Lines Matching defs:len
123 BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity,
145 BIO_printf(bio_c_out, "created PSK len=%ld\n", key_len);
242 size_t len;
268 SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len);
280 /* Reconstruct the type/len fields prior to extension data */
388 ossl_ssize_t len = 0;
392 if ((len = f->parser(&cp, f->var)) <= 0) {
398 /* The data field is last, so len is its length */
399 ret = SSL_dane_tlsa_add(con, usage, selector, mtype, data, len);
508 "Enable Maximum Fragment Length Negotiation (len values: 512, 1024, 2048 and 4096)"},
584 "Export len bytes of keying material; default 20"},
852 int serverinfo_count = 0, start = 0, len;
1387 len = strlen(p);
1388 for (start = 0, i = 0; i <= len; ++i) {
1389 if (i == len || p[i] == ',') {
1422 len = atoi(opt_arg());
1423 switch (len) {
1439 prog, len);
1600 next_protos_parse(&next_proto.len, next_proto_neg_in);
3368 int len;
3370 len = SSL_get_tlsext_status_ocsp_resp(s, &p);
3376 rsp = d2i_OCSP_RESPONSE(NULL, &p, len);
3379 BIO_dump_indent(arg, (char *)p, len, 4);
3393 long len;
3427 inf = ASN1_get_object(&cur, &len, &tag, &xclass, rem);
3429 (rem = end - cur, len > rem)) {
3434 rem = len; /* ensure that we don't overstep the SEQUENCE */
3437 inf = ASN1_get_object(&cur, &len, &tag, &xclass, rem);
3439 (rem = end - cur, len > rem)) {
3444 cur += len; /* shall we check for MessageId match or just skip? */
3448 inf = ASN1_get_object(&cur, &len, &tag, &xclass, rem);
3457 inf = ASN1_get_object(&cur, &len, &tag, &xclass, rem);
3458 if (inf != V_ASN1_UNIVERSAL || tag != V_ASN1_ENUMERATED || len == 0 ||
3459 (rem = end - cur, len > rem)) {
3464 /* len should always be one, but just in case... */
3465 for (ret = 0, inf = 0; inf < len; inf++) {