Lines Matching defs:buffer
127 /* Both schannel buffer sizes must be > 0 */
151 static void InitSecBuffer(SecBuffer *buffer, unsigned long BufType,
154 buffer->cbBuffer = BufByteSize;
155 buffer->BufferType = BufType;
156 buffer->pvBuffer = BufDataPtr;
223 /* longest is 26, buffer is slightly bigger */
1031 char buffer[STRERROR_LEN];
1033 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
1175 of bytes of data in the rest of the buffer. */
1179 /* The next four bytes are an indicator that this buffer will contain
1219 /* setup output buffer */
1255 char buffer[STRERROR_LEN];
1260 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
1264 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
1279 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
1287 /* send initial handshake data which is now stored in output buffer */
1343 /* buffer to store previously received and decrypted data */
1354 /* buffer to store previously received and encrypted data */
1366 /* if we need a bigger buffer to read a full message, increase buffer now */
1369 /* increase internal encrypted data buffer */
1407 /* increase encrypted data buffer offset */
1414 "schannel: encrypted data buffer: offset %zu length %zu",
1434 /* copy received handshake data into input buffer */
1444 /* free buffer for received handshake data */
1488 /* free obsolete buffer */
1495 char buffer[STRERROR_LEN];
1499 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
1503 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
1507 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
1522 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
1535 (not handshake data) in an extra buffer at this point.
1970 /* check if the buffer is longer than the maximum message length */
1975 /* calculate the complete message length and allocate a buffer for it */
1995 /* copy data into output buffer */
2015 If we wanted to buffer the unwritten encrypted bytes, we would
2101 /* we want the length of the encrypted buffer to be at least large enough
2114 * possible, even if an error occurs. The state of the decrypted buffer must
2115 * always be valid. Transfer of decrypted data to the caller's buffer is
2142 /* increase enc buffer in order to fit the requested amount of data */
2167 "schannel: encrypted data buffer: offset %zu length %zu",
2197 "schannel: encrypted data buffer: offset %zu length %zu",
2204 /* prepare data buffer for DecryptMessage call */
2229 /* increase buffer in order to fit the received amount of data */
2234 /* increase internal decrypted data buffer */
2251 /* copy decrypted data to internal buffer */
2275 buffer */
2287 /* reset encrypted buffer offset, because there is no data remaining */
2336 char buffer[STRERROR_LEN];
2338 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
2346 "schannel: encrypted data buffer: offset %zu length %zu",
2350 "schannel: decrypted data buffer: offset %zu length %zu",
2393 "schannel: decrypted data buffer: offset %zu length %zu",
2509 char buffer[STRERROR_LEN];
2511 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));
2514 /* setup output buffer */
2533 /* send close message which is in output buffer */
2560 /* free internal buffer for received encrypted data */
2568 /* free internal buffer for received decrypted data */
2593 static size_t schannel_version(char *buffer, size_t size)
2595 size = msnprintf(buffer, size, "Schannel");
2639 char buffer[STRERROR_LEN];
2641 Curl_sspi_strerror(sspi_status, buffer, sizeof(buffer)));