| /dflybsd-src/crypto/libressl/ssl/ |
| H A D | d1_both.c | 130 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 143 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 145 OPENSSL_assert((msg_len) > 0); \ 147 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 148 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 242 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH); in dtls1_do_write() 332 0, msg_hdr->msg_len, p)) in dtls1_do_write() 376 unsigned long msg_len; in dtls1_get_message() local 407 msg_len = msg_hdr->msg_len; in dtls1_get_message() 410 if (!dtls1_write_message_header(msg_hdr, 0, msg_len, p)) in dtls1_get_message() [all …]
|
| H A D | tls13_handshake_msg.c | 27 uint32_t msg_len; member 126 uint32_t msg_len; in tls13_handshake_msg_recv() local 144 if (!CBS_get_u24(&cbs, &msg_len)) in tls13_handshake_msg_recv() 148 if (msg_len > TLS13_HANDSHAKE_MSG_MAX_LEN) in tls13_handshake_msg_recv() 152 msg->msg_len = msg_len; in tls13_handshake_msg_recv() 156 TLS13_HANDSHAKE_MSG_HEADER_LEN + msg->msg_len, in tls13_handshake_msg_recv()
|
| /dflybsd-src/crypto/openssh/ |
| H A D | msg.c | 70 u_int msg_len; in ssh_msg_recv() local 80 msg_len = get_u32(buf); in ssh_msg_recv() 81 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv() 82 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv() 86 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv() 90 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
|
| H A D | ssh-pkcs11-helper.c | 256 u_int msg_len; in process() local 267 msg_len = get_u32(cp); in process() 268 if (msg_len > MAX_MSG_LENGTH) { in process() 269 error("bad message len %d", msg_len); in process() 272 if (buf_len < msg_len + 4) in process() 301 if (msg_len < consumed) { in process() 302 error("msg_len %d < consumed %d", msg_len, consumed); in process() 305 if (msg_len > consumed) { in process() 306 if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
|
| H A D | umac.c | 782 UINT32 msg_len; /* Total length of data passed */ member 938 pc->msg_len = 0; in uhash_reset() 1056 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update() 1058 ctx->msg_len += len; in uhash_update() 1061 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update() 1062 if (ctx->msg_len == L1_KEY_LEN) in uhash_update() 1074 ctx->msg_len += bytes_remaining; in uhash_update() 1084 ctx->msg_len += L1_KEY_LEN; in uhash_update() 1094 ctx->msg_len += len; in uhash_update() 1109 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final() [all …]
|
| H A D | monitor_wrap.c | 182 u_int msg_len; in mm_request_receive() local 195 msg_len = PEEK_U32(buf); in mm_request_receive() 196 if (msg_len > 256 * 1024) in mm_request_receive() 197 fatal_f("read: bad msg_len %d", msg_len); in mm_request_receive() 199 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) in mm_request_receive() 201 if (atomicio(read, sock, p, msg_len) != msg_len) { in mm_request_receive()
|
| /dflybsd-src/contrib/tcpdump/ |
| H A D | print-olsr.c | 94 nd_uint16_t msg_len; member 104 nd_uint16_t msg_len; member 322 u_int msg_type, msg_len, msg_tlen, hello_len; in olsr_print() local 369 msg_len = GET_BE_U_2(msgptr.v6->msg_len); in olsr_print() 370 if ((msg_len >= sizeof (struct olsr_msg6)) in olsr_print() 371 && (msg_len <= length)) in olsr_print() 375 if (msg_type == 0 || msg_len == 0) { in olsr_print() 387 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); in olsr_print() 392 msg_tlen = msg_len - sizeof(struct olsr_msg6); in olsr_print() 400 msg_len = GET_BE_U_2(msgptr.v4->msg_len); in olsr_print() [all …]
|
| H A D | print-ldp.c | 576 u_short pdu_len,msg_len,msg_type; in ldp_pdu_print() local 623 msg_len=GET_BE_U_2(ldp_msg_header->length); in ldp_pdu_print() 626 if (msg_len < sizeof(struct ldp_msg_header)-4) { in ldp_pdu_print() 634 msg_len, in ldp_pdu_print() 645 msg_len, in ldp_pdu_print() 650 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ in ldp_pdu_print() 653 ND_TCHECK_LEN(tptr, msg_len); in ldp_pdu_print() 692 msg_len); in ldp_pdu_print() 694 tptr += msg_len+4; in ldp_pdu_print() 695 tlen -= msg_len+4; in ldp_pdu_print()
|
| H A D | print-ptp.c | 346 uint16_t msg_len, flags, port_id, seq_id; in ptp_print_2() local 358 len -= 2; bp += 2; msg_len = GET_BE_U_2(bp); ND_PRINT(", length : %u", msg_len); in ptp_print_2()
|
| /dflybsd-src/sys/kern/ |
| H A D | sys_mqueue.c | 144 msz = sizeof(struct mq_msg) + msg->msg_len; in mqueue_destroy() 624 mq_receive1(struct lwp *l, mqd_t mqdes, void *msg_ptr, size_t msg_len, in mq_receive1() argument 648 if (msg_len < mqattr->mq_msgsize) { in mq_receive1() 718 *mlen = msg->msg_len; in mq_receive1() 719 error = copyout(msg->msg_ptr, msg_ptr, msg->msg_len); in mq_receive1() 722 mqueue_freemsg(msg, sizeof(struct mq_msg) + msg->msg_len); in mq_receive1() 740 uap->msg_len, uap->msg_prio, 0, &mlen); in sys_mq_receive() 772 uap->msg_len, uap->msg_prio, tsp, &mlen); in sys_mq_timedreceive() 783 mq_send1(struct lwp *l, mqd_t mqdes, const char *msg_ptr, size_t msg_len, in mq_send1() argument 800 size = sizeof(struct mq_msg) + msg_len; in mq_send1() [all …]
