Home
last modified time | relevance | path

Searched refs:msg_len (Results 1 – 25 of 100) sorted by relevance

1234

/third_party/mindspore/mindspore/ccsrc/cxx_api/model/model_converter_utils/
Dmulti_process.cc143 Status MultiProcess::SendMsg(const void *buffer, uint64_t msg_len) { in SendMsg() argument
145 MS_LOG_INFO << "Start to send message to peer process, msg len " << msg_len; in SendMsg()
146 send_msg_->msg_total_len = msg_len; in SendMsg()
148 while (msg_len > cur_offset) { in SendMsg()
149 uint64_t sub_msg_len = std::min(msg_len - cur_offset, shmat_data_max_size_); in SendMsg()
162 send_msg_->msg_len = sub_msg_len; in SendMsg()
165 …OG_INFO << "Send start " << cur_offset << ", msg len " << sub_msg_len << ", total len " << msg_len; in SendMsg()
175 …_LOG_INFO << "Send end " << cur_offset << ", msg len " << sub_msg_len << ", total len " << msg_len; in SendMsg()
177 MS_LOG_INFO << "End to send message to peer process, msg len " << msg_len; in SendMsg()
184 uint64_t msg_len = 0; in ReceiveMsg() local
[all …]
Dmulti_process.h27 uint64_t msg_len = 0; member
35 using CreateBufferCall = std::function<uint8_t *(size_t msg_len)>;
43 Status SendMsg(const void *buffer, uint64_t msg_len);
/third_party/openssl/ssl/statem/
Dstatem_dtls.c21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument
34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument
37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
129 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write()
288 l2n3(msg_hdr->msg_len, p); in dtls1_do_write()
291 l2n3(msg_hdr->msg_len, p); in dtls1_do_write()
335 size_t msg_len; in dtls_get_message() local
368 msg_len = msg_hdr->msg_len; in dtls_get_message()
372 l2n3(msg_len, p); in dtls_get_message()
[all …]
/third_party/ltp/utils/sctp/func_tests/
Dtest_fragments.c94 int msg_len, msg_cnt, i; in main() local
164 msg_len = 10; in main()
167 outmessage.msg_iov->iov_len = msg_len; in main()
168 test_sendmsg(sk1, &outmessage, 0, msg_len); in main()
203 test_check_msg_data(&inmessage, error, msg_len, MSG_EOR, stream, ppid); in main()
229 msg_len = 100000; in main()
230 msg_buf = test_build_msg(msg_len); in main()
232 outmessage.msg_iov->iov_len = msg_len; in main()
252 msg_len = msg_sizes[i]; in main()
253 msg_buf = test_build_msg(msg_len); in main()
[all …]
/third_party/openssl/crypto/sm2/
Dsm2_crypt.c81 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, in sm2_ciphertext_size() argument
94 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in sm2_ciphertext_size()
104 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) in sm2_encrypt() argument
191 msg_mask = OPENSSL_zalloc(msg_len); in sm2_encrypt()
198 if (!ecdh_KDF_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in sm2_encrypt()
204 for (i = 0; i != msg_len; ++i) in sm2_encrypt()
209 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in sm2_encrypt()
226 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in sm2_encrypt()
274 int msg_len = 0; in sm2_decrypt() local
296 msg_len = sm2_ctext->C2->length; in sm2_decrypt()
[all …]
/third_party/openssl/test/
Dsm2_internal_test.c144 const size_t msg_len = strlen(message); in test_sm2_crypt() local
153 size_t recovered_len = msg_len; in test_sm2_crypt()
170 || !TEST_true(sm2_ciphertext_size(key, digest, msg_len, &ctext_len))) in test_sm2_crypt()
178 if (!TEST_true(sm2_encrypt(key, digest, (const uint8_t *)message, msg_len, in test_sm2_crypt()
189 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt()
195 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt()
196 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt()
311 const size_t msg_len = strlen(message); in test_sm2_sign() local
339 (const uint8_t *)message, msg_len); in test_sm2_sign()
355 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
