/third_party/openssl/ssl/statem/ |
D | statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 129 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write() 288 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 291 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 335 size_t msg_len; in dtls_get_message() local 367 msg_len = msg_hdr->msg_len; in dtls_get_message() 371 l2n3(msg_len, p); in dtls_get_message() [all …]
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 125 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write() 284 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 287 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 331 size_t msg_len; in dtls_get_message() local 363 msg_len = msg_hdr->msg_len; in dtls_get_message() 367 l2n3(msg_len, p); in dtls_get_message() [all …]
|
/third_party/ltp/utils/sctp/func_tests/ |
D | test_fragments.c | 94 int msg_len, msg_cnt, i; in main() local 164 msg_len = 10; in main() 167 outmessage.msg_iov->iov_len = msg_len; in main() 168 test_sendmsg(sk1, &outmessage, 0, msg_len); in main() 203 test_check_msg_data(&inmessage, error, msg_len, MSG_EOR, stream, ppid); in main() 229 msg_len = 100000; in main() 230 msg_buf = test_build_msg(msg_len); in main() 232 outmessage.msg_iov->iov_len = msg_len; in main() 252 msg_len = msg_sizes[i]; in main() 253 msg_buf = test_build_msg(msg_len); in main() [all …]
|
/third_party/openssl/crypto/sm2/ |
D | sm2_crypt.c | 89 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() argument 101 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in ossl_sm2_ciphertext_size() 110 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument 201 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt() 208 if (!ossl_ecdh_kdf_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in ossl_sm2_encrypt() 214 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt() 224 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt() 241 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in ossl_sm2_encrypt() 290 int msg_len = 0; in ossl_sm2_decrypt() local 314 msg_len = sm2_ctext->C2->length; in ossl_sm2_decrypt() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/sm2/ |
D | sm2_crypt.c | 89 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() argument 101 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in ossl_sm2_ciphertext_size() 110 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument 201 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt() 208 if (!ossl_ecdh_kdf_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in ossl_sm2_encrypt() 214 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt() 224 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt() 241 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in ossl_sm2_encrypt() 290 int msg_len = 0; in ossl_sm2_decrypt() local 314 msg_len = sm2_ctext->C2->length; in ossl_sm2_decrypt() [all …]
|
/third_party/openssl/test/ |
D | sm2_internal_test.c | 140 const size_t msg_len = strlen(message); in test_sm2_crypt() local 149 size_t recovered_len = msg_len; in test_sm2_crypt() 166 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, in test_sm2_crypt() 176 (const uint8_t *)message, msg_len, in test_sm2_crypt() 187 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt() 194 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt() 195 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt() 310 const size_t msg_len = strlen(message); in test_sm2_sign() local 338 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 354 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
|
/third_party/ltp/include/ |