|
| /dflybsd-src/contrib/wpa_supplicant/src/eap_server/ |
| H A D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
| /dflybsd-src/contrib/wpa_supplicant/wpa_supplicant/ |
| H A D | preauth_test.c | 46 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 50 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 51 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 73 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
| H A D | wpas_glue.c | 63 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 67 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 68 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 425 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 427 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
| /dflybsd-src/usr.bin/gencat/ |
| H A D | gencat.c | 552 int msg_len = strlen(msg->str) + 1; local 555 msg_hdr->__msglen = htonl(msg_len); 558 memcpy(strings, msg->str, msg_len); 559 strings += msg_len; 560 msg_offset += msg_len;
|
| /dflybsd-src/contrib/lvm2/dist/daemons/clvmd/ |
| H A D | clvmd-corosync.c | 71 size_t msg_len); 221 size_t msg_len) in corosync_cpg_deliver_callback() argument 228 our_nodeid, nodeid, target_nodeid, msg_len-4); in corosync_cpg_deliver_callback() 233 msg_len-COROSYNC_CSID_LEN, (char*)&nodeid); in corosync_cpg_deliver_callback()
|
| H A D | clvmd-openais.c | 71 size_t msg_len); 249 size_t msg_len) in openais_cpg_deliver_callback() argument 256 our_nodeid, nodeid, target_nodeid, msg_len-4); in openais_cpg_deliver_callback() 261 msg_len-OPENAIS_CSID_LEN, (char*)&nodeid); in openais_cpg_deliver_callback()
|
| /dflybsd-src/lib/libalias/ |
| H A D | alias_smedia.c | 328 u_short msg_id, msg_len; in alias_pna_out() local 338 memcpy(&msg_len, work, 2); in alias_pna_out() 362 work += ntohs(msg_len); in alias_pna_out()
|
| /dflybsd-src/contrib/wpa_supplicant/src/crypto/ |
| H A D | crypto_module_tests.c | 165 int msg_len; member 230 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || in test_omac1_vector() 236 if (tv->msg_len > 1) { in test_omac1_vector() 241 len[1] = tv->msg_len - 1; in test_omac1_vector() 252 len[0] = tv->msg_len - 2; in test_omac1_vector() 253 addr[1] = tv->msg + tv->msg_len - 2; in test_omac1_vector() 255 addr[2] = tv->msg + tv->msg_len - 1; in test_omac1_vector()
|
| /dflybsd-src/contrib/wpa_supplicant/src/eap_common/ |
| H A D | eap_sim_common.c | 204 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() argument 212 len[0] = msg_len; in eap_sim_add_mac() 218 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); in eap_sim_add_mac() 398 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, in eap_sim_add_mac_sha256() argument 406 len[0] = msg_len; in eap_sim_add_mac_sha256() 412 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len); in eap_sim_add_mac_sha256()
|
| H A D | eap_sim_common.h | 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
|
| /dflybsd-src/contrib/gdb-7/gdb/cli/ |
| H A D | cli-setshow.c | 340 int msg_len = 0; in do_set_command() local 343 msg_len += strlen (c->enums[i]) + 2; in do_set_command() 345 msg = xmalloc (msg_len); in do_set_command()
|
| /dflybsd-src/contrib/wpa_supplicant/src/rsn_supp/ |
| H A D | wpa_i.h | 240 size_t *msg_len, void **data_pos) in wpa_sm_alloc_eapol() argument 244 msg_len, data_pos); in wpa_sm_alloc_eapol() 415 u8 *msg, size_t msg_len, u8 *key_mic);
|
| /dflybsd-src/sys/sys/ |
| H A D | mqueue.h | 113 size_t msg_len; member
|
| /dflybsd-src/contrib/wpa_supplicant/src/eap_peer/ |
| H A D | eap.c | 1466 size_t msg_len; in eap_sm_processIdentity() local 1473 &msg_len); in eap_sm_processIdentity() 1487 pos, msg_len); in eap_sm_processIdentity() 1705 size_t i, msg_len; in eap_sm_processNotify() local 1708 &msg_len); in eap_sm_processNotify() 1712 pos, msg_len); in eap_sm_processNotify() 1714 msg = os_malloc(msg_len + 1); in eap_sm_processNotify() 1717 for (i = 0; i < msg_len; i++) in eap_sm_processNotify() 1719 msg[msg_len] = '\0'; in eap_sm_processNotify() 2536 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len) in eap_sm_request_otp() argument [all …]
|
| /dflybsd-src/contrib/wpa_supplicant/src/radius/ |
| H A D | radius.c | 680 size_t msg_len; in radius_msg_parse() local 688 msg_len = be_to_host16(hdr->length); in radius_msg_parse() 689 if (msg_len < sizeof(*hdr) || msg_len > len) { in radius_msg_parse() 694 if (msg_len < len) { in radius_msg_parse() 696 "RADIUS message", (unsigned long) len - msg_len); in radius_msg_parse() 703 msg->buf = wpabuf_alloc_copy(data, msg_len); in radius_msg_parse()
|