Home
last modified time | relevance | path

Searched refs:msg_len (Results 1 – 25 of 49) sorted by relevance

12

/dflybsd-src/crypto/libressl/ssl/
H A Dd1_both.c130 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument
143 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument
145 OPENSSL_assert((msg_len) > 0); \
147 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
148 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
242 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH); in dtls1_do_write()
332 0, msg_hdr->msg_len, p)) in dtls1_do_write()
376 unsigned long msg_len; in dtls1_get_message() local
407 msg_len = msg_hdr->msg_len; in dtls1_get_message()
410 if (!dtls1_write_message_header(msg_hdr, 0, msg_len, p)) in dtls1_get_message()
[all …]
H A Dtls13_handshake_msg.c27 uint32_t msg_len; member
126 uint32_t msg_len; in tls13_handshake_msg_recv() local
144 if (!CBS_get_u24(&cbs, &msg_len)) in tls13_handshake_msg_recv()
148 if (msg_len > TLS13_HANDSHAKE_MSG_MAX_LEN) in tls13_handshake_msg_recv()
152 msg->msg_len = msg_len; in tls13_handshake_msg_recv()
156 TLS13_HANDSHAKE_MSG_HEADER_LEN + msg->msg_len, in tls13_handshake_msg_recv()
/dflybsd-src/crypto/openssh/
H A Dmsg.c70 u_int msg_len; in ssh_msg_recv() local
80 msg_len = get_u32(buf); in ssh_msg_recv()
81 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv()
82 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv()
86 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv()
90 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
H A Dssh-pkcs11-helper.c256 u_int msg_len; in process() local
267 msg_len = get_u32(cp); in process()
268 if (msg_len > MAX_MSG_LENGTH) { in process()
269 error("bad message len %d", msg_len); in process()
272 if (buf_len < msg_len + 4) in process()
301 if (msg_len < consumed) { in process()
302 error("msg_len %d < consumed %d", msg_len, consumed); in process()
305 if (msg_len > consumed) { in process()
306 if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
H A Dumac.c782 UINT32 msg_len; /* Total length of data passed */ member
938 pc->msg_len = 0; in uhash_reset()
1056 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update()
1058 ctx->msg_len += len; in uhash_update()
1061 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update()
1062 if (ctx->msg_len == L1_KEY_LEN) in uhash_update()
1074 ctx->msg_len += bytes_remaining; in uhash_update()
1084 ctx->msg_len += L1_KEY_LEN; in uhash_update()
1094 ctx->msg_len += len; in uhash_update()
1109 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final()
[all …]
H A Dmonitor_wrap.c182 u_int msg_len; in mm_request_receive() local
195 msg_len = PEEK_U32(buf); in mm_request_receive()
196 if (msg_len > 256 * 1024) in mm_request_receive()
197 fatal_f("read: bad msg_len %d", msg_len); in mm_request_receive()
199 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) in mm_request_receive()
201 if (atomicio(read, sock, p, msg_len) != msg_len) { in mm_request_receive()
/dflybsd-src/contrib/tcpdump/
H A Dprint-olsr.c94 nd_uint16_t msg_len; member
104 nd_uint16_t msg_len; member
322 u_int msg_type, msg_len, msg_tlen, hello_len; in olsr_print() local
369 msg_len = GET_BE_U_2(msgptr.v6->msg_len); in olsr_print()
370 if ((msg_len >= sizeof (struct olsr_msg6)) in olsr_print()
371 && (msg_len <= length)) in olsr_print()
375 if (msg_type == 0 || msg_len == 0) { in olsr_print()
387 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); in olsr_print()
392 msg_tlen = msg_len - sizeof(struct olsr_msg6); in olsr_print()
400 msg_len = GET_BE_U_2(msgptr.v4->msg_len); in olsr_print()
[all …]
H A Dprint-ldp.c576 u_short pdu_len,msg_len,msg_type; in ldp_pdu_print() local
623 msg_len=GET_BE_U_2(ldp_msg_header->length); in ldp_pdu_print()
626 if (msg_len < sizeof(struct ldp_msg_header)-4) { in ldp_pdu_print()
634 msg_len, in ldp_pdu_print()
645 msg_len, in ldp_pdu_print()
650 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ in ldp_pdu_print()
653 ND_TCHECK_LEN(tptr, msg_len); in ldp_pdu_print()
692 msg_len); in ldp_pdu_print()
694 tptr += msg_len+4; in ldp_pdu_print()
695 tlen -= msg_len+4; in ldp_pdu_print()
H A Dprint-ptp.c346 uint16_t msg_len, flags, port_id, seq_id; in ptp_print_2() local
358 len -= 2; bp += 2; msg_len = GET_BE_U_2(bp); ND_PRINT(", length : %u", msg_len); in ptp_print_2()
/dflybsd-src/sys/kern/
H A Dsys_mqueue.c144 msz = sizeof(struct mq_msg) + msg->msg_len; in mqueue_destroy()
624 mq_receive1(struct lwp *l, mqd_t mqdes, void *msg_ptr, size_t msg_len, in mq_receive1() argument
648 if (msg_len < mqattr->mq_msgsize) { in mq_receive1()
718 *mlen = msg->msg_len; in mq_receive1()
719 error = copyout(msg->msg_ptr, msg_ptr, msg->msg_len); in mq_receive1()
722 mqueue_freemsg(msg, sizeof(struct mq_msg) + msg->msg_len); in mq_receive1()
740 uap->msg_len, uap->msg_prio, 0, &mlen); in sys_mq_receive()
