Home
last modified time | relevance | path

Searched refs:msg_len (Results 1 – 25 of 62) sorted by relevance

123

/external/boringssl/src/ssl/
Dd1_both.c214 size_t msg_len = frag->msg_header.msg_len; in dtls1_hm_fragment_mark() local
216 if (frag->reassembly == NULL || start > end || end > msg_len) { in dtls1_hm_fragment_mark()
221 assert(msg_len > 0); in dtls1_hm_fragment_mark()
236 for (i = 0; i < (msg_len >> 3); i++) { in dtls1_hm_fragment_mark()
241 if ((msg_len & 7) != 0 && in dtls1_hm_fragment_mark()
242 frag->reassembly[msg_len >> 3] != bit_range(0, msg_len & 7)) { in dtls1_hm_fragment_mark()
374 !CBB_add_u24(&cbb, ssl->d1->w_msg_hdr.msg_len) || in dtls1_do_handshake_write()
460 frag = dtls1_hm_fragment_new(msg_hdr->msg_len, in dtls1_get_buffered_message()
479 frag->msg_header.msg_len != msg_hdr->msg_len) { in dtls1_get_buffered_message()
525 const size_t msg_len = msg_hdr.msg_len; in dtls1_process_fragment() local
[all …]
/external/openssh/
Dmsg.c69 u_int msg_len; in ssh_msg_recv() local
79 msg_len = get_u32(buf); in ssh_msg_recv()
80 if (msg_len > 256 * 1024) { in ssh_msg_recv()
81 error("ssh_msg_recv: read: bad msg_len %u", msg_len); in ssh_msg_recv()
85 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv()
89 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
Dssh-pkcs11-helper.c213 u_int msg_len; in process() local
223 msg_len = get_u32(cp); in process()
224 if (msg_len > MAX_MSG_LENGTH) { in process()
225 error("bad message len %d", msg_len); in process()
228 if (buf_len < msg_len + 4) in process()
256 if (msg_len < consumed) { in process()
257 error("msg_len %d < consumed %d", msg_len, consumed); in process()
260 if (msg_len > consumed) in process()
261 buffer_consume(&iqueue, msg_len - consumed); in process()
Dumac.c783 UINT32 msg_len; /* Total length of data passed */ member
939 pc->msg_len = 0; in uhash_reset()
1056 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update()
1058 ctx->msg_len += len; in uhash_update()
1061 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update()
1062 if (ctx->msg_len == L1_KEY_LEN) in uhash_update()
1074 ctx->msg_len += bytes_remaining; in uhash_update()
1084 ctx->msg_len += L1_KEY_LEN; in uhash_update()
1094 ctx->msg_len += len; in uhash_update()
1109 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final()
[all …]
Dmonitor_wrap.c151 u_int msg_len; in mm_request_receive() local
160 msg_len = get_u32(buf); in mm_request_receive()
161 if (msg_len > 256 * 1024) in mm_request_receive()
162 fatal("%s: read: bad msg_len %d", __func__, msg_len); in mm_request_receive()
164 buffer_append_space(m, msg_len); in mm_request_receive()
165 if (atomicio(read, sock, buffer_ptr(m), msg_len) != msg_len) in mm_request_receive()
/external/tcpdump/
Dprint-olsr.c93 uint8_t msg_len[2]; member
103 uint8_t msg_len[2]; member
273 u_int msg_type, msg_len, msg_tlen, hello_len; in olsr_print() local
319 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len); in olsr_print()
320 if ((msg_len >= sizeof (struct olsr_msg6)) in olsr_print()
321 && (msg_len <= length)) in olsr_print()
325 if (msg_type == 0 || msg_len == 0) { in olsr_print()
337 msg_len, (msg_len_valid == 0) ? " (invalid)" : "")); in olsr_print()
342 msg_tlen = msg_len - sizeof(struct olsr_msg6); in olsr_print()
350 msg_len = EXTRACT_16BITS(msgptr.v4->msg_len); in olsr_print()
[all …]
Dprint-ldp.c568 u_short pdu_len,msg_len,msg_type,msg_tlen; in ldp_pdu_print() local
614 msg_len=EXTRACT_16BITS(ldp_msg_header->length); in ldp_pdu_print()
617 if (msg_len < sizeof(struct ldp_msg_header)-4) { in ldp_pdu_print()
625 msg_len, in ldp_pdu_print()
636 msg_len, in ldp_pdu_print()
641 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ in ldp_pdu_print()
644 ND_TCHECK2(*tptr, msg_len); in ldp_pdu_print()
683 msg_len); in ldp_pdu_print()
685 tptr += msg_len+4; in ldp_pdu_print()
686 tlen -= msg_len+4; in ldp_pdu_print()
/external/boringssl/src/crypto/cmac/
