/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 129 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write() 288 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 291 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 335 size_t msg_len; in dtls_get_message() local 368 msg_len = msg_hdr->msg_len; in dtls_get_message() 372 l2n3(msg_len, p); in dtls_get_message() [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 37 … if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 125 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write() 284 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 287 l2n3(msg_hdr->msg_len, p); in dtls1_do_write() 331 size_t msg_len; in dtls_get_message() local 363 msg_len = msg_hdr->msg_len; in dtls_get_message() 367 l2n3(msg_len, p); in dtls_get_message() [all …]
|
/netbsd-src/crypto/external/bsd/openssh/dist/ |
H A D | msg.c | 73 u_int msg_len; in ssh_msg_recv() local 83 msg_len = get_u32(buf); in ssh_msg_recv() 84 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv() 85 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv() 89 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv() 93 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
|
H A D | umac.c | 802 UINT32 msg_len; /* Total length of data passed */ member 958 pc->msg_len = 0; in uhash_reset() 1076 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update() 1078 ctx->msg_len += len; in uhash_update() 1081 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update() 1082 if (ctx->msg_len == L1_KEY_LEN) in uhash_update() 1094 ctx->msg_len += bytes_remaining; in uhash_update() 1104 ctx->msg_len += L1_KEY_LEN; in uhash_update() 1114 ctx->msg_len += len; in uhash_update() 1129 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final() [all …]
|
/netbsd-src/external/gpl3/gcc.old/dist/libgfortran/intrinsics/ |
H A D | gerror.c | 40 PREFIX(gerror) (char * msg, gfc_charlen_type msg_len) in PREFIX() 45 p = gf_strerror (errno, msg, msg_len); in PREFIX() 51 if (msg_len < p_len) in PREFIX() 52 p_len = msg_len; in PREFIX() 55 if (msg_len > p_len) in PREFIX() 56 memset (&msg[p_len], ' ', msg_len - p_len); in PREFIX()
|
/netbsd-src/external/gpl3/gcc/dist/libgfortran/intrinsics/ |
H A D | gerror.c | 40 PREFIX(gerror) (char * msg, gfc_charlen_type msg_len) in PREFIX() 45 p = gf_strerror (errno, msg, msg_len); in PREFIX() 51 if (msg_len < p_len) in PREFIX() 52 p_len = msg_len; in PREFIX() 55 if (msg_len > p_len) in PREFIX() 56 memset (&msg[p_len], ' ', msg_len - p_len); in PREFIX()
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/sm2/ |
H A D | sm2_crypt.c | 101 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() argument 113 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in ossl_sm2_ciphertext_size() 122 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument 194 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt() 221 if (!ossl_ecdh_kdf_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in ossl_sm2_encrypt() 227 if (is_all_zeros(msg_mask, msg_len)) { in ossl_sm2_encrypt() 232 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt() 242 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt() 259 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in ossl_sm2_encrypt() 308 int msg_len = 0; in ossl_sm2_decrypt() local [all …]
|
H A D | sm2_sign.c | 152 const uint8_t *msg, size_t msg_len) in sm2_compute_msg_hash() argument 186 || !EVP_DigestUpdate(hash, msg, msg_len) in sm2_compute_msg_hash() 402 const uint8_t *msg, size_t msg_len) in ossl_sm2_do_sign() argument 407 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign() 425 const uint8_t *msg, size_t msg_len) in ossl_sm2_do_verify() argument 430 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_verify()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/sm2/ |
