Loading doc/man3/SSL_alloc_buffers.pod +2 −2 Original line number Diff line number Diff line Loading @@ -20,7 +20,7 @@ The B<SSL_MODE_RELEASE_BUFFERS> mode releases read or write buffers whenever the buffers have been drained. These functions allow applications to manually control when buffers are freed and allocated. After freeing the buffers, the buffers are automatically reallocted upon a After freeing the buffers, the buffers are automatically reallocated upon a new read or write. The SSL_alloc_buffers() does not need to be called, but can be used to make sure the buffers are pre-allocated. This can be used to avoid allocation during data processing or with CRYPTO_set_mem_functions() Loading @@ -44,7 +44,7 @@ The SSL_free_buffers() function returns 1 if the buffers have been freed. This value is also returned if the buffers had been freed before calling SSL_free_buffers(). The SSL_alloc_buffers() function returns 1 if the buffers have been allocated. This valus is also returned if the buffers had been allocated before calling This value is also returned if the buffers had been allocated before calling SSL_alloc_buffers(). =back Loading test/asn1_encode_test.c +1 −1 Original line number Diff line number Diff line Loading @@ -672,7 +672,7 @@ static int do_decode_custom(const TEST_CUSTOM_DATA *custom_data, { unsigned char *encoding = NULL; /* * We force the defaults to be explicitely encoded to make sure we test * We force the defaults to be explicitly encoded to make sure we test * for defaults that shouldn't be present (i.e. we check for failure) */ size_t encoding_length = make_custom_der(custom_data, &encoding, 1); Loading test/asynciotest.c +1 −1 Original line number Diff line number Diff line Loading @@ -325,7 +325,7 @@ static int test_asyncio(int test) goto end; /* * Now read the test data. It may take more attemps here because * Now read the test data. It may take more attempts here because * it could fail once for each byte read, including all overhead * bytes from the record header/padding etc. */ Loading test/sslapitest.c +1 −1 Original line number Diff line number Diff line Loading @@ -91,7 +91,7 @@ static void server_keylog_callback(const SSL *ssl, const char *line) /* If the log doesn't fit, error out. */ if (server_log_buffer_index + line_length > sizeof(server_log_buffer) - 1) { TEST_info("Server og too full"); TEST_info("Server log too full"); error_writing_log = 1; return; } Loading test/sslbuffertest.c +1 −1 Original line number Diff line number Diff line Loading @@ -105,7 +105,7 @@ static int test_func(int test) if (!TEST_size_t_eq(len, sizeof(testdata))) goto end; /* * Now read the test data. It may take more attemps here because * Now read the test data. It may take more attempts here because * it could fail once for each byte read, including all overhead * bytes from the record header/padding etc. */ Loading Loading
doc/man3/SSL_alloc_buffers.pod +2 −2 Original line number Diff line number Diff line Loading @@ -20,7 +20,7 @@ The B<SSL_MODE_RELEASE_BUFFERS> mode releases read or write buffers whenever the buffers have been drained. These functions allow applications to manually control when buffers are freed and allocated. After freeing the buffers, the buffers are automatically reallocted upon a After freeing the buffers, the buffers are automatically reallocated upon a new read or write. The SSL_alloc_buffers() does not need to be called, but can be used to make sure the buffers are pre-allocated. This can be used to avoid allocation during data processing or with CRYPTO_set_mem_functions() Loading @@ -44,7 +44,7 @@ The SSL_free_buffers() function returns 1 if the buffers have been freed. This value is also returned if the buffers had been freed before calling SSL_free_buffers(). The SSL_alloc_buffers() function returns 1 if the buffers have been allocated. This valus is also returned if the buffers had been allocated before calling This value is also returned if the buffers had been allocated before calling SSL_alloc_buffers(). =back Loading
test/asn1_encode_test.c +1 −1 Original line number Diff line number Diff line Loading @@ -672,7 +672,7 @@ static int do_decode_custom(const TEST_CUSTOM_DATA *custom_data, { unsigned char *encoding = NULL; /* * We force the defaults to be explicitely encoded to make sure we test * We force the defaults to be explicitly encoded to make sure we test * for defaults that shouldn't be present (i.e. we check for failure) */ size_t encoding_length = make_custom_der(custom_data, &encoding, 1); Loading
test/asynciotest.c +1 −1 Original line number Diff line number Diff line Loading @@ -325,7 +325,7 @@ static int test_asyncio(int test) goto end; /* * Now read the test data. It may take more attemps here because * Now read the test data. It may take more attempts here because * it could fail once for each byte read, including all overhead * bytes from the record header/padding etc. */ Loading
test/sslapitest.c +1 −1 Original line number Diff line number Diff line Loading @@ -91,7 +91,7 @@ static void server_keylog_callback(const SSL *ssl, const char *line) /* If the log doesn't fit, error out. */ if (server_log_buffer_index + line_length > sizeof(server_log_buffer) - 1) { TEST_info("Server og too full"); TEST_info("Server log too full"); error_writing_log = 1; return; } Loading
test/sslbuffertest.c +1 −1 Original line number Diff line number Diff line Loading @@ -105,7 +105,7 @@ static int test_func(int test) if (!TEST_size_t_eq(len, sizeof(testdata))) goto end; /* * Now read the test data. It may take more attemps here because * Now read the test data. It may take more attempts here because * it could fail once for each byte read, including all overhead * bytes from the record header/padding etc. */ Loading