/third_party/mindspore/mindspore/ccsrc/cxx_api/model/model_converter_utils/ |
D | multi_process.cc | 143 Status MultiProcess::SendMsg(const void *buffer, uint64_t msg_len) { in SendMsg() argument 145 MS_LOG_INFO << "Start to send message to peer process, msg len " << msg_len; in SendMsg() 146 send_msg_->msg_total_len = msg_len; in SendMsg() 148 while (msg_len > cur_offset) { in SendMsg() 149 uint64_t sub_msg_len = std::min(msg_len - cur_offset, shmat_data_max_size_); in SendMsg() 162 send_msg_->msg_len = sub_msg_len; in SendMsg() 165 …OG_INFO << "Send start " << cur_offset << ", msg len " << sub_msg_len << ", total len " << msg_len; in SendMsg() 175 …_LOG_INFO << "Send end " << cur_offset << ", msg len " << sub_msg_len << ", total len " << msg_len; in SendMsg() 177 MS_LOG_INFO << "End to send message to peer process, msg len " << msg_len; in SendMsg() 184 uint64_t msg_len = 0; in ReceiveMsg() local [all …]
|
D | multi_process.h | 27 uint64_t msg_len = 0; member 35 using CreateBufferCall = std::function<uint8_t *(size_t msg_len)>; 43 Status SendMsg(const void *buffer, uint64_t msg_len);
|
/third_party/openssl/ssl/statem/ |
D | statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 129 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write() 288 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 291 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 335 size_t msg_len; in dtls_get_message() local 368 msg_len = msg_hdr->msg_len; in dtls_get_message() 372 l2n3(msg_len, p); in dtls_get_message() [all …]
|
/third_party/ltp/utils/sctp/func_tests/ |
D | test_fragments.c | 94 int msg_len, msg_cnt, i; in main() local 164 msg_len = 10; in main() 167 outmessage.msg_iov->iov_len = msg_len; in main() 168 test_sendmsg(sk1, &outmessage, 0, msg_len); in main() 203 test_check_msg_data(&inmessage, error, msg_len, MSG_EOR, stream, ppid); in main() 229 msg_len = 100000; in main() 230 msg_buf = test_build_msg(msg_len); in main() 232 outmessage.msg_iov->iov_len = msg_len; in main() 252 msg_len = msg_sizes[i]; in main() 253 msg_buf = test_build_msg(msg_len); in main() [all …]
|
/third_party/openssl/crypto/sm2/ |
D | sm2_crypt.c | 81 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, in sm2_ciphertext_size() argument 94 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in sm2_ciphertext_size() 104 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) in sm2_encrypt() argument 191 msg_mask = OPENSSL_zalloc(msg_len); in sm2_encrypt() 198 if (!ecdh_KDF_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in sm2_encrypt() 204 for (i = 0; i != msg_len; ++i) in sm2_encrypt() 209 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in sm2_encrypt() 226 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in sm2_encrypt() 274 int msg_len = 0; in sm2_decrypt() local 296 msg_len = sm2_ctext->C2->length; in sm2_decrypt() [all …]
|
/third_party/openssl/test/ |
D | sm2_internal_test.c | 144 const size_t msg_len = strlen(message); in test_sm2_crypt() local 153 size_t recovered_len = msg_len; in test_sm2_crypt() 170 || !TEST_true(sm2_ciphertext_size(key, digest, msg_len, &ctext_len))) in test_sm2_crypt() 178 if (!TEST_true(sm2_encrypt(key, digest, (const uint8_t *)message, msg_len, in test_sm2_crypt() 189 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt() 195 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt() 196 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt() 311 const size_t msg_len = strlen(message); in test_sm2_sign() local 339 (const uint8_t *)message, msg_len); in test_sm2_sign() 355 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
|
