Lines Matching defs:len
723 size_t len;
731 len = strlen(server_hostname);
732 if (len == 0 || *server_hostname == '.') {
746 hostname = PyUnicode_Decode(server_hostname, len, "ascii", "strict");
1029 /* allocate len + 1 for terminating NULL byte */
1202 int len;
1303 len = i2t_ASN1_OBJECT(buf, sizeof(buf)-1, name->d.rid);
1304 if (len < 0) {
1308 } else if (len >= (int)sizeof(buf)) {
1311 v = PyUnicode_FromStringAndSize(buf, len);
1344 len = sprintf(
1356 v = PyUnicode_FromStringAndSize(buf, len);
1387 len = BIO_gets(biobuf, buf, sizeof(buf)-1);
1388 if (len < 0) {
1409 (len - (vptr - buf + 1)));
1577 int len, result;
1627 len = BIO_gets(biobuf, buf, sizeof(buf)-1);
1628 if (len < 0) {
1632 sn_obj = PyUnicode_FromStringAndSize(buf, len);
1644 len = BIO_gets(biobuf, buf, sizeof(buf)-1);
1645 if (len < 0) {
1649 pnotBefore = PyUnicode_FromStringAndSize(buf, len);
1661 len = BIO_gets(biobuf, buf, sizeof(buf)-1);
1662 if (len < 0) {
1666 pnotAfter = PyUnicode_FromStringAndSize(buf, len);
1739 int len;
1743 len = i2d_X509(certificate, &bytes_buf);
1744 if (len < 0) {
1749 retval = PyBytes_FromStringAndSize((const char *) bytes_buf, len);
1961 int alg_bits, strength_bits, len;
1972 len = (int)strlen(buf);
1973 if (len > 1 && buf[len-1] == '\n')
1974 buf[len-1] = '\0';
2015 int i, len;
2037 len = 0;
2048 PyList_SET_ITEM(res, len++, tup);
2050 Py_SET_SIZE(res, len);
2387 retval = SSL_write_ex(self->ssl, b->buf, (size_t)b->len, &count);
2460 size as len: Py_ssize_t
2470 _ssl__SSLSocket_read_impl(PySSLSocket *self, Py_ssize_t len,
2485 if (!group_right_1 && len < 0) {
2501 dest = PyBytes_FromStringAndSize(NULL, len);
2504 if (len == 0) {
2512 if (len <= 0 || len > buffer->len) {
2513 len = (int) buffer->len;
2514 if (buffer->len != len) {
2519 if (len == 0) {
2540 retval = SSL_read_ex(self->ssl, mem, (size_t)len, &count);
2736 size_t len;
2741 len = SSL_get_finished(self->ssl, buf, PySSL_CB_MAXLEN);
2745 len = SSL_get_peer_finished(self->ssl, buf, PySSL_CB_MAXLEN);
2758 if (len == 0)
2761 return PyBytes_FromStringAndSize(buf, len);
3365 if ((size_t)protos->len > UINT_MAX) {
3372 self->alpn_protocols = PyMem_Malloc(protos->len);
3375 memcpy(self->alpn_protocols, protos->buf, protos->len);
3376 self->alpn_protocols_len = (unsigned int)protos->len;
3949 _add_ca_certs(PySSLContext *self, const void *data, Py_ssize_t len,
3958 if (len <= 0) {
3962 } else if (len > INT_MAX) {
3968 biobuf = BIO_new_mem_buf(data, (int)len);
4119 r = _add_ca_certs(self, buf.buf, buf.len, SSL_FILETYPE_ASN1);
4852 size as len: int = -1
4864 _ssl_MemoryBIO_read_impl(PySSLMemoryBIO *self, int len)
4871 if ((len < 0) || (len > avail))
4872 len = avail;
4874 result = PyBytes_FromStringAndSize(NULL, len);
4875 if ((result == NULL) || (len == 0))
4878 nbytes = BIO_read(self->bio, PyBytes_AS_STRING(result), len);
4887 if (nbytes < len) {
4910 if (b->len > INT_MAX) {
4925 nbytes = BIO_write(self->bio, b->buf, (int)b->len);
5111 unsigned int len;
5112 id = SSL_SESSION_get_id(self->session, &len);
5113 return PyBytes_FromStringAndSize((const char *)id, len);
5184 Py_ssize_t len, written;
5187 len = view->len;
5189 written = Py_MIN(len, INT_MAX);
5192 len -= written;
5193 } while (len);
5198 PySSL_RAND(PyObject *module, int len, int pseudo)
5206 if (len < 0) {
5211 bytes = PyBytes_FromStringAndSize(NULL, len);
5215 ok = RAND_bytes((unsigned char*)PyBytes_AS_STRING(bytes), len);
5220 ok = RAND_bytes((unsigned char*)PyBytes_AS_STRING(bytes), len);