Dcmac_test.cc32 const uint8_t *msg, size_t msg_len, const uint8_t *expected) { in test() argument
35 if (!AES_CMAC(out, key, key_len, msg, msg_len)) { in test()
52 for (unsigned chunk_size = 1; chunk_size <= msg_len; chunk_size++) { in test()
59 while (done < msg_len) { in test()
60 size_t todo = std::min(msg_len - done, static_cast<size_t>(chunk_size)); in test()
/external/libchrome/sandbox/linux/syscall_broker/
Dbroker_host.cc181 const ssize_t msg_len = base::UnixDomainSocket::RecvMsg( in HandleRequest() local
184 if (msg_len == 0 || (msg_len == -1 && errno == ECONNRESET)) { in HandleRequest()
191 if (msg_len < 0 || fds.size() != 1 || fds[0].get() < 0) { in HandleRequest()
198 base::Pickle pickle(buf, msg_len); in HandleRequest()
Dbroker_client.cc84 ssize_t msg_len = base::UnixDomainSocket::SendRecvMsgWithFlags( in PathAndFlagsSyscall() local
87 if (msg_len <= 0) { in PathAndFlagsSyscall()
93 base::Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); in PathAndFlagsSyscall()
/external/srtp/crypto/test/
Dauth_driver.c74 auth_bits_per_second(auth_t *h, int msg_len);
171 int msg_len = (msg_len_octets + 1)/2; in auth_bits_per_second() local
178 for (i=0; i < msg_len; i++) in auth_bits_per_second()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_gtc.c55 size_t msg_len; in eap_gtc_buildReq() local
59 msg_len = os_strlen(msg); in eap_gtc_buildReq()
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq()
69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
/external/wpa_supplicant_8/wpa_supplicant/
Dpreauth_test.c46 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument
50 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol()
51 hdr = os_malloc(*msg_len); in wpa_alloc_eapol()
73 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument
75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
/external/toybox/toys/pending/
Dtraceroute.c66 unsigned msg_len;
127 send_icmp4->icmp_cksum = in_cksum((uint16_t *) send_icmp4, TT.msg_len); in send_probe4()
135 len = TT.msg_len; in send_probe4()
156 if (sendto(TT.snd_sock, out, TT.msg_len, 0, in send_probe6()
505 TT.msg_len = pack_size = ICMP_HD_SIZE4; //udp payload is also 8bytes in traceroute_main()
507 TT.msg_len = atolx_range(toys.optargs[1], pack_size, 32768);//max packet size in traceroute_main()
559 if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len, in traceroute_main()
560 sizeof(TT.msg_len)) < 0) perror_exit("SO_SNDBUF failed "); in traceroute_main()
576 TT.packet = xzalloc(TT.msg_len); in traceroute_main()
638 xprintf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len); in traceroute_main()
/external/chromium-trace/catapult/third_party/typ/typ/
Dprinter.py30 msg_len = len(msg)
31 if elide and self.cols and msg_len > self.cols - 5:
/external/libnfc-nci/src/nfa/hci/
Dnfa_hci_main.c732 nfa_hci_cb.msg_len = 0; in nfa_hci_conn_cback()
768 pkt_len = nfa_hci_cb.msg_len; in nfa_hci_conn_cback()
1088 if ((nfa_hci_cb.msg_len + data_len) > nfa_hci_cb.max_msg_len) in nfa_hci_assemble_msg()
1091 …memcpy (&nfa_hci_cb.p_msg_data[nfa_hci_cb.msg_len], p_data, (nfa_hci_cb.max_msg_len - nfa_hci_cb.m… in nfa_hci_assemble_msg()
1092 nfa_hci_cb.msg_len = nfa_hci_cb.max_msg_len; in nfa_hci_assemble_msg()
1095 …cient buffer to Reassemble HCP packet! Dropping :%u bytes", ((nfa_hci_cb.msg_len + data_len) - nfa… in nfa_hci_assemble_msg()
1099 memcpy (&nfa_hci_cb.p_msg_data[nfa_hci_cb.msg_len], p_data, data_len); in nfa_hci_assemble_msg()
1100 nfa_hci_cb.msg_len += data_len; in nfa_hci_assemble_msg()
Dnfa_hci_utils.c316 tNFA_STATUS nfa_hciu_send_msg (UINT8 pipe_id, UINT8 type, UINT8 instruction, UINT16 msg_len, UINT8 … in nfa_hciu_send_msg() argument
329 … pipe_id, nfa_hciu_get_type_inst_names (pipe_id, type, instruction, buff), msg_len); in nfa_hciu_send_msg()
332 pipe_id, type, instruction, msg_len); in nfa_hciu_send_msg()
338 while ((first_pkt == TRUE) || (msg_len != 0)) in nfa_hciu_send_msg()