/third_party/ltp/include/ |
D | tst_safe_net.h | 42 #define SAFE_SENDMSG(msg_len, fd, msg, flags) \ argument 43 safe_sendmsg(__FILE__, __LINE__, msg_len, fd, msg, flags) 45 #define SAFE_RECV(msg_len, fd, buf, size, flags) \ argument 46 safe_recv(__FILE__, __LINE__, (msg_len), (fd), (buf), (size), (flags)) 48 #define SAFE_RECVMSG(msg_len, fd, msg, flags) \ argument 49 safe_recvmsg(__FILE__, __LINE__, msg_len, fd, msg, flags)
|
D | tst_timer.h | 275 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in libc_mq_timedsend() argument 277 return mq_timedsend(mqdes, msg_ptr, msg_len, msg_prio, abs_timeout); in libc_mq_timedsend() 281 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in sys_mq_timedsend() argument 283 return tst_syscall(__NR_mq_timedsend, mqdes, msg_ptr, msg_len, msg_prio, in sys_mq_timedsend() 288 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in sys_mq_timedsend64() argument 290 return tst_syscall(__NR_mq_timedsend_time64, mqdes, msg_ptr, msg_len, in sys_mq_timedsend64() 295 size_t msg_len, unsigned int *msg_prio, void *abs_timeout) in libc_mq_timedreceive() argument 297 return mq_timedreceive(mqdes, msg_ptr, msg_len, msg_prio, abs_timeout); in libc_mq_timedreceive() 301 size_t msg_len, unsigned int *msg_prio, void *abs_timeout) in sys_mq_timedreceive() argument 303 return tst_syscall(__NR_mq_timedreceive, mqdes, msg_ptr, msg_len, in sys_mq_timedreceive() [all …]
|
/third_party/openssl/include/crypto/ |
D | sm2.h | 36 const uint8_t *msg, size_t msg_len); 43 const uint8_t *msg, size_t msg_len); 60 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 68 size_t msg_len,
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/definitions/mqueue_h/ |
D | 7-1-buildonly.c | 14 size_t msg_len; in test_mq_send_prototype() local 20 msg_len = 0; in test_mq_send_prototype() 23 err = mq_receive(mqdes, msgp, msg_len, &msg_prio); in test_mq_send_prototype()
|
D | 6-1-buildonly.c | 15 size_t msg_len; in test_mq_receive_prototype() local 20 msg_len = 0; in test_mq_receive_prototype() 23 msg_size = mq_receive(mqdes, msgp, msg_len, &msg_prio); in test_mq_receive_prototype()
|
D | 9-1-buildonly.c | 15 size_t msg_len; in test_mq_timedreceive_prototype() local 21 msg_len = 0; in test_mq_timedreceive_prototype() 24 size = mq_timedreceive(mqdes, msgp, msg_len, &msg_prio, &abstime); in test_mq_timedreceive_prototype()
|
D | 10-1-buildonly.c | 17 size_t msg_len; in test_mq_timedsend_prototype() local 22 msg_len = 0; in test_mq_timedsend_prototype() 25 err = mq_timedsend(mqdes, msgp, msg_len, msg_prio, &timeout); in test_mq_timedsend_prototype()
|
/third_party/mindspore/third_party/patch/openssl/ |
D | CVE-2021-3711.patch | 9 -int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 29 - if (msg_len <= overhead) { 35 - *pt_size = msg_len - overhead; 60 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 63 -int sm2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 79 || !TEST_int_eq(ptext_len, msg_len))
|
/third_party/ltp/utils/sctp/testlib/ |
D | sctputil.c | 96 test_print_message(int sk LTP_ATTRIBUTE_UNUSED, struct msghdr *msg, size_t msg_len) in test_print_message() argument 117 printf("DATA(%ld): ", msg_len); in test_print_message() 118 while ( msg_len > 0 ) { in test_print_message() 125 save = text[msg_len-1]; in test_print_message() 126 if ( len > msg_len ) { in test_print_message() 127 text[(len = msg_len) - 1] = '\0'; in test_print_message() 130 if ( (msg_len -= len) > 0 ) { index++; } in test_print_message() 137 text[msg_len-1] = save; in test_print_message()
|
/third_party/mesa3d/src/gallium/winsys/svga/drm/ |