/third_party/ltp/include/
Dtst_safe_net.h42 #define SAFE_SENDMSG(msg_len, fd, msg, flags) \ argument
43 safe_sendmsg(__FILE__, __LINE__, msg_len, fd, msg, flags)
45 #define SAFE_RECV(msg_len, fd, buf, size, flags) \ argument
46 safe_recv(__FILE__, __LINE__, (msg_len), (fd), (buf), (size), (flags))
48 #define SAFE_RECVMSG(msg_len, fd, msg, flags) \ argument
49 safe_recvmsg(__FILE__, __LINE__, msg_len, fd, msg, flags)
Dtst_timer.h275 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in libc_mq_timedsend() argument
277 return mq_timedsend(mqdes, msg_ptr, msg_len, msg_prio, abs_timeout); in libc_mq_timedsend()
281 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in sys_mq_timedsend() argument
283 return tst_syscall(__NR_mq_timedsend, mqdes, msg_ptr, msg_len, msg_prio, in sys_mq_timedsend()
288 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in sys_mq_timedsend64() argument
290 return tst_syscall(__NR_mq_timedsend_time64, mqdes, msg_ptr, msg_len, in sys_mq_timedsend64()
295 size_t msg_len, unsigned int *msg_prio, void *abs_timeout) in libc_mq_timedreceive() argument
297 return mq_timedreceive(mqdes, msg_ptr, msg_len, msg_prio, abs_timeout); in libc_mq_timedreceive()
301 size_t msg_len, unsigned int *msg_prio, void *abs_timeout) in sys_mq_timedreceive() argument
303 return tst_syscall(__NR_mq_timedreceive, mqdes, msg_ptr, msg_len, in sys_mq_timedreceive()
[all …]
/third_party/openssl/include/crypto/
Dsm2.h36 const uint8_t *msg, size_t msg_len);
43 const uint8_t *msg, size_t msg_len);
60 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
68 size_t msg_len,
/third_party/ltp/testcases/open_posix_testsuite/conformance/definitions/mqueue_h/
D7-1-buildonly.c14 size_t msg_len; in test_mq_send_prototype() local
20 msg_len = 0; in test_mq_send_prototype()
23 err = mq_receive(mqdes, msgp, msg_len, &msg_prio); in test_mq_send_prototype()
D6-1-buildonly.c15 size_t msg_len; in test_mq_receive_prototype() local
20 msg_len = 0; in test_mq_receive_prototype()
23 msg_size = mq_receive(mqdes, msgp, msg_len, &msg_prio); in test_mq_receive_prototype()
D9-1-buildonly.c15 size_t msg_len; in test_mq_timedreceive_prototype() local
21 msg_len = 0; in test_mq_timedreceive_prototype()
24 size = mq_timedreceive(mqdes, msgp, msg_len, &msg_prio, &abstime); in test_mq_timedreceive_prototype()
D10-1-buildonly.c17 size_t msg_len; in test_mq_timedsend_prototype() local
22 msg_len = 0; in test_mq_timedsend_prototype()
25 err = mq_timedsend(mqdes, msgp, msg_len, msg_prio, &timeout); in test_mq_timedsend_prototype()
/third_party/mindspore/third_party/patch/openssl/
DCVE-2021-3711.patch9 -int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
29 - if (msg_len <= overhead) {
35 - *pt_size = msg_len - overhead;
60 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
63 -int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
79 || !TEST_int_eq(ptext_len, msg_len))
/third_party/ltp/utils/sctp/testlib/
Dsctputil.c96 test_print_message(int sk LTP_ATTRIBUTE_UNUSED, struct msghdr *msg, size_t msg_len) in test_print_message() argument
117 printf("DATA(%ld): ", msg_len); in test_print_message()
118 while ( msg_len > 0 ) { in test_print_message()
125 save = text[msg_len-1]; in test_print_message()
126 if ( len > msg_len ) { in test_print_message()
127 text[(len = msg_len) - 1] = '\0'; in test_print_message()
130 if ( (msg_len -= len) > 0 ) { index++; } in test_print_message()
137 text[msg_len-1] = save; in test_print_message()
/third_party/mesa3d/src/gallium/winsys/svga/drm/
Dvmw_msg.c370 size_t msg_len = strlen(msg); in vmw_send_msg() local
382 msg_len, si, di, in vmw_send_msg()
400 msg_len, si, di, in vmw_send_msg()
432 int msg_len; in vmw_svga_winsys_host_log() local
442 msg_len = strlen(log) + strlen("log ") + 1; in vmw_svga_winsys_host_log()
