/openssl/crypto/bio/ |
H A D | bss_bio.c | 67 size_t size; member 84 b->size = 17 * 1024; in bio_new() 111 size_t size = size_; in bio_read() local 137 if (size <= peer_b->size) in bio_read() 149 if (peer_b->len < size) in bio_read() 150 size = peer_b->len; in bio_read() 154 rest = size; in bio_read() 186 return size; in bio_read() 293 if (b->len == b->size) { in bio_write() 374 num = b->size - b->len; in bio_nwrite0() [all …]
|
H A D | bf_readbuff.c | 25 static int readbuffer_read(BIO *h, char *buf, int size); 27 static int readbuffer_gets(BIO *h, char *str, int size); 218 static int readbuffer_gets(BIO *b, char *buf, int size) in readbuffer_gets() argument 225 if (size == 0) in readbuffer_gets() 227 --size; /* the passed in size includes the terminator - so remove it here */ in readbuffer_gets() 236 (num_chars < ctx->ibuf_len) && (num_chars < size); in readbuffer_gets() 246 size -= num_chars; in readbuffer_gets() 249 if (found_newline || size == 0) { in readbuffer_gets() 260 if (!readbuffer_resize(ctx, 1 + size)) in readbuffer_gets() 272 for (i = 0; i < size; ++i) { in readbuffer_gets()
|
H A D | bf_prefix.c | 17 static int prefix_read(BIO *b, char *buf, size_t size, size_t *numread); 19 static int prefix_gets(BIO *b, char *str, int size); 76 static int prefix_read(BIO *b, char *in, size_t size, size_t *numread) in prefix_read() argument 78 return BIO_read_ex(BIO_next(b), in, size, numread); in prefix_read() 199 static int prefix_gets(BIO *b, char *buf, int size) in prefix_gets() argument 201 return BIO_gets(BIO_next(b), buf, size); in prefix_gets()
|
/openssl/include/openssl/ |
H A D | buffer.h | 35 # define BUF_strndup(s, size) OPENSSL_strndup(s, size) argument 36 # define BUF_memdup(data, size) OPENSSL_memdup(data, size) argument 37 # define BUF_strlcpy(dst, src, size) OPENSSL_strlcpy(dst, src, size) argument 38 # define BUF_strlcat(dst, src, size) OPENSSL_strlcat(dst, src, size) argument
|
/openssl/test/ |
H A D | params_conversion_test.c | 32 size_t size; member 140 pc->size = sizeof(ref_i32); in param_conversion_load_stanza() 149 pc->size = sizeof(ref_i64); in param_conversion_load_stanza() 158 pc->size = sizeof(ref_u32); in param_conversion_load_stanza() 167 pc->size = sizeof(ref_u64); in param_conversion_load_stanza() 176 pc->size = sizeof(ref_d); in param_conversion_load_stanza() 206 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 227 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 248 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() 269 || !TEST_mem_eq(pc->datum, pc->size, pc->ref, pc->size)) { in param_conversion_test() [all …]
|
H A D | modes_internal_test.c | 28 size_t size; member 188 size_t len = aes_cts128_vectors[num].size; in execute_cts128() 195 size_t tail, size; in execute_cts128() local 215 if (!TEST_true(len == size || len + 16 == size) in execute_cts128() 857 if (A.size == 1) in test_gcm128() 859 if (P.size == 1) in test_gcm128() 861 if (C.size == 1) in test_gcm128() 868 memset(out, 0, P.size); in test_gcm128() 876 && !TEST_mem_eq(out, P.size, C.data, P.size))) in test_gcm128() 880 memset(out, 0, P.size); in test_gcm128() [all …]
|
H A D | secmemtest.c | 139 const int size = 64; in test_sec_mem_clear() local 144 || !TEST_ptr(p = OPENSSL_secure_malloc(size))) in test_sec_mem_clear() 147 for (i = 0; i < size; i++) in test_sec_mem_clear() 151 for (i = 0; i < size; i++) in test_sec_mem_clear() 163 for (i = sizeof(void *) * 2; i < size; i++) in test_sec_mem_clear()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_max_cert_list.pod | 11 long SSL_CTX_set_max_cert_list(SSL_CTX *ctx, long size); 14 long SSL_set_max_cert_list(SSL *ssl, long size); 19 SSL_CTX_set_max_cert_list() sets the maximum size allowed for the peer's 20 certificate chain for all SSL objects created from B<ctx> to be <size> bytes. 24 SSL_CTX_get_max_cert_list() returns the currently set maximum size for B<ctx>. 26 SSL_set_max_cert_list() sets the maximum size allowed for the peer's 27 certificate chain for B<ssl> to be <size> bytes. This setting stays valid 30 SSL_get_max_cert_list() returns the currently set maximum size for B<ssl>. 41 The default value for the maximum certificate chain size is 100kB (30kB 45 without special extensions have a typical size of 1-2kB). [all …]
|
H A D | SSL_CTX_sess_set_cache_size.pod | 5 SSL_CTX_sess_set_cache_size, SSL_CTX_sess_get_cache_size - manipulate session cache size 16 SSL_CTX_sess_set_cache_size() sets the size of the internal session cache 20 SSL_CTX_sess_get_cache_size() returns the currently valid session cache size. 24 The internal session cache size is SSL_SESSION_CACHE_MAX_SIZE_DEFAULT, 25 currently 1024*20, so that up to 20000 sessions can be held. This size 27 case is the size 0, which is used for unlimited size. 29 If adding the session makes the cache exceed its size, then unused 35 If the size of the session cache is reduced and more sessions are already 42 SSL_CTX_sess_set_cache_size() returns the previously valid size. 44 SSL_CTX_sess_get_cache_size() returns the currently valid size.
