Lines Matching refs:size
113 *len = prefs.size();
142 if (proto.size() > 255) {
143 LOG(FATAL) << "Too long ALPN identifier: " << proto.size();
147 len += 1 + proto.size();
159 *ptr++ = proto.size();
167 int ssl_pem_passwd_cb(char *buf, int size, int rwflag, void *user_data) {
169 auto len = static_cast<int>(config->tls.private_key_passwd.size());
170 if (size < len + 1) {
171 LOG(ERROR) << "ssl_pem_passwd_cb: buf is too small " << size;
291 curve_name.size(), nullptr)) {
361 static_cast<uint8_t *>(CRYPTO_malloc(data->size(), __FILE__, __LINE__));
369 SSL_set_tlsext_status_ocsp_resp(ssl, buf, data->size());
512 auto session = d2i_SSL_SESSION(nullptr, &p, res.value.size());
598 for (i = 0; i < keys.size(); ++i) {
606 if (i == keys.size()) {
726 if (alpn.size() == proto_len &&
727 memcmp(alpn.byte(), proto_id, alpn.size()) == 0) {
777 *outlen = tls_ctx_data->sct_data.size();
851 if (secret.size() > max_psk_len) {
852 LOG(ERROR) << "The size of PSK secret is " << secret.size()
853 << ", but the acceptable maximum size is" << max_psk_len;
859 return static_cast<unsigned int>(secret.size());
879 if (identity.size() + 1 > max_identity_len) {
880 LOG(ERROR) << "The size of PSK identity is " << identity.size()
881 << ", but the acceptable maximum size is " << max_identity_len;
885 if (secret.size() > max_psk_len) {
886 LOG(ERROR) << "The size of PSK secret is " << secret.size()
887 << ", but the acceptable maximum size is " << max_psk_len;
894 return static_cast<unsigned int>(secret.size());
1204 tls_ctx_data->sct_data.size()) != 1) {
1491 tls_ctx_data->sct_data.size()) != 1) {
1703 rv = getnameinfo(addr, addrlen, host.data(), host.size(), service.data(),
1704 service.size(), NI_NUMERICHOST | NI_NUMERICSERV);
1933 if (cn[cn.size() - 1] == '.') {
1934 if (cn.size() == 1) {
1939 cn = StringRef{cn.c_str(), cn.size() - 1};
1994 if (hostname.empty() || hostname.size() + 1 > buf.size()) {
2011 if (wildcard_patterns_.size() !=
2012 rev_wildcard_router_.add_route(rev_suffix, wildcard_patterns_.size())) {
2046 if (hostname.empty() || hostname.size() + 1 > buf.size()) {
2078 if (nread == rev_host.size()) {
2093 wprefix.prefix.size() +
2164 if (static_cast<size_t>(len) + 1 > buf.size()) {
2172 indexed_ssl_ctx.size());
2177 if (static_cast<size_t>(idx) < indexed_ssl_ctx.size()) {
2180 assert(static_cast<size_t>(idx) == indexed_ssl_ctx.size());
2196 if (cn[cn.size() - 1] == '.') {
2197 if (cn.size() == 1) {
2203 cn = StringRef{cn.c_str(), cn.size() - 1};
2213 lt->add_cert(StringRef{std::begin(buf), end_buf}, indexed_ssl_ctx.size());
2218 if (static_cast<size_t>(idx) < indexed_ssl_ctx.size()) {
2221 assert(static_cast<size_t>(idx) == indexed_ssl_ctx.size());
2240 if (connconf.quic_listener.addrs.size()) {
2400 SSL_set_alpn_protos(ssl, alpn.data(), alpn.size());
2407 SSL_set_alpn_protos(ssl, NGHTTP2_H1_1_ALPN.byte(), NGHTTP2_H1_1_ALPN.size());
2454 return d2i_SSL_SESSION(nullptr, &p, cache.session_data.size());