H A D | sm2_crypt.c | 81 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, in sm2_ciphertext_size() argument 94 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in sm2_ciphertext_size() 104 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) in sm2_encrypt() argument 191 msg_mask = OPENSSL_zalloc(msg_len); in sm2_encrypt() 198 if (!ecdh_KDF_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in sm2_encrypt() 204 for (i = 0; i != msg_len; ++i) in sm2_encrypt() 209 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in sm2_encrypt() 226 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in sm2_encrypt() 274 int msg_len = 0; in sm2_decrypt() local 296 msg_len = sm2_ctext->C2->length; in sm2_decrypt() [all …]
|
H A D | sm2_sign.c | 143 const uint8_t *msg, size_t msg_len) in sm2_compute_msg_hash() argument 168 || !EVP_DigestUpdate(hash, msg, msg_len) in sm2_compute_msg_hash() 368 const uint8_t *msg, size_t msg_len) in sm2_do_sign() argument 373 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in sm2_do_sign() 391 const uint8_t *msg, size_t msg_len) in sm2_do_verify() argument 396 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in sm2_do_verify()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
H A D | sm2_internal_test.c | 144 const size_t msg_len = strlen(message); in test_sm2_crypt() local 153 size_t recovered_len = msg_len; in test_sm2_crypt() 170 || !TEST_true(sm2_ciphertext_size(key, digest, msg_len, &ctext_len))) in test_sm2_crypt() 178 if (!TEST_true(sm2_encrypt(key, digest, (const uint8_t *)message, msg_len, in test_sm2_crypt() 189 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt() 195 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt() 196 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt() 311 const size_t msg_len = strlen(message); in test_sm2_sign() local 339 (const uint8_t *)message, msg_len); in test_sm2_sign() 355 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | sm2_internal_test.c | 140 const size_t msg_len = strlen(message); in test_sm2_crypt() local 149 size_t recovered_len = msg_len; in test_sm2_crypt() 166 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, in test_sm2_crypt() 176 (const uint8_t *)message, msg_len, in test_sm2_crypt() 187 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt() 194 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt() 195 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt() 311 const size_t msg_len = strlen(message); in test_sm2_sign() local 341 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 357 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
|
/netbsd-src/sys/external/bsd/drm2/dist/drm/vmwgfx/ |
H A D | vmwgfx_msg.c | 157 unsigned long msg_len = strlen(msg); in vmw_port_hb_out() local 168 msg_len, si, di, in vmw_port_hb_out() 179 while (msg_len && (HIGH_WORD(ecx) & MESSAGE_STATUS_SUCCESS)) { in vmw_port_hb_out() 180 unsigned int bytes = min_t(size_t, msg_len, 4); in vmw_port_hb_out() 184 msg_len -= bytes; in vmw_port_hb_out() 268 size_t msg_len = strlen(msg); in vmw_send_msg() local 279 msg_len, si, di, in vmw_send_msg() 318 size_t *msg_len) in vmw_recv_msg() argument 326 *msg_len = 0; in vmw_recv_msg() 403 *msg_len = reply_len; in vmw_recv_msg()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
H A D | sm2.h | 36 const uint8_t *msg, size_t msg_len); 43 const uint8_t *msg, size_t msg_len); 60 int sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 68 size_t msg_len,
|
/netbsd-src/external/gpl3/gcc/dist/libphobos/libdruntime/core/sys/posix/ |
H A D | mqueue.d | 163 ssize_t mq_receive (mqd_t mqdes, char* msg_ptr, size_t msg_len, uint* msg_prio); 182 ssize_t mq_timedreceive (mqd_t mqdes, char* msg_ptr, size_t msg_len, 200 int mq_send (mqd_t mqdes, const(char)* msg_ptr, size_t msg_len, uint msg_prio); 220 int mq_timedsend (mqd_t mqdes, const(char)* msg_ptr, size_t msg_len,
|
/netbsd-src/crypto/external/bsd/openssl/dist/include/crypto/ |
H A D | sm2.h | 41 const uint8_t *msg, size_t msg_len); 48 const uint8_t *msg, size_t msg_len); 68 size_t msg_len, size_t *ct_size); 75 const uint8_t *msg, size_t msg_len,
|
/netbsd-src/sys/kern/ |
