Home
last modified time | relevance | path

Searched refs:buffer (Results 1 – 17 of 17) sorted by relevance

/iperf/src/
H A Dcjson.c304 #define can_read(buffer, size) ((buffer != NULL) && (((buffer)->offset + size) <= (buffer)->length)) argument
306 #define can_access_at_index(buffer, index) ((buffer != NULL) && (((buffer)->offset + index) < (buff… argument
309 #define buffer_at_offset(buffer) ((buffer)->content + (buffer)->offset) argument
537 if ((buffer == NULL) || (buffer->buffer == NULL)) in update_offset()
541 buffer_pointer = buffer->buffer + buffer->offset; in update_offset()
1198 memset(buffer, 0, sizeof(buffer)); in print()
1205 if (buffer->buffer == NULL) in print()
1224 buffer->buffer = NULL; in print()
1233 memcpy(printed, buffer->buffer, cjson_min(buffer->length, buffer->offset + 1)); in print()
1243 if (buffer->buffer != NULL) in print()
[all …]
H A Diperf_udp.c105 memcpy(&sec, sp->buffer, sizeof(sec)); in iperf_udp_recv()
106 memcpy(&usec, sp->buffer+4, sizeof(usec)); in iperf_udp_recv()
116 memcpy(&sec, sp->buffer, sizeof(sec)); in iperf_udp_recv()
117 memcpy(&usec, sp->buffer+4, sizeof(usec)); in iperf_udp_recv()
118 memcpy(&pc, sp->buffer+8, sizeof(pc)); in iperf_udp_recv()
232 memcpy(sp->buffer, &sec, sizeof(sec)); in iperf_udp_send()
233 memcpy(sp->buffer+4, &usec, sizeof(usec)); in iperf_udp_send()
234 memcpy(sp->buffer+8, &pcount, sizeof(pcount)); in iperf_udp_send()
245 memcpy(sp->buffer, &sec, sizeof(sec)); in iperf_udp_send()
246 memcpy(sp->buffer+4, &usec, sizeof(usec)); in iperf_udp_send()
[all …]
H A Diperf_auth.c112 int Base64Encode(const unsigned char* buffer, const size_t length, char** b64text) { //Encodes a bi… in Base64Encode() argument
121 BIO_write(bio, buffer, length); in Base64Encode()
140 int Base64Decode(const char* b64message, unsigned char** buffer, size_t* length) { //Decodes a base… in Base64Decode() argument
144 *buffer = (unsigned char*)malloc(decodeLen + 1); in Base64Decode()
145 (*buffer)[decodeLen] = '\0'; in Base64Decode()
152 *length = BIO_read(bio, *buffer, strlen(b64message)); in Base64Decode()
172 EVP_PKEY *load_pubkey_from_base64(const char *buffer) { in load_pubkey_from_base64() argument
175 Base64Decode(buffer, &key, &key_len); in load_pubkey_from_base64()
198 EVP_PKEY *load_privkey_from_base64(const char *buffer) { in load_privkey_from_base64() argument
201 Base64Decode(buffer, &key, &key_len); in load_privkey_from_base64()
H A Diperf_auth.h35 EVP_PKEY *load_pubkey_from_base64(const char *buffer);
37 EVP_PKEY *load_privkey_from_base64(const char *buffer);
H A Dt_auth.c62 int Base64Encode(const unsigned char* buffer, const size_t length, char** b64text); in main()
63 int Base64Decode(const char* b64message, unsigned char** buffer, size_t* length); in main()
H A Diperf_tcp.c60 r = Nread(sp->socket, sp->buffer, sp->settings->blksize, Ptcp); in iperf_tcp_recv()
92 r = Nsendfile(sp->buffer_fd, sp->socket, sp->buffer, sp->pending_size); in iperf_tcp_send()
94 r = Nwrite(sp->socket, sp->buffer, sp->pending_size, Ptcp); in iperf_tcp_send()
H A Diperf_sctp.c63 r = Nread(sp->socket, sp->buffer, sp->settings->blksize, Psctp); in iperf_sctp_recv()
95 r = Nwrite(sp->socket, sp->buffer, sp->settings->blksize, Psctp); in iperf_sctp_send()
H A Diperf_api.c4158 munmap(sp->buffer, sp->test->settings->blksize); in iperf_free_stream()
4238 …sp->buffer = (char *) mmap(NULL, test->settings->blksize, PROT_READ|PROT_WRITE, MAP_PRIVATE, sp->b… in iperf_new_stream()
4239 if (sp->buffer == MAP_FAILED) { in iperf_new_stream()
4257 munmap(sp->buffer, sp->test->settings->blksize); in iperf_new_stream()
4271 fill_with_repeating_pattern(sp->buffer, test->settings->blksize); in iperf_new_stream()
4273 ret = readentropy(sp->buffer, test->settings->blksize); in iperf_new_stream()
4277 munmap(sp->buffer, sp->test->settings->blksize); in iperf_new_stream()
4410 r = read(sp->diskfile_fd, sp->buffer, sp->test->settings->blksize - in diskfile_send()
4459 memcpy(sp->buffer, in diskfile_send()
4460 sp->buffer + (sp->test->settings->blksize - sp->diskfile_left), in diskfile_send()
[all …]
H A Diperf.h196 char *buffer; /* data to send, mmapped */ member
H A Dcjson.h168 CJSON_PUBLIC(cJSON_bool) cJSON_PrintPreallocated(cJSON *item, char *buffer, const int length, const…
/iperf/
H A DRELNOTES.md98 * Some buffer overflow hazards were fixed (#1134).
163 * A possible buffer overflow in the authentication feature has been
258 transfers on short tests over high-latency or buffer-bloated
376 the socket buffer sizes (#558).
488 * Several checks are now made when setting the socket buffer sizes
517 * Fixed a buffer overflow in the cJSON library (issue #466). It is
533 * Fixed a buffer overflow / heap corruption issue that could occur
681 * UDP tests now honor the -w option for setting the socket buffer
807 * A possible buffer overflow in iperf_error.c has been fixed (issue
839 * A buffer for holding formatted numeric values is now
H A Daclocal.m41707 # (any single argument exceeding 2000 bytes causes a buffer overrun
/iperf/docs/
H A Ddev.rst85 * When specifying the TCP buffer size using the ``-w`` flag on Linux,
94 size, it is also used to set the socket buffer size. This has been
H A Dinvoking.rst181 force flushing output at every interval. Used to avoid buffer-
318 length of buffer to read or write. For TCP tests, the default
342 set socket buffer size / window size. This value gets sent to
344 sets both the sending and receiving socket buffer sizes. This
H A Dnews.rst171 (non-security-impacting) buffer overflow fix ported from upstream
378 * A possible buffer overflow related to error output has been fixed.
H A Dfaq.rst125 buffer sizes. That seems to make a big difference on some hosts.
/iperf/config/
H A Dltmain.sh6264 /* static buffer for getcwd */