| /iperf/src/ |
| H A D | cjson.c | 304 #define can_read(buffer, size) ((buffer != NULL) && (((buffer)->offset + size) <= (buffer)->length)) argument 306 #define can_access_at_index(buffer, index) ((buffer != NULL) && (((buffer)->offset + index) < (buff… argument 309 #define buffer_at_offset(buffer) ((buffer)->content + (buffer)->offset) argument 537 if ((buffer == NULL) || (buffer->buffer == NULL)) in update_offset() 541 buffer_pointer = buffer->buffer + buffer->offset; in update_offset() 1198 memset(buffer, 0, sizeof(buffer)); in print() 1205 if (buffer->buffer == NULL) in print() 1224 buffer->buffer = NULL; in print() 1233 memcpy(printed, buffer->buffer, cjson_min(buffer->length, buffer->offset + 1)); in print() 1243 if (buffer->buffer != NULL) in print() [all …]
|
| H A D | iperf_udp.c | 105 memcpy(&sec, sp->buffer, sizeof(sec)); in iperf_udp_recv() 106 memcpy(&usec, sp->buffer+4, sizeof(usec)); in iperf_udp_recv() 116 memcpy(&sec, sp->buffer, sizeof(sec)); in iperf_udp_recv() 117 memcpy(&usec, sp->buffer+4, sizeof(usec)); in iperf_udp_recv() 118 memcpy(&pc, sp->buffer+8, sizeof(pc)); in iperf_udp_recv() 232 memcpy(sp->buffer, &sec, sizeof(sec)); in iperf_udp_send() 233 memcpy(sp->buffer+4, &usec, sizeof(usec)); in iperf_udp_send() 234 memcpy(sp->buffer+8, &pcount, sizeof(pcount)); in iperf_udp_send() 245 memcpy(sp->buffer, &sec, sizeof(sec)); in iperf_udp_send() 246 memcpy(sp->buffer+4, &usec, sizeof(usec)); in iperf_udp_send() [all …]
|
| H A D | iperf_auth.c | 112 int Base64Encode(const unsigned char* buffer, const size_t length, char** b64text) { //Encodes a bi… in Base64Encode() argument 121 BIO_write(bio, buffer, length); in Base64Encode() 140 int Base64Decode(const char* b64message, unsigned char** buffer, size_t* length) { //Decodes a base… in Base64Decode() argument 144 *buffer = (unsigned char*)malloc(decodeLen + 1); in Base64Decode() 145 (*buffer)[decodeLen] = '\0'; in Base64Decode() 152 *length = BIO_read(bio, *buffer, strlen(b64message)); in Base64Decode() 172 EVP_PKEY *load_pubkey_from_base64(const char *buffer) { in load_pubkey_from_base64() argument 175 Base64Decode(buffer, &key, &key_len); in load_pubkey_from_base64() 198 EVP_PKEY *load_privkey_from_base64(const char *buffer) { in load_privkey_from_base64() argument 201 Base64Decode(buffer, &key, &key_len); in load_privkey_from_base64()
|
| H A D | iperf_auth.h | 35 EVP_PKEY *load_pubkey_from_base64(const char *buffer); 37 EVP_PKEY *load_privkey_from_base64(const char *buffer);
|
| H A D | t_auth.c | 62 int Base64Encode(const unsigned char* buffer, const size_t length, char** b64text); in main() 63 int Base64Decode(const char* b64message, unsigned char** buffer, size_t* length); in main()
|
| H A D | iperf_tcp.c | 60 r = Nread(sp->socket, sp->buffer, sp->settings->blksize, Ptcp); in iperf_tcp_recv() 92 r = Nsendfile(sp->buffer_fd, sp->socket, sp->buffer, sp->pending_size); in iperf_tcp_send() 94 r = Nwrite(sp->socket, sp->buffer, sp->pending_size, Ptcp); in iperf_tcp_send()
|
| H A D | iperf_sctp.c | 63 r = Nread(sp->socket, sp->buffer, sp->settings->blksize, Psctp); in iperf_sctp_recv() 95 r = Nwrite(sp->socket, sp->buffer, sp->settings->blksize, Psctp); in iperf_sctp_send()
|
| H A D | iperf_api.c | 4158 munmap(sp->buffer, sp->test->settings->blksize); in iperf_free_stream() 4238 …sp->buffer = (char *) mmap(NULL, test->settings->blksize, PROT_READ|PROT_WRITE, MAP_PRIVATE, sp->b… in iperf_new_stream() 4239 if (sp->buffer == MAP_FAILED) { in iperf_new_stream() 4257 munmap(sp->buffer, sp->test->settings->blksize); in iperf_new_stream() 4271 fill_with_repeating_pattern(sp->buffer, test->settings->blksize); in iperf_new_stream() 4273 ret = readentropy(sp->buffer, test->settings->blksize); in iperf_new_stream() 4277 munmap(sp->buffer, sp->test->settings->blksize); in iperf_new_stream() 4410 r = read(sp->diskfile_fd, sp->buffer, sp->test->settings->blksize - in diskfile_send() 4459 memcpy(sp->buffer, in diskfile_send() 4460 sp->buffer + (sp->test->settings->blksize - sp->diskfile_left), in diskfile_send() [all …]
|
| H A D | iperf.h | 196 char *buffer; /* data to send, mmapped */ member
|
| H A D | cjson.h | 168 CJSON_PUBLIC(cJSON_bool) cJSON_PrintPreallocated(cJSON *item, char *buffer, const int length, const…
|
| /iperf/ |
| H A D | RELNOTES.md | 98 * Some buffer overflow hazards were fixed (#1134). 163 * A possible buffer overflow in the authentication feature has been 258 transfers on short tests over high-latency or buffer-bloated 376 the socket buffer sizes (#558). 488 * Several checks are now made when setting the socket buffer sizes 517 * Fixed a buffer overflow in the cJSON library (issue #466). It is 533 * Fixed a buffer overflow / heap corruption issue that could occur 681 * UDP tests now honor the -w option for setting the socket buffer 807 * A possible buffer overflow in iperf_error.c has been fixed (issue 839 * A buffer for holding formatted numeric values is now
|
| H A D | aclocal.m4 | 1707 # (any single argument exceeding 2000 bytes causes a buffer overrun
|
| /iperf/docs/ |
| H A D | dev.rst | 85 * When specifying the TCP buffer size using the ``-w`` flag on Linux, 94 size, it is also used to set the socket buffer size. This has been
|
| H A D | invoking.rst | 181 force flushing output at every interval. Used to avoid buffer- 318 length of buffer to read or write. For TCP tests, the default 342 set socket buffer size / window size. This value gets sent to 344 sets both the sending and receiving socket buffer sizes. This
|
| H A D | news.rst | 171 (non-security-impacting) buffer overflow fix ported from upstream 378 * A possible buffer overflow related to error output has been fixed.
|
| H A D | faq.rst | 125 buffer sizes. That seems to make a big difference on some hosts.
|
| /iperf/config/ |
| H A D | ltmain.sh | 6264 /* static buffer for getcwd */
|