D | vmw_msg.c | 370 size_t msg_len = strlen(msg); in vmw_send_msg() local 382 msg_len, si, di, in vmw_send_msg() 400 msg_len, si, di, in vmw_send_msg() 432 int msg_len; in vmw_svga_winsys_host_log() local 442 msg_len = strlen(log) + strlen("log ") + 1; in vmw_svga_winsys_host_log() 443 msg = CALLOC(1, msg_len); in vmw_svga_winsys_host_log()
|
/third_party/ltp/testcases/network/nfs/nfs_stress/ |
D | nfs01_open_files.c | 86 int msg_len = strlen(msg); in write_something() local 88 rc = write(fd, msg, msg_len); in write_something() 89 if (rc != msg_len) in write_something()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
/third_party/ltp/testcases/kernel/syscalls/ipc/msgrcv/ |
D | msgrcv07.c | 82 int msg_len; in test_msg_noerror() local 86 msg_len = sizeof(MSG1) / 2; in test_msg_noerror() 89 TEST(msgrcv(queue_id, &rcv_buf, msg_len, MSGTYPE1, MSG_NOERROR)); in test_msg_noerror() 97 if (strncmp(rcv_buf.mtext, MSG1, msg_len) == 0 && rcv_buf.type == MSGTYPE1) in test_msg_noerror()
|
/third_party/toybox/toys/pending/ |
D | traceroute.c | 66 unsigned msg_len; 127 send_icmp4->icmp_cksum = in_cksum((uint16_t *) send_icmp4, TT.msg_len); in send_probe4() 135 len = TT.msg_len; in send_probe4() 156 if (sendto(TT.snd_sock, out, TT.msg_len, 0, in send_probe6() 505 TT.msg_len = pack_size = ICMP_HD_SIZE4; //udp payload is also 8bytes in traceroute_main() 507 TT.msg_len = atolx_range(toys.optargs[1], pack_size, 32768);//max packet size in traceroute_main() 559 if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len, in traceroute_main() 560 sizeof(TT.msg_len)) < 0) perror_exit("SO_SNDBUF failed "); in traceroute_main() 576 TT.packet = xzalloc(TT.msg_len); in traceroute_main() 632 xprintf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len); in traceroute_main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | preauth_test.c | 46 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 50 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 51 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 73 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
/third_party/mbedtls/library/ |
D | ssl_tls13_generic.c | 99 size_t msg_len ) in mbedtls_ssl_tls13_finish_handshake_msg() argument 106 msg_with_header_len = msg_len + 4; in mbedtls_ssl_tls13_finish_handshake_msg() 117 size_t msg_len ) in mbedtls_ssl_tls13_add_hs_msg_to_checksum() argument 119 mbedtls_ssl_tls13_add_hs_hdr_to_checksum( ssl, hs_type, msg_len ); in mbedtls_ssl_tls13_add_hs_msg_to_checksum() 120 ssl->handshake->update_checksum( ssl, msg, msg_len ); in mbedtls_ssl_tls13_add_hs_msg_to_checksum() 1106 size_t buf_len, msg_len; in mbedtls_ssl_tls13_write_finished_message() local 1116 ssl, buf, buf + buf_len, &msg_len ) ); in mbedtls_ssl_tls13_write_finished_message() 1119 buf, msg_len ); in mbedtls_ssl_tls13_write_finished_message() 1123 buf_len, msg_len ) ); in mbedtls_ssl_tls13_write_finished_message()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | preauth_test.c | 52 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 56 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 57 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 79 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 81 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
/third_party/mindspore/mindspore/ccsrc/cxx_api/model/acl/ |
D | model_converter.cc | 166 CreateBufferCall call = [&buffer_ret](size_t msg_len) -> uint8_t * { in LoadMindIR() argument 167 (void)buffer_ret.ResizeData(msg_len); in LoadMindIR() 181 CreateBufferCall call = [&model](size_t msg_len) -> uint8_t * { in LoadMindIR() argument 182 (void)model.ResizeData(msg_len); in LoadMindIR()
|