D | tst_safe_net.h | 42 #define SAFE_SENDMSG(msg_len, fd, msg, flags) \ argument 43 safe_sendmsg(__FILE__, __LINE__, msg_len, fd, msg, flags) 45 #define SAFE_RECV(msg_len, fd, buf, size, flags) \ argument 46 safe_recv(__FILE__, __LINE__, (msg_len), (fd), (buf), (size), (flags)) 48 #define SAFE_RECVMSG(msg_len, fd, msg, flags) \ argument 49 safe_recvmsg(__FILE__, __LINE__, msg_len, fd, msg, flags)
|
D | tst_safe_posix_ipc.h | 22 #define SAFE_MQ_SEND(mqdes, msg_ptr, msg_len, msg_prio) \ argument 23 safe_mq_send(__FILE__, __LINE__, (mqdes), (msg_ptr), (msg_len), (msg_prio)) 116 size_t msg_len, unsigned int msg_prio) in safe_mq_send() argument 120 rval = mq_send(mqdes, msg_ptr, msg_len, msg_prio); in safe_mq_send() 125 msg_len, msg_prio); in safe_mq_send()
|
D | tst_timer.h | 275 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in libc_mq_timedsend() argument 277 return mq_timedsend(mqdes, msg_ptr, msg_len, msg_prio, abs_timeout); in libc_mq_timedsend() 281 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in sys_mq_timedsend() argument 283 return tst_syscall(__NR_mq_timedsend, mqdes, msg_ptr, msg_len, msg_prio, in sys_mq_timedsend() 288 size_t msg_len, unsigned int msg_prio, void *abs_timeout) in sys_mq_timedsend64() argument 290 return tst_syscall(__NR_mq_timedsend_time64, mqdes, msg_ptr, msg_len, in sys_mq_timedsend64() 295 size_t msg_len, unsigned int *msg_prio, void *abs_timeout) in libc_mq_timedreceive() argument 297 return mq_timedreceive(mqdes, msg_ptr, msg_len, msg_prio, abs_timeout); in libc_mq_timedreceive() 301 size_t msg_len, unsigned int *msg_prio, void *abs_timeout) in sys_mq_timedreceive() argument 303 return tst_syscall(__NR_mq_timedreceive, mqdes, msg_ptr, msg_len, in sys_mq_timedreceive() [all …]
|
/third_party/openssl/ohos_lite/include/crypto/ |
D | sm2.h | 36 const uint8_t *msg, size_t msg_len); 43 const uint8_t *msg, size_t msg_len); 60 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 68 size_t msg_len,
|
/third_party/openssl/include/crypto/ |
D | sm2.h | 41 const uint8_t *msg, size_t msg_len); 48 const uint8_t *msg, size_t msg_len); 68 size_t msg_len, size_t *ct_size); 75 const uint8_t *msg, size_t msg_len,
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
D | sm2.h | 41 const uint8_t *msg, size_t msg_len); 48 const uint8_t *msg, size_t msg_len); 68 size_t msg_len, size_t *ct_size); 75 const uint8_t *msg, size_t msg_len,
|
/third_party/ltp/utils/sctp/testlib/ |
D | sctputil.c | 96 test_print_message(int sk LTP_ATTRIBUTE_UNUSED, struct msghdr *msg, size_t msg_len) in test_print_message() argument 117 printf("DATA(%ld): ", msg_len); in test_print_message() 118 while ( msg_len > 0 ) { in test_print_message() 125 save = text[msg_len-1]; in test_print_message() 126 if ( len > msg_len ) { in test_print_message() 127 text[(len = msg_len) - 1] = '\0'; in test_print_message() 130 if ( (msg_len -= len) > 0 ) { index++; } in test_print_message() 137 text[msg_len-1] = save; in test_print_message()
|
/third_party/ltp/testcases/open_posix_testsuite/conformance/definitions/mqueue_h/ |
D | 7-1-buildonly.c | 14 size_t msg_len; in test_mq_send_prototype() local 20 msg_len = 0; in test_mq_send_prototype() 23 err = mq_receive(mqdes, msgp, msg_len, &msg_prio); in test_mq_send_prototype()
|
D | 6-1-buildonly.c | 15 size_t msg_len; in test_mq_receive_prototype() local 20 msg_len = 0; in test_mq_receive_prototype() 23 msg_size = mq_receive(mqdes, msgp, msg_len, &msg_prio); in test_mq_receive_prototype()
|
D | 10-1-buildonly.c | 17 size_t msg_len; in test_mq_timedsend_prototype() local 22 msg_len = 0; in test_mq_timedsend_prototype() 25 err = mq_timedsend(mqdes, msgp, msg_len, msg_prio, &timeout); in test_mq_timedsend_prototype()