350 if (msg_len > data_len) in nfa_hciu_send_msg()
356 data_len = msg_len; in nfa_hciu_send_msg()
375 msg_len -= data_len; in nfa_hciu_send_msg()
376 if (msg_len > 0) in nfa_hciu_send_msg()
/external/kernel-headers/original/uapi/linux/
Dtipc_config.h395 int msg_len; in TCM_SET() local
397 msg_len = TCM_LENGTH(data_len); in TCM_SET()
399 tcm_hdr->tcm_len = htonl(msg_len); in TCM_SET()
/external/boringssl/src/crypto/rsa/
Drsa.c384 size_t msg_len) { in RSA_add_pkcs1_prefix() argument
389 if (msg_len != SSL_SIG_LENGTH) { in RSA_add_pkcs1_prefix()
411 signed_msg_len = prefix_len + msg_len; in RSA_add_pkcs1_prefix()
424 memcpy(signed_msg + prefix_len, msg, msg_len); in RSA_add_pkcs1_prefix()
474 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, in RSA_verify() argument
484 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa); in RSA_verify()
492 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) { in RSA_verify()
509 &signed_msg_is_alloced, hash_nid, msg, msg_len)) { in RSA_verify()
Dpadding.c245 const unsigned msg_len = from_len - zero_index; in RSA_padding_check_PKCS1_type_2() local
246 if (msg_len > to_len) { in RSA_padding_check_PKCS1_type_2()
253 if (msg_len > INT_MAX) { in RSA_padding_check_PKCS1_type_2()
258 memcpy(to, &from[zero_index], msg_len); in RSA_padding_check_PKCS1_type_2()
259 return (int)msg_len; in RSA_padding_check_PKCS1_type_2()
/external/libpcap/
Dpcap-netfilter-linux.c111 u_int32_t msg_len; in netfilter_read_linux() local
204 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); in netfilter_read_linux()
205 if (msg_len > len) in netfilter_read_linux()
206 msg_len = len; in netfilter_read_linux()
208 len -= msg_len; in netfilter_read_linux()
209 buf += msg_len; in netfilter_read_linux()
/external/strace/
Dnet.c633 uint32_t /* unsigned */ msg_len; member
639 unsigned msg_len; member
686 mmsg->msg_len = mmsg32.msg_len; in extractmmsghdr()
718 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len) in printmmsghdr() argument
724 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len); in printmmsghdr()
725 tprintf(", %u}", mmsg.msg_len); in printmmsghdr()
732 decode_mmsg(struct tcb *tcp, unsigned long msg_len) in decode_mmsg() argument
745 printmmsghdr(tcp, tcp->u_arg[1], i, msg_len); in decode_mmsg()
/external/wpa_supplicant_8/src/crypto/
Dcrypto_module_tests.c160 int msg_len; member
225 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || in test_omac1_vector()
231 if (tv->msg_len > 1) { in test_omac1_vector()
236 len[1] = tv->msg_len - 1; in test_omac1_vector()
247 len[0] = tv->msg_len - 2; in test_omac1_vector()
248 addr[1] = tv->msg + tv->msg_len - 2; in test_omac1_vector()
250 addr[2] = tv->msg + tv->msg_len - 1; in test_omac1_vector()
/external/libnfc-nci/src/nfc/include/
Drw_api.h159 UINT16 msg_len; /* Length of the NDEF message */ member
417 NFC_API extern tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg);
562 NFC_API extern tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg );
/external/libnfc-nci/src/nfc/tags/
Drw_t2t_ndef.c58 static tNFC_STATUS rw_t2t_write_ndef_first_block (UINT16 msg_len, BOOLEAN b_update_len);
59 static tNFC_STATUS rw_t2t_write_ndef_next_block (UINT16 block, UINT16 msg_len, BOOLEAN b_update_len…
300 evt_data.msg_len = p_t2t->prop_msg_len; in rw_t2t_ntf_tlv_detect_complete()
1157 tNFC_STATUS rw_t2t_write_ndef_first_block (UINT16 msg_len, BOOLEAN b_update_len) in rw_t2t_write_ndef_first_block() argument
1174 if (msg_len == 0) in rw_t2t_write_ndef_first_block()
1185 length_field[1] = (UINT8) (msg_len >> 8); in rw_t2t_write_ndef_first_block()
1186 length_field[2] = (UINT8) (msg_len); in rw_t2t_write_ndef_first_block()
1192 length_field[0] = (UINT8) (msg_len); in rw_t2t_write_ndef_first_block()
1263 tNFC_STATUS rw_t2t_write_ndef_next_block (UINT16 block, UINT16 msg_len, BOOLEAN b_update_len) in rw_t2t_write_ndef_next_block() argument
1311 if (msg_len == 0) in rw_t2t_write_ndef_next_block()
[all …]

123