/openssl/crypto/err/ |
H A D | err_blocks.c | 53 size_t buf_size = 0; in ERR_vset_error() local 67 buf_size = es->err_data_size[i]; in ERR_vset_error() 83 if (buf_size < ERR_MAX_DATA_SIZE in ERR_vset_error() 86 buf_size = ERR_MAX_DATA_SIZE; in ERR_vset_error() 90 printed_len = BIO_vsnprintf(buf, buf_size, fmt, args); in ERR_vset_error() 105 buf_size = printed_len + 1; in ERR_vset_error() 116 err_set_data(es, es->top, buf, buf_size, flags); in ERR_vset_error()
|
/openssl/apps/ |
H A D | passwd.c | 513 size_t buf_size = 0; in shacrypt() local 537 buf_size = 32; in shacrypt() 541 buf_size = 64; in shacrypt() 624 for (n = passwd_len; n > buf_size; n -= buf_size) { in shacrypt() 625 if (!EVP_DigestUpdate(md, buf, buf_size)) in shacrypt() 635 (n & 1) ? buf_size : passwd_len)) in shacrypt() 655 for (cp = p_bytes, n = passwd_len; n > buf_size; n -= buf_size, cp += buf_size) in shacrypt() 656 memcpy(cp, temp_buf, buf_size); in shacrypt() 672 for (cp = s_bytes, n = salt_len; n > buf_size; n -= buf_size, cp += buf_size) in shacrypt() 673 memcpy(cp, temp_buf, buf_size); in shacrypt() [all …]
|
H A D | s_time.c | 131 size_t buf_size; in s_time_main() local 203 buf_size = strlen(www_path) + fmt_http_get_cmd_size; in s_time_main() 204 if (buf_size > sizeof(buf)) { in s_time_main()
|
H A D | req.c | 67 int n_min, int n_max, char *buf, const int buf_size, 71 static int join(char buf[], size_t buf_size, const char *name, 1387 int n_min, int n_max, char *buf, const int buf_size, in build_data() argument 1396 if (!join(buf, buf_size, value, "\n", desc1)) in build_data() 1402 if (!fgets(buf, buf_size, stdin)) in build_data() 1415 if (!join(buf, buf_size, def, "\n", desc2)) in build_data() 1471 static int join(char buf[], size_t buf_size, const char *name, in join() argument 1476 if (name_len + tail_len + 1 > buf_size) { in join()
|
/openssl/crypto/http/ |
H A D | http_client.c | 46 int buf_size; /* Buffer size */ member 106 rctx->buf_size = buf_size > 0 ? buf_size : OSSL_HTTP_DEFAULT_MAX_LINE_LEN; in OSSL_HTTP_REQ_CTX_new() 107 rctx->buf = OPENSSL_malloc(rctx->buf_size); in OSSL_HTTP_REQ_CTX_new() 571 n = BIO_gets(rctx->rbio, buf, rctx->buf_size); in OSSL_HTTP_REQ_CTX_nbio() 636 n = BIO_read(rctx->req, rctx->buf, rctx->buf_size); in OSSL_HTTP_REQ_CTX_nbio() 683 if (n >= rctx->buf_size) { in OSSL_HTTP_REQ_CTX_nbio() 689 n = BIO_gets(rctx->mem, buf, rctx->buf_size); in OSSL_HTTP_REQ_CTX_nbio() 707 if (n == rctx->buf_size) { in OSSL_HTTP_REQ_CTX_nbio() 1091 buf_size, overall_timeout); in OSSL_HTTP_open() 1244 buf_size, timeout); in OSSL_HTTP_get() [all …]
|
/openssl/include/openssl/ |
H A D | http.h | 45 OSSL_HTTP_REQ_CTX *OSSL_HTTP_REQ_CTX_new(BIO *wbio, BIO *rbio, int buf_size); 73 int buf_size, int overall_timeout); 86 int buf_size, const STACK_OF(CONF_VALUE) *headers, 95 int buf_size, const STACK_OF(CONF_VALUE) *headers,
|
H A D | ocsp.h.in | 174 const OCSP_REQUEST *req, int buf_size); 179 # define OCSP_REQ_CTX_new(io, buf_size) \ argument 180 OSSL_HTTP_REQ_CTX_new(io, io, buf_size)
|
/openssl/crypto/ocsp/ |
H A D | ocsp_http.c | 16 const OCSP_REQUEST *req, int buf_size) in OCSP_sendreq_new() argument 18 OSSL_HTTP_REQ_CTX *rctx = OSSL_HTTP_REQ_CTX_new(io, io, buf_size); in OCSP_sendreq_new()
|
/openssl/doc/man3/ |
H A D | OCSP_sendreq_new.pod | 21 const OCSP_REQUEST *req, int buf_size); 45 of I<buf_size>. If I<buf_size> is zero a default value of 4KiB is used.
|
H A D | OSSL_HTTP_transfer.pod | 25 int buf_size, int overall_timeout); 38 int buf_size, const STACK_OF(CONF_VALUE) *headers, 47 int buf_size, const STACK_OF(CONF_VALUE) *headers, 143 The I<buf_size> parameter specifies the response header maximum line length. 145 I<buf_size> is also used as the number of content bytes that are read at a time.
|
H A D | OSSL_HTTP_REQ_CTX.pod | 28 OSSL_HTTP_REQ_CTX *OSSL_HTTP_REQ_CTX_new(BIO *wbio, BIO *rbio, int buf_size); 69 I<wbio>), and the maximum expected response header line length I<buf_size>. 72 I<buf_size> is also used as the number of content bytes that are read at a time.
|