Lines Matching defs:buf
60 char buf[4096];
138 uint8_t buf[LWS_PRE + 2048], *start = &buf[LWS_PRE], *p = start,
139 *end = &buf[sizeof(buf) - 1];
213 char *buf, *start, *p, *end, *p1, *end1;
226 buf = malloc((unsigned int)n);
227 if (!buf) {
232 p = start = buf + LWS_PRE;
233 end = buf + n - LWS_PRE - 1;
264 jws.map_b64.buf[LJWS_JOSE] = p1;
274 jws.map_b64.buf[LJWS_PYLD] = p1;
295 jws.map_b64.buf[LJWS_SIG] = p1;
301 free(buf);
307 free(buf);
366 memcpy(s->dest + s->pos, ctx->buf, ctx->npos);
409 lws_strncpy(s->status, ctx->buf, sizeof(s->status));
419 ctx->buf);
423 ctx->buf);
426 lws_snprintf(s->cert_url, sizeof(s->cert_url), "%s", ctx->buf);
483 lws_snprintf(s->detail, sizeof(s->detail), "%s", ctx->buf);
486 lwsl_notice("JAAZ_CHALLENGES_TYPE: %s\n", ctx->buf);
487 s->use = !strcmp(ctx->buf, "http-01");
490 lws_strncpy(s->status, ctx->buf, sizeof(s->status));
493 lwsl_notice("JAAZ_CHALLENGES_URL: %s %d\n", ctx->buf, s->use);
495 lws_strncpy(s->challenge_uri, ctx->buf,
501 lwsl_notice("JAAZ_CHALLENGES_TOKEN: %s %d\n", ctx->buf, s->use);
503 lws_strncpy(s->chall_token, ctx->buf,
546 if (strcmp(ctx->buf, "http-01"))
550 lws_strncpy(s->status, ctx->buf, sizeof(s->status));
556 lws_strncpy(s->chall_token, ctx->buf, sizeof(s->chall_token));
560 lws_snprintf(s->detail, sizeof(s->detail), "%s", ctx->buf);
693 char buf[128];
727 lws_snprintf(buf, sizeof(buf) - 1, "%s",
731 lws_snprintf(buf, sizeof(buf) - 1, "%s",
751 &vhd->ac->cwsi, &vhd->ac->i, buf, "GET"))
771 char buf[LWS_PRE + 2536], *start = buf + LWS_PRE, *p = start,
772 *end = buf + sizeof(buf) - 1, digest[32], *failreason = NULL;
859 lws_snprintf(buf, sizeof(buf) - 1, "%s.upd",
861 vhd->fd_updated_cert = lws_open(buf,
870 lwsl_err("unable to create update cert file %s\n", buf);
873 lws_snprintf(buf, sizeof(buf) - 1, "%s.upd",
875 vhd->fd_updated_key = lws_open(buf, LWS_O_WRONLY | LWS_O_CREAT |
882 lwsl_vhost_err(vhd->vhost, "unable to create update key file %s", buf);
967 strcpy(buf, ac->urls[JAD_NEW_ACCOUNT_URL]);
969 &ac->cwsi, &ac->i, buf, "POST");
1063 &ac->buf[LWS_PRE],
1064 sizeof(ac->buf) - LWS_PRE,
1086 n = sprintf(buf, "%d", ac->len);
1089 (uint8_t *)buf, n, pp, pend)) {
1117 end = &buf[sizeof(buf) - 1];
1164 ac->buf[LWS_PRE + ac->len] = '\0';
1165 if (lws_write(wsi, (uint8_t *)ac->buf + LWS_PRE,
1201 if ((unsigned int)ac->cpos + len > sizeof(ac->buf))
1202 len = sizeof(ac->buf) - (unsigned int)ac->cpos;
1205 memcpy(&ac->buf[ac->cpos], in, len);
1249 strcpy(buf, ac->urls[JAD_NEW_NONCE_URL]);
1251 &ac->cwsi, &ac->i, buf,
1269 strcpy(buf, ac->urls[JAD_NEW_ORDER_URL]);
1272 &ac->i, buf, "POST");
1300 strcpy(buf, ac->authz_url);
1303 &ac->i, buf, "POST");
1312 lws_snprintf(buf, sizeof(buf),
1314 failreason = buf;
1406 strcpy(buf, ac->order_url);
1408 &ac->cwsi, &ac->i, buf,
1428 lws_snprintf(buf, sizeof(buf),
1431 failreason = buf;
1455 strcpy(buf, ac->finalize_url);
1457 &ac->cwsi, &ac->i, buf,
1479 strcpy(buf, ac->finalize_url);
1482 &ac->cwsi, &ac->i, buf,
1496 strcpy(buf, ac->cert_url);
1498 &ac->cwsi, &ac->i, buf,
1520 * ac->buf, length in ac->cpos; and the key in
1526 char *end_cert = strstr(ac->buf, "END CERTIFICATE-----");
1529 ac->cpos = (int)(lws_ptr_diff_size_t(end_cert, ac->buf) + sizeof("END CERTIFICATE-----") - 1);
1538 ac->buf,
1571 ac->buf, (size_t)ac->cpos,