H A D | sys_mqueue.c | 233 msz = sizeof(struct mq_msg) + msg->msg_len; in mqueue_destroy() 630 mq_recv1(mqd_t mqdes, void *msg_ptr, size_t msg_len, u_int *msg_prio, in mq_recv1() argument 647 if (msg_len < mqattr->mq_msgsize) { in mq_recv1() 717 *mlen = msg->msg_len; in mq_recv1() 718 error = copyout(msg->msg_ptr, msg_ptr, msg->msg_len); in mq_recv1() 721 mqueue_freemsg(msg, sizeof(struct mq_msg) + msg->msg_len); in mq_recv1() 740 SCARG(uap, msg_len), SCARG(uap, msg_prio), NULL, &mlen); in sys_mq_receive() 773 SCARG(uap, msg_len), SCARG(uap, msg_prio), tsp, &mlen); in sys___mq_timedreceive50() 784 mq_send1(mqd_t mqdes, const char *msg_ptr, size_t msg_len, u_int msg_prio, in mq_send1() argument 800 if (msg_len > mq_max_msgsize) in mq_send1() [all …]
|
/netbsd-src/sys/compat/netbsd32/ |
H A D | netbsd32_mqueue.c | 234 SCARG(uap, msg_len), SCARG(uap, msg_prio), NULL); in netbsd32_mq_send() 251 SCARG(uap, msg_len), SCARG_P32(uap, msg_prio), NULL, &mlen); in netbsd32_mq_receive() 286 SCARG(uap, msg_len), SCARG(uap, msg_prio), tsp); in netbsd32___mq_timedsend50() 318 SCARG(uap, msg_len), SCARG_P32(uap, msg_prio), tsp, &mlen); in netbsd32___mq_timedreceive50() 356 SCARG(uap, msg_len), SCARG(uap, msg_prio), tsp); in compat_50_netbsd32_mq_timedsend() 389 SCARG(uap, msg_len), SCARG_P32(uap, msg_prio), tsp, &mlen); in compat_50_netbsd32_mq_timedreceive()
|
/netbsd-src/external/mpl/bind/dist/lib/isc/ |
H A D | picohttpparser.c | 474 int *status, const char **msg, size_t *msg_len, in parse_response() argument 501 if ((buf = get_token_to_eol(buf, buf_end, msg, msg_len, ret)) == NULL) { in parse_response() 504 if (*msg_len == 0) { in parse_response() 513 --*msg_len; in parse_response() 527 int *status, const char **msg, size_t *msg_len, in phr_parse_response() argument 537 *msg_len = 0; in phr_parse_response() 547 msg_len, headers, num_headers, max_headers, in phr_parse_response()
|
/netbsd-src/lib/libpthread/ |
H A D | pthread_cancelstub.c | 302 mq_send(mqd_t mqdes, const char *msg_ptr, size_t msg_len, unsigned msg_prio) in mq_send() argument 309 retval = _sys_mq_send(mqdes, msg_ptr, msg_len, msg_prio); in mq_send() 316 mq_receive(mqd_t mqdes, char *msg_ptr, size_t msg_len, unsigned *msg_prio) in mq_receive() argument 323 retval = _sys_mq_receive(mqdes, msg_ptr, msg_len, msg_prio); in mq_receive() 330 __mq_timedsend50(mqd_t mqdes, const char *msg_ptr, size_t msg_len, in __mq_timedsend50() argument 338 retval = _sys___mq_timedsend50(mqdes, msg_ptr, msg_len, msg_prio, abst); in __mq_timedsend50() 345 __mq_timedreceive50(mqd_t mqdes, char *msg_ptr, size_t msg_len, unsigned *msg_prio, in __mq_timedreceive50() argument 353 retval = _sys___mq_timedreceive50(mqdes, msg_ptr, msg_len, msg_prio, abst); in __mq_timedreceive50()
|
/netbsd-src/external/bsd/openldap/dist/contrib/slapd-modules/passwd/pbkdf2/ |
H A D | pw-pbkdf2.c | 117 int rc, msg_len; in pbkdf2_format() local 133 msg_len = asprintf(&msg->bv_val, "%s%d$%s$%s", in pbkdf2_format() 136 if(msg_len < 0){ in pbkdf2_format() 141 msg->bv_len = msg_len; in pbkdf2_format()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | EVP_SIGNATURE-ED25519.pod | 69 void do_sign(EVP_PKEY *ed_key, unsigned char *msg, size_t msg_len) 77 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len); 80 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
|
/netbsd-src/external/gpl2/lvm2/dist/daemons/clvmd/ |
H A D | clvmd-corosync.c | 71 size_t msg_len); 221 size_t msg_len) in corosync_cpg_deliver_callback() argument 228 our_nodeid, nodeid, target_nodeid, msg_len-4); in corosync_cpg_deliver_callback() 233 msg_len-COROSYNC_CSID_LEN, (char*)&nodeid); in corosync_cpg_deliver_callback()
|
/netbsd-src/usr.bin/gencat/ |
H A D | gencat.c | 726 int32_t msg_len = strlen(msg->str) + 1; in MCWriteCat() local 729 msg_hdr->__msglen = htonl(msg_len); in MCWriteCat() 732 memcpy(strings, msg->str, msg_len); in MCWriteCat() 733 strings += msg_len; in MCWriteCat() 734 msg_offset += msg_len; in MCWriteCat()
|
/netbsd-src/external/bsd/unbound/dist/libunbound/ |
H A D | context.c | 362 q->msg_len = 0; in context_deserialize_answer() 369 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer() 371 q->msg_len); in context_deserialize_answer() 374 q->msg_len = 0; in context_deserialize_answer()
|