Home
last modified time | relevance | path

Searched refs:msg_len (Results 1 – 25 of 143) sorted by relevance

123456

/third_party/openssl/ssl/statem/
Dstatem_dtls.c21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument
34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument
37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
129 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write()
288 l2n3(msg_hdr->msg_len, p); in dtls1_do_write()
291 l2n3(msg_hdr->msg_len, p); in dtls1_do_write()
335 size_t msg_len; in dtls_get_message() local
367 msg_len = msg_hdr->msg_len; in dtls_get_message()
371 l2n3(msg_len, p); in dtls_get_message()
[all …]
/third_party/node/deps/openssl/openssl/ssl/statem/
Dstatem_dtls.c21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument
34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument
37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
125 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write()
284 l2n3(msg_hdr->msg_len, p); in dtls1_do_write()
287 l2n3(msg_hdr->msg_len, p); in dtls1_do_write()
331 size_t msg_len; in dtls_get_message() local
363 msg_len = msg_hdr->msg_len; in dtls_get_message()
367 l2n3(msg_len, p); in dtls_get_message()
[all …]
/third_party/ltp/utils/sctp/func_tests/
Dtest_fragments.c94 int msg_len, msg_cnt, i; in main() local
164 msg_len = 10; in main()
167 outmessage.msg_iov->iov_len = msg_len; in main()
168 test_sendmsg(sk1, &outmessage, 0, msg_len); in main()
203 test_check_msg_data(&inmessage, error, msg_len, MSG_EOR, stream, ppid); in main()
229 msg_len = 100000; in main()
230 msg_buf = test_build_msg(msg_len); in main()
232 outmessage.msg_iov->iov_len = msg_len; in main()
252 msg_len = msg_sizes[i]; in main()
253 msg_buf = test_build_msg(msg_len); in main()
[all …]
/third_party/openssl/crypto/sm2/
Dsm2_crypt.c89 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() argument
101 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in ossl_sm2_ciphertext_size()
110 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument
201 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt()
208 if (!ossl_ecdh_kdf_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in ossl_sm2_encrypt()
214 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt()
224 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt()
241 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in ossl_sm2_encrypt()
290 int msg_len = 0; in ossl_sm2_decrypt() local
314 msg_len = sm2_ctext->C2->length; in ossl_sm2_decrypt()
[all …]
/third_party/node/deps/openssl/openssl/crypto/sm2/
Dsm2_crypt.c89 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() argument
101 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in ossl_sm2_ciphertext_size()
110 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument
201 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt()
208 if (!ossl_ecdh_kdf_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in ossl_sm2_encrypt()
214 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt()
224 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt()
241 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in ossl_sm2_encrypt()
290 int msg_len = 0; in ossl_sm2_decrypt() local
314 msg_len = sm2_ctext->C2->length; in ossl_sm2_decrypt()
[all …]
/third_party/openssl/test/
Dsm2_internal_test.c140 const size_t msg_len = strlen(message); in test_sm2_crypt() local
149 size_t recovered_len = msg_len; in test_sm2_crypt()
166 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, in test_sm2_crypt()
176 (const uint8_t *)message, msg_len, in test_sm2_crypt()
187 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt()
194 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt()
195 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt()
310 const size_t msg_len = strlen(message); in test_sm2_sign() local