|
H A D | EVP_PKEY_get_size.pod | 23 EVP_PKEY_get_size() returns the maximum suitable size for the output 26 L<EVP_SealInit(3)>, but it isn't limited there. The returned size is 31 that's being performed says otherwise, the size returned by 34 to take note of the size given back by the function that performs the 48 return a positive number, or 0 if this size isn't available. 54 buffer and still pass a pointer to an integer and get the exact size 57 exact buffer size, then allocate the buffer in between, and call that 60 buffer size, but may be useful in cases where it's desirable to know 64 used to get the output size for EVP_DigestSignFinal(), according to
|
H A D | BIO_f_buffer.pod | 20 long BIO_set_read_buffer_size(BIO *b, long size); 21 long BIO_set_write_buffer_size(BIO *b, long size); 22 long BIO_set_buffer_size(BIO *b, long size); 39 set the read, write or both read and write buffer sizes to B<size>. The initial 40 buffer size is DEFAULT_BUFFER_SIZE, currently 4096. Any attempt to reduce the 41 buffer size below DEFAULT_BUFFER_SIZE is ignored. Any buffered data is cleared 45 bytes of B<buf>. If B<num> is larger than the current buffer size the buffer 60 BIO_gets() or exact size BIO_read_ex() functionality if the following 64 doing so will force a full read of the size of the internal buffer of
|
H A D | BUF_MEM_new.pod | 22 void BUF_reverse(unsigned char *out, const unsigned char *in, size_t size); 29 BUF_MEM_new() allocates a new buffer of zero size. 38 BUF_MEM_grow() changes the size of an already existing buffer to 40 size. 45 BUF_reverse() reverses B<size> bytes at B<in> into B<out>. If B<in> 55 zero on error or the new size (i.e., B<len>).
|
/openssl/crypto/ |
H A D | param_build.c | 28 size_t size; member 63 pd->size = size; in param_push() 79 OSSL_PARAM_BLD_DEF *pd = param_push(bld, key, size, size, type, 0); in param_push_num() 85 if (size > sizeof(pd->num)) { in param_push_num() 89 memcpy(&pd->num, num, size); in param_push_num() 334 param[i].data_size = pd->size; in param_bld_convert() 360 memset(p, 0, pd->size); in param_bld_convert() 362 ((char *)p)[pd->size] = '\0'; in param_bld_convert() 365 if (pd->size > sizeof(pd->num)) in param_bld_convert() 366 memset(p, 0, pd->size); in param_bld_convert() [all …]
|
H A D | bsearch.c | 14 int size, int (*cmp) (const void *, const void *), in ossl_bsearch() argument 27 p = &(base_[i * size]); in ossl_bsearch() 39 while (i > 0 && (*cmp) (key, &(base_[(i - 1) * size])) == 0) in ossl_bsearch() 41 p = &(base_[i * size]); in ossl_bsearch()
|
H A D | punycode.c | 258 size_t size = 0; in ossl_a2ulabel() local 270 size += delta + 1; in ossl_a2ulabel() 272 if (size >= *outlen - 1) in ossl_a2ulabel() 292 size += utfsize; in ossl_a2ulabel() 293 if (size >= *outlen - 1) in ossl_a2ulabel() 305 size++; in ossl_a2ulabel() 306 if (size >= *outlen - 1) in ossl_a2ulabel()
|
H A D | o_str.c | 75 size_t OPENSSL_strlcpy(char *dst, const char *src, size_t size) in OPENSSL_strlcpy() argument 78 for (; size > 1 && *src; size--) { in OPENSSL_strlcpy() 82 if (size) in OPENSSL_strlcpy() 87 size_t OPENSSL_strlcat(char *dst, const char *src, size_t size) in OPENSSL_strlcat() argument 90 for (; size > 0 && *dst; size--, dst++) in OPENSSL_strlcat() 92 return l + OPENSSL_strlcpy(dst, src, size); in OPENSSL_strlcat()
|
/openssl/crypto/asn1/ |