772 uap->msg_len, uap->msg_prio, tsp, &mlen); in sys_mq_timedreceive()
783 mq_send1(struct lwp *l, mqd_t mqdes, const char *msg_ptr, size_t msg_len, in mq_send1() argument
800 size = sizeof(struct mq_msg) + msg_len; in mq_send1()
[all …]
/dflybsd-src/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; in eap_gtc_buildReq() local
59 msg_len = os_strlen(msg); in eap_gtc_buildReq()
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq()
69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
/dflybsd-src/contrib/wpa_supplicant/wpa_supplicant/
H A Dpreauth_test.c46 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument
50 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol()
51 hdr = os_malloc(*msg_len); in wpa_alloc_eapol()
73 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument
75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
H A Dwpas_glue.c63 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument
67 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol()
68 hdr = os_malloc(*msg_len); in wpa_alloc_eapol()
425 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument
427 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
/dflybsd-src/usr.bin/gencat/
H A Dgencat.c552 int msg_len = strlen(msg->str) + 1; local
555 msg_hdr->__msglen = htonl(msg_len);
558 memcpy(strings, msg->str, msg_len);
559 strings += msg_len;
560 msg_offset += msg_len;
/dflybsd-src/contrib/lvm2/dist/daemons/clvmd/
H A Dclvmd-corosync.c71 size_t msg_len);
221 size_t msg_len) in corosync_cpg_deliver_callback() argument
228 our_nodeid, nodeid, target_nodeid, msg_len-4); in corosync_cpg_deliver_callback()
233 msg_len-COROSYNC_CSID_LEN, (char*)&nodeid); in corosync_cpg_deliver_callback()
H A Dclvmd-openais.c71 size_t msg_len);
249 size_t msg_len) in openais_cpg_deliver_callback() argument
256 our_nodeid, nodeid, target_nodeid, msg_len-4); in openais_cpg_deliver_callback()
261 msg_len-OPENAIS_CSID_LEN, (char*)&nodeid); in openais_cpg_deliver_callback()
/dflybsd-src/lib/libalias/
H A Dalias_smedia.c328 u_short msg_id, msg_len; in alias_pna_out() local
338 memcpy(&msg_len, work, 2); in alias_pna_out()
362 work += ntohs(msg_len); in alias_pna_out()
/dflybsd-src/contrib/wpa_supplicant/src/crypto/
H A Dcrypto_module_tests.c165 int msg_len; member
230 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || in test_omac1_vector()
236 if (tv->msg_len > 1) { in test_omac1_vector()
241 len[1] = tv->msg_len - 1; in test_omac1_vector()
252 len[0] = tv->msg_len - 2; in test_omac1_vector()
253 addr[1] = tv->msg + tv->msg_len - 2; in test_omac1_vector()
255 addr[2] = tv->msg + tv->msg_len - 1; in test_omac1_vector()
/dflybsd-src/contrib/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c204 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() argument
212 len[0] = msg_len; in eap_sim_add_mac()
218 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); in eap_sim_add_mac()
398 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, in eap_sim_add_mac_sha256() argument
406 len[0] = msg_len; in eap_sim_add_mac_sha256()
412 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len); in eap_sim_add_mac_sha256()
H A Deap_sim_common.h88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
/dflybsd-src/contrib/gdb-7/gdb/cli/
H A Dcli-setshow.c340 int msg_len = 0; in do_set_command() local
343 msg_len += strlen (c->enums[i]) + 2; in do_set_command()
345 msg = xmalloc (msg_len); in do_set_command()
/dflybsd-src/contrib/wpa_supplicant/src/rsn_supp/
H A Dwpa_i.h240 size_t *msg_len, void **data_pos) in wpa_sm_alloc_eapol() argument
244 msg_len, data_pos); in wpa_sm_alloc_eapol()
415 u8 *msg, size_t msg_len, u8 *key_mic);
/dflybsd-src/sys/sys/
H A Dmqueue.h113 size_t msg_len; member
/dflybsd-src/contrib/wpa_supplicant/src/eap_peer/
H A Deap.c1466 size_t msg_len; in eap_sm_processIdentity() local
1473 &msg_len); in eap_sm_processIdentity()
1487 pos, msg_len); in eap_sm_processIdentity()
1705 size_t i, msg_len; in eap_sm_processNotify() local
1708 &msg_len); in eap_sm_processNotify()
1712 pos, msg_len); in eap_sm_processNotify()
1714 msg = os_malloc(msg_len + 1); in eap_sm_processNotify()
1717 for (i = 0; i < msg_len; i++) in eap_sm_processNotify()
1719 msg[msg_len] = '\0'; in eap_sm_processNotify()
2536 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len) in eap_sm_request_otp() argument
[all …]
/dflybsd-src/contrib/wpa_supplicant/src/radius/
H A Dradius.c680 size_t msg_len; in radius_msg_parse() local
688 msg_len = be_to_host16(hdr->length); in radius_msg_parse()
689 if (msg_len < sizeof(*hdr) || msg_len > len) { in radius_msg_parse()
694 if (msg_len < len) { in radius_msg_parse()
696 "RADIUS message", (unsigned long) len - msg_len); in radius_msg_parse()
703 msg->buf = wpabuf_alloc_copy(data, msg_len); in radius_msg_parse()

12