338 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
354 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
/third_party/ltp/include/
Dtst_safe_net.h42 #define SAFE_SENDMSG(msg_len, fd, msg, flags) \ argument
43 safe_sendmsg(__FILE__, __LINE__, msg_len, fd, msg, flags)
45 #define SAFE_RECV(msg_len, fd, buf, size, flags) \ argument
46 safe_recv(__FILE__, __LINE__, (msg_len), (fd), (buf), (size), (flags))
48 #define SAFE_RECVMSG(msg_len, fd, msg, flags) \ argument
49 safe_recvmsg(__FILE__, __LINE__, msg_len, fd, msg, flags)
Dtst_safe_posix_ipc.h22 #define SAFE_MQ_SEND(mqdes, msg_ptr, msg_len, msg_prio) \ argument
23 safe_mq_send(__FILE__, __LINE__, (mqdes), (msg_ptr), (msg_len), (msg_prio))
116 size_t msg_len, unsigned int msg_prio) in safe_mq_send() argument
120 rval = mq_send(mqdes, msg_ptr, msg_len, msg_prio); in safe_mq_send()
125 msg_len, msg_prio); in safe_mq_send()
Dtst_timer.h275 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in libc_mq_timedsend() argument
277 return mq_timedsend(mqdes, msg_ptr, msg_len, msg_prio, abs_timeout); in libc_mq_timedsend()
281 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in sys_mq_timedsend() argument
283 return tst_syscall(__NR_mq_timedsend, mqdes, msg_ptr, msg_len, msg_prio, in sys_mq_timedsend()
288 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in sys_mq_timedsend64() argument
290 return tst_syscall(__NR_mq_timedsend_time64, mqdes, msg_ptr, msg_len, in sys_mq_timedsend64()
295 size_t msg_len, unsigned int *msg_prio, void *abs_timeout) in libc_mq_timedreceive() argument
297 return mq_timedreceive(mqdes, msg_ptr, msg_len, msg_prio, abs_timeout); in libc_mq_timedreceive()
301 size_t msg_len, unsigned int *msg_prio, void *abs_timeout) in sys_mq_timedreceive() argument
303 return tst_syscall(__NR_mq_timedreceive, mqdes, msg_ptr, msg_len, in sys_mq_timedreceive()
[all …]
/third_party/openssl/ohos_lite/include/crypto/
Dsm2.h36 const uint8_t *msg, size_t msg_len);
43 const uint8_t *msg, size_t msg_len);
60 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
68 size_t msg_len,
/third_party/openssl/include/crypto/
Dsm2.h41 const uint8_t *msg, size_t msg_len);
48 const uint8_t *msg, size_t msg_len);
68 size_t msg_len, size_t *ct_size);
75 const uint8_t *msg, size_t msg_len,
/third_party/node/deps/openssl/openssl/include/crypto/
Dsm2.h41 const uint8_t *msg, size_t msg_len);
48 const uint8_t *msg, size_t msg_len);
68 size_t msg_len, size_t *ct_size);
75 const uint8_t *msg, size_t msg_len,
/third_party/ltp/utils/sctp/testlib/
Dsctputil.c96 test_print_message(int sk LTP_ATTRIBUTE_UNUSED, struct msghdr *msg, size_t msg_len) in test_print_message() argument
117 printf("DATA(%ld): ", msg_len); in test_print_message()
118 while ( msg_len > 0 ) { in test_print_message()
125 save = text[msg_len-1]; in test_print_message()
126 if ( len > msg_len ) { in test_print_message()
127 text[(len = msg_len) - 1] = '\0'; in test_print_message()
130 if ( (msg_len -= len) > 0 ) { index++; } in test_print_message()
137 text[msg_len-1] = save; in test_print_message()
/third_party/ltp/testcases/open_posix_testsuite/conformance/definitions/mqueue_h/
D7-1-buildonly.c14 size_t msg_len; in test_mq_send_prototype() local
20 msg_len = 0; in test_mq_send_prototype()
23 err = mq_receive(mqdes, msgp, msg_len, &msg_prio); in test_mq_send_prototype()
D6-1-buildonly.c15 size_t msg_len; in test_mq_receive_prototype() local
20 msg_len = 0; in test_mq_receive_prototype()
23 msg_size = mq_receive(mqdes, msgp, msg_len, &msg_prio); in test_mq_receive_prototype()
D10-1-buildonly.c17 size_t msg_len; in test_mq_timedsend_prototype() local
22 msg_len = 0; in test_mq_timedsend_prototype()
25 err = mq_timedsend(mqdes, msgp, msg_len, msg_prio, &timeout); in test_mq_timedsend_prototype()
D9-1-buildonly.c15 size_t msg_len; in test_mq_timedreceive_prototype() local
21 msg_len = 0; in test_mq_timedreceive_prototype()