|
D | 9-1-buildonly.c | 15 size_t msg_len; in test_mq_timedreceive_prototype() local 21 msg_len = 0; in test_mq_timedreceive_prototype() 24 size = mq_timedreceive(mqdes, msgp, msg_len, &msg_prio, &abstime); in test_mq_timedreceive_prototype()
|
/third_party/mesa3d/src/gallium/winsys/svga/drm/ |
D | vmw_msg.c | 370 size_t msg_len = strlen(msg); in vmw_send_msg() local 382 msg_len, si, di, in vmw_send_msg() 400 msg_len, si, di, in vmw_send_msg() 431 int msg_len; in vmw_svga_winsys_host_log() local 437 msg_len = strlen(log) + strlen("log ") + 1; in vmw_svga_winsys_host_log() 438 msg = CALLOC(1, msg_len); in vmw_svga_winsys_host_log()
|
/third_party/mbedtls/library/ |
D | ssl_client.c | 904 size_t buf_len, msg_len, binders_len; in mbedtls_ssl_write_client_hello() local 916 &msg_len, in mbedtls_ssl_write_client_hello() 921 ssl->out_msglen = msg_len + 4; in mbedtls_ssl_write_client_hello() 950 msg_len); in mbedtls_ssl_write_client_hello() 955 ret = ssl->handshake->update_checksum(ssl, buf, msg_len - binders_len); in mbedtls_ssl_write_client_hello() 964 ssl, buf + msg_len - binders_len, buf + msg_len)); in mbedtls_ssl_write_client_hello() 965 ret = ssl->handshake->update_checksum(ssl, buf + msg_len - binders_len, in mbedtls_ssl_write_client_hello() 976 msg_len)); in mbedtls_ssl_write_client_hello()
|
D | ssl_tls13_generic.c | 867 size_t buf_len, msg_len; in mbedtls_ssl_tls13_write_certificate() local 878 &msg_len)); in mbedtls_ssl_tls13_write_certificate() 882 msg_len)); in mbedtls_ssl_tls13_write_certificate() 885 ssl, buf_len, msg_len)); in mbedtls_ssl_tls13_write_certificate() 1072 size_t buf_len, msg_len; in mbedtls_ssl_tls13_write_certificate_verify() local 1081 ssl, buf, buf + buf_len, &msg_len)); in mbedtls_ssl_tls13_write_certificate_verify() 1085 msg_len)); in mbedtls_ssl_tls13_write_certificate_verify() 1088 ssl, buf_len, msg_len)); in mbedtls_ssl_tls13_write_certificate_verify() 1250 size_t buf_len, msg_len; in mbedtls_ssl_tls13_write_finished_message() local 1260 ssl, buf, buf + buf_len, &msg_len)); in mbedtls_ssl_tls13_write_finished_message() [all …]
|
/third_party/toybox/toys/pending/ |
D | traceroute.c | 66 unsigned msg_len; 127 send_icmp4->icmp_cksum = in_cksum((uint16_t *) send_icmp4, TT.msg_len); in send_probe4() 135 len = TT.msg_len; in send_probe4() 156 if (sendto(TT.snd_sock, out, TT.msg_len, 0, in send_probe6() 504 TT.msg_len = pack_size = ICMP_HD_SIZE4; //udp payload is also 8bytes in traceroute_main() 506 TT.msg_len = atolx_range(toys.optargs[1], pack_size, 32768);//max packet size in traceroute_main() 558 if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len, in traceroute_main() 559 sizeof(TT.msg_len)) < 0) perror_exit("SO_SNDBUF failed "); in traceroute_main() 575 TT.packet = xzalloc(TT.msg_len); in traceroute_main() 631 xprintf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len); in traceroute_main()
|
/third_party/ltp/testcases/kernel/syscalls/ipc/msgrcv/ |
D | msgrcv07.c | 82 int msg_len; in test_msg_noerror() local 86 msg_len = sizeof(MSG1) / 2; in test_msg_noerror() 89 TEST(msgrcv(queue_id, &rcv_buf, msg_len, MSGTYPE1, MSG_NOERROR)); in test_msg_noerror() 97 if (strncmp(rcv_buf.mtext, MSG1, msg_len) == 0 && rcv_buf.type == MSGTYPE1) in test_msg_noerror()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | preauth_test.c | 46 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 50 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 51 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 73 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|