H A D | x_int64.c | 60 if ((it->size & INTxx_FLAG_ZERO_DEFAULT) == INTxx_FLAG_ZERO_DEFAULT in uint64_i2c() 63 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint64_i2c() 96 if ((it->size & INTxx_FLAG_SIGNED) == 0 && neg) { in uint64_c2i() 100 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint64_c2i() 117 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED) in uint64_print() 155 if ((it->size & INTxx_FLAG_ZERO_DEFAULT) == INTxx_FLAG_ZERO_DEFAULT in uint32_i2c() 158 if ((it->size & INTxx_FLAG_SIGNED) == INTxx_FLAG_SIGNED in uint32_i2c() 199 if ((it->size & INTxx_FLAG_SIGNED) == 0 && neg) { in uint32_c2i() 210 if (((it->size & INTxx_FLAG_SIGNED) != 0 && utmp > INT32_MAX) in uint32_c2i() 211 || ((it->size & INTxx_FLAG_SIGNED) == 0 && utmp > UINT32_MAX)) { in uint32_c2i() [all …]
|
H A D | x_long.c | 51 memcpy(pval, &it->size, COPY_SIZE(*pval, it->size)); in ASN1_ITEM_start() 57 memcpy(pval, &it->size, COPY_SIZE(*pval, it->size)); in long_free() 93 if (ltmp == it->size) in long_i2c() 181 if (ltmp == it->size) { in long_c2i()
|
H A D | f_int.c | 54 int a2i_ASN1_INTEGER(BIO *bp, ASN1_INTEGER *bs, char *buf, int size) in a2i_ASN1_INTEGER() argument 63 bufsize = BIO_gets(bp, buf, size); in a2i_ASN1_INTEGER() 131 bufsize = BIO_gets(bp, buf, size); in a2i_ASN1_INTEGER() 149 int a2i_ASN1_ENUMERATED(BIO *bp, ASN1_ENUMERATED *bs, char *buf, int size) in a2i_ASN1_ENUMERATED() argument 151 int rv = a2i_ASN1_INTEGER(bp, bs, buf, size); in a2i_ASN1_ENUMERATED()
|
/openssl/crypto/bn/ |
H A D | bn_ctx.c | 35 unsigned used, size; member 51 unsigned int depth, size; member 165 ctx->stack.size, ctx->pool.size); in BN_CTX_free() 253 st->depth = st->size = 0; in BN_STACK_init() 265 if (st->depth == st->size) { in BN_STACK_push() 268 st->size ? (st->size * 3 / 2) : BN_CTX_START_FRAMES; in BN_STACK_push() 279 st->size = newsize; in BN_STACK_push() 297 p->used = p->size = 0; in BN_POOL_init() 322 if (p->used == p->size) { in BN_POOL_get() 344 p->size += BN_CTX_POOL_SIZE; in BN_POOL_get()
|
/openssl/test/ssl-tests/ |
H A D | 13-fragmentation.cnf.in | 19 # Default fragment size is 512. 53 name => "small-app-data-large-fragment-size", 69 # Exceeds the 64kB write buffer size. 87 name => "large-app-data-large-fragment-size", 96 name => "large-app-data-odd-fragment-size", 104 # When the buffer / fragment size ratio is sufficiently large, 161 # Here fragment size == app data size < buffer size, 189 # Default Application data size is 256.
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_siphash.txt | 132 Ctrl = size:8 146 Ctrl = size:16 154 Ctrl = size:0 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 162 Ctrl = size:13 166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 177 Ctrl = size:0 188 Ctrl = size:8
|
/openssl/doc/man7/ |
H A D | EVP_MAC-HMAC.pod | 60 =item "tls-data-size" (B<OSSL_MAC_PARAM_TLS_DATA_SIZE>) <unsigned integer> 70 =item "size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer> 72 The "size" parameter can also be retrieved with EVP_MAC_CTX_get_mac_size(). 73 The length of the "size" parameter is equal to that of an B<unsigned int>. 79 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer> 81 Gets the MAC block size. The "block-size" parameter can also be retrieved with
|
H A D | EVP_MAC-BLAKE2.pod | 31 Furthermore, the "size" parameter can be retrieved with 33 The length of the "size" parameter should not exceed that of a B<size_t>. 34 Likewise, the "block-size" parameter can be retrieved with 58 =item "size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer> 60 Sets the MAC size. 65 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer> 67 Gets the MAC block size.
|
H A D | EVP_MAC-CMAC.pod | 56 =item "size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer> 58 The "size" parameter can also be retrieved with with EVP_MAC_CTX_get_mac_size(). 59 The length of the "size" parameter is equal to that of an B<unsigned int>. 65 =item "block-size" (B<OSSL_MAC_PARAM_SIZE>) <unsigned integer> 67 Gets the MAC block size. The "block-size" parameter can also be retrieved with
|