443 msg = CALLOC(1, msg_len); in vmw_svga_winsys_host_log()
/third_party/ltp/testcases/network/nfs/nfs_stress/
Dnfs01_open_files.c86 int msg_len = strlen(msg); in write_something() local
88 rc = write(fd, msg, msg_len); in write_something()
89 if (rc != msg_len) in write_something()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_gtc.c55 size_t msg_len; in eap_gtc_buildReq() local
59 msg_len = os_strlen(msg); in eap_gtc_buildReq()
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq()
69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_gtc.c55 size_t msg_len; in eap_gtc_buildReq() local
59 msg_len = os_strlen(msg); in eap_gtc_buildReq()
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq()
69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
/third_party/ltp/testcases/kernel/syscalls/ipc/msgrcv/
Dmsgrcv07.c82 int msg_len; in test_msg_noerror() local
86 msg_len = sizeof(MSG1) / 2; in test_msg_noerror()
89 TEST(msgrcv(queue_id, &rcv_buf, msg_len, MSGTYPE1, MSG_NOERROR)); in test_msg_noerror()
97 if (strncmp(rcv_buf.mtext, MSG1, msg_len) == 0 && rcv_buf.type == MSGTYPE1) in test_msg_noerror()
/third_party/toybox/toys/pending/
Dtraceroute.c66 unsigned msg_len;
127 send_icmp4->icmp_cksum = in_cksum((uint16_t *) send_icmp4, TT.msg_len); in send_probe4()
135 len = TT.msg_len; in send_probe4()
156 if (sendto(TT.snd_sock, out, TT.msg_len, 0, in send_probe6()
505 TT.msg_len = pack_size = ICMP_HD_SIZE4; //udp payload is also 8bytes in traceroute_main()
507 TT.msg_len = atolx_range(toys.optargs[1], pack_size, 32768);//max packet size in traceroute_main()
559 if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len, in traceroute_main()
560 sizeof(TT.msg_len)) < 0) perror_exit("SO_SNDBUF failed "); in traceroute_main()
576 TT.packet = xzalloc(TT.msg_len); in traceroute_main()
632 xprintf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len); in traceroute_main()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dpreauth_test.c46 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument
50 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol()
51 hdr = os_malloc(*msg_len); in wpa_alloc_eapol()
73 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument
75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
/third_party/mbedtls/library/
Dssl_tls13_generic.c99 size_t msg_len ) in mbedtls_ssl_tls13_finish_handshake_msg() argument
106 msg_with_header_len = msg_len + 4; in mbedtls_ssl_tls13_finish_handshake_msg()
117 size_t msg_len ) in mbedtls_ssl_tls13_add_hs_msg_to_checksum() argument
119 mbedtls_ssl_tls13_add_hs_hdr_to_checksum( ssl, hs_type, msg_len ); in mbedtls_ssl_tls13_add_hs_msg_to_checksum()
120 ssl->handshake->update_checksum( ssl, msg, msg_len ); in mbedtls_ssl_tls13_add_hs_msg_to_checksum()
1106 size_t buf_len, msg_len; in mbedtls_ssl_tls13_write_finished_message() local
1116 ssl, buf, buf + buf_len, &msg_len ) ); in mbedtls_ssl_tls13_write_finished_message()
1119 buf, msg_len ); in mbedtls_ssl_tls13_write_finished_message()
1123 buf_len, msg_len ) ); in mbedtls_ssl_tls13_write_finished_message()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dpreauth_test.c52 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument
56 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol()
57 hdr = os_malloc(*msg_len); in wpa_alloc_eapol()
79 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument
81 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
/third_party/mindspore/mindspore/ccsrc/cxx_api/model/acl/
Dmodel_converter.cc166 CreateBufferCall call = [&buffer_ret](size_t msg_len) -> uint8_t * { in LoadMindIR() argument
167 (void)buffer_ret.ResizeData(msg_len); in LoadMindIR()
181 CreateBufferCall call = [&model](size_t msg_len) -> uint8_t * { in LoadMindIR() argument
182 (void)model.ResizeData(msg_len); in LoadMindIR()

1234