateful_expand_block() 275 if (inbuf.pos < inbuf.size) in zstd_stateful_expand_block() 597 ctx->decompress.inbuf.size = 0; in bio_zstd_read() 603 outBuf.size = (size_t)outl; in bio_zstd_read() [all …]
|
/openssl/doc/man7/ |
H A D | EVP_MAC-BLAKE2.pod | 30 All these parameters (except for "block-size") can be set with 32 Furthermore, the "size" parameter can be retrieved with 34 The length of the "size" parameter should not exceed that of a B<size_t>. 35 Likewise, the "block-size" parameter can be retrieved with 59 =item "size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer> 61 Sets the MAC size. 66 =item "block-size" (B<OSSL_MAC_PARAM_BLOCK_SIZE>) <unsigned integer> 68 Gets the MAC block size.
|
/openssl/fuzz/ |
H A D | quic-client.c | 121 size_t size; in FuzzerTestOneInput() local 247 size = buf[0] + (buf[1] << 8); in FuzzerTestOneInput() 248 if (size > len - 2) in FuzzerTestOneInput() 251 if (size > 0) in FuzzerTestOneInput() 252 BIO_write(in, buf+2, size); in FuzzerTestOneInput() 253 len -= size + 2; in FuzzerTestOneInput() 254 buf += size + 2; in FuzzerTestOneInput()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_siphash.txt | 132 Ctrl = size:8 146 Ctrl = size:16 154 Ctrl = size:0 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 162 Ctrl = size:13 166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 177 Ctrl = size:0 188 Ctrl = size:8
|