24 size = mq_timedreceive(mqdes, msgp, msg_len, &msg_prio, &abstime); in test_mq_timedreceive_prototype()
/third_party/mesa3d/src/gallium/winsys/svga/drm/
Dvmw_msg.c370 size_t msg_len = strlen(msg); in vmw_send_msg() local
382 msg_len, si, di, in vmw_send_msg()
400 msg_len, si, di, in vmw_send_msg()
431 int msg_len; in vmw_svga_winsys_host_log() local
437 msg_len = strlen(log) + strlen("log ") + 1; in vmw_svga_winsys_host_log()
438 msg = CALLOC(1, msg_len); in vmw_svga_winsys_host_log()
/third_party/mbedtls/library/
Dssl_client.c904 size_t buf_len, msg_len, binders_len; in mbedtls_ssl_write_client_hello() local
916 &msg_len, in mbedtls_ssl_write_client_hello()
921 ssl->out_msglen = msg_len + 4; in mbedtls_ssl_write_client_hello()
950 msg_len); in mbedtls_ssl_write_client_hello()
955 ret = ssl->handshake->update_checksum(ssl, buf, msg_len - binders_len); in mbedtls_ssl_write_client_hello()
964 ssl, buf + msg_len - binders_len, buf + msg_len)); in mbedtls_ssl_write_client_hello()
965 ret = ssl->handshake->update_checksum(ssl, buf + msg_len - binders_len, in mbedtls_ssl_write_client_hello()
976 msg_len)); in mbedtls_ssl_write_client_hello()
Dssl_tls13_generic.c867 size_t buf_len, msg_len; in mbedtls_ssl_tls13_write_certificate() local
878 &msg_len)); in mbedtls_ssl_tls13_write_certificate()
882 msg_len)); in mbedtls_ssl_tls13_write_certificate()
885 ssl, buf_len, msg_len)); in mbedtls_ssl_tls13_write_certificate()
1072 size_t buf_len, msg_len; in mbedtls_ssl_tls13_write_certificate_verify() local
1081 ssl, buf, buf + buf_len, &msg_len)); in mbedtls_ssl_tls13_write_certificate_verify()
1085 msg_len)); in mbedtls_ssl_tls13_write_certificate_verify()
1088 ssl, buf_len, msg_len)); in mbedtls_ssl_tls13_write_certificate_verify()
1250 size_t buf_len, msg_len; in mbedtls_ssl_tls13_write_finished_message() local
1260 ssl, buf, buf + buf_len, &msg_len)); in mbedtls_ssl_tls13_write_finished_message()
[all …]
/third_party/toybox/toys/pending/
Dtraceroute.c66 unsigned msg_len;
127 send_icmp4->icmp_cksum = in_cksum((uint16_t *) send_icmp4, TT.msg_len); in send_probe4()
135 len = TT.msg_len; in send_probe4()
156 if (sendto(TT.snd_sock, out, TT.msg_len, 0, in send_probe6()
504 TT.msg_len = pack_size = ICMP_HD_SIZE4; //udp payload is also 8bytes in traceroute_main()
506 TT.msg_len = atolx_range(toys.optargs[1], pack_size, 32768);//max packet size in traceroute_main()
558 if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len, in traceroute_main()
559 sizeof(TT.msg_len)) < 0) perror_exit("SO_SNDBUF failed "); in traceroute_main()
575 TT.packet = xzalloc(TT.msg_len); in traceroute_main()
631 xprintf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len); in traceroute_main()
/third_party/ltp/testcases/kernel/syscalls/ipc/msgrcv/
Dmsgrcv07.c82 int msg_len; in test_msg_noerror() local
86 msg_len = sizeof(MSG1) / 2; in test_msg_noerror()
89 TEST(msgrcv(queue_id, &rcv_buf, msg_len, MSGTYPE1, MSG_NOERROR)); in test_msg_noerror()
97 if (strncmp(rcv_buf.mtext, MSG1, msg_len) == 0 && rcv_buf.type == MSGTYPE1) in test_msg_noerror()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_gtc.c55 size_t msg_len; in eap_gtc_buildReq() local
59 msg_len = os_strlen(msg); in eap_gtc_buildReq()
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq()
69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_gtc.c55 size_t msg_len; in eap_gtc_buildReq() local
59 msg_len = os_strlen(msg); in eap_gtc_buildReq()
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq()
69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dpreauth_test.c46 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument
50 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol()
51 hdr = os_malloc(*msg_len); in wpa_alloc_eapol()
73 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument
75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()

123456