| /openbsd-src/lib/libssl/ |
| H A D | d1_both.c | 130 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 143 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 145 OPENSSL_assert((msg_len) > 0); \ 147 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 148 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 242 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH); in dtls1_do_write() 332 0, msg_hdr->msg_len, p)) in dtls1_do_write() 376 unsigned long msg_len; in dtls1_get_message() local 407 msg_len = msg_hdr->msg_len; in dtls1_get_message() 410 if (!dtls1_write_message_header(msg_hdr, 0, msg_len, p)) in dtls1_get_message() [all …]
|
| H A D | tls13_handshake_msg.c | 27 uint32_t msg_len; member 126 uint32_t msg_len; in tls13_handshake_msg_recv() local 144 if (!CBS_get_u24(&cbs, &msg_len)) in tls13_handshake_msg_recv() 148 if (msg_len > TLS13_HANDSHAKE_MSG_MAX_LEN) in tls13_handshake_msg_recv() 152 msg->msg_len = msg_len; in tls13_handshake_msg_recv() 156 TLS13_HANDSHAKE_MSG_HEADER_LEN + msg->msg_len, in tls13_handshake_msg_recv()
|
| H A D | dtls_local.h | 87 unsigned long msg_len; member
|
| /openbsd-src/usr.bin/ssh/ |
| H A D | msg.c | 68 u_int msg_len; in ssh_msg_recv() local 78 msg_len = get_u32(buf); in ssh_msg_recv() 79 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv() 80 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv() 84 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv() 88 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
|
| H A D | ssh-pkcs11-helper.c | 257 u_int msg_len; in process() 268 msg_len = get_u32(cp); in process() 269 if (msg_len > MAX_MSG_LENGTH) { in process() 270 error("bad message len %d", msg_len); in process() 273 if (buf_len < msg_len + 4) in process() 302 if (msg_len < consumed) { in cleanup_exit() 303 error("msg_len %d < consumed %d", msg_len, consumed); in cleanup_exit() 306 if (msg_len > consumed) { 307 if ((r = sshbuf_consume(iqueue, msg_len 245 u_int msg_len; process() local [all...] |
| H A D | umac.c | 778 UINT32 msg_len; /* Total length of data passed */ member 934 pc->msg_len = 0; in uhash_reset() 1052 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update() 1054 ctx->msg_len += len; in uhash_update() 1057 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update() 1058 if (ctx->msg_len == L1_KEY_LEN) in uhash_update() 1070 ctx->msg_len += bytes_remaining; in uhash_update() 1080 ctx->msg_len += L1_KEY_LEN; in uhash_update() 1090 ctx->msg_len += len; in uhash_update() 1105 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final() [all …]
|
| H A D | monitor_wrap.c | 168 u_int msg_len; in mm_request_send() 181 msg_len = PEEK_U32(buf); in mm_request_receive() 182 if (msg_len > 256 * 1024) in mm_request_receive() 183 fatal_f("read: bad msg_len %d", msg_len); in mm_request_receive() 185 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) in mm_request_receive() 187 if (atomicio(read, sock, p, msg_len) != msg_len) { in mm_request_receive() 178 u_int msg_len; mm_request_receive() local
|
| H A D | sftp-server.c | 1772 u_int msg_len; in process() local 1784 msg_len = get_u32(cp); in process() 1785 if (msg_len > SFTP_MAX_MSG_LENGTH) { in process() 1790 if (buf_len < msg_len + 4) in process() 1835 if (msg_len < consumed) { in process() 1836 error("msg_len %u < consumed %u", msg_len, consumed); in process() 1839 if (msg_len > consumed && in process() 1840 (r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
|
| /openbsd-src/lib/libcrypto/sm2/ |
| H A D | sm2_crypt.c | 130 SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, in SM2_plaintext_size() argument 147 if (msg_len <= overhead) { in SM2_plaintext_size() 152 *pl_size = msg_len - overhead; in SM2_plaintext_size() 157 SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, in SM2_ciphertext_size() argument 175 ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in SM2_ciphertext_size() 248 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) in SM2_encrypt() argument 383 if ((msg_mask = calloc(1, msg_len)) == NULL) { in SM2_encrypt() 388 if (!sm2_kdf(msg_mask, msg_len, x2y2, 2 * field_size, digest)) { in SM2_encrypt() 393 for (i = 0; i != msg_len; i++) in SM2_encrypt() 406 if (!EVP_DigestUpdate(hash, msg, msg_len)) { in SM2_encrypt() [all …]
|
| H A D | sm2.h | 44 int SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 47 int SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 51 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len);
|
| H A D | sm2_sign.c | 32 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_compute_msg_hash() argument 69 if (!EVP_DigestUpdate(hash, msg, msg_len)) { in sm2_compute_msg_hash() 353 size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_do_sign() argument 358 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len); in sm2_do_sign() 373 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_do_verify() argument 378 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len); in sm2_do_verify()
|
| H A D | sm2_local.h | 33 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len); 37 const uint8_t *msg, size_t msg_len);
|
| /openbsd-src/regress/lib/libcrypto/sm2/ |
| H A D | sm2crypttest.c | 97 const size_t msg_len = strlen(message); in test_sm2() local 105 size_t recovered_len = msg_len; in test_sm2() 121 if (!SM2_ciphertext_size(key, digest, msg_len, &ctext_len)) in test_sm2() 127 rc = SM2_encrypt(key, digest, (const uint8_t *)message, msg_len, ctext, &ctext_len); in test_sm2() 132 recovered = calloc(1, msg_len); in test_sm2() 139 if (recovered_len != msg_len) in test_sm2() 141 if (memcmp(recovered, message, msg_len) != 0) in test_sm2()
|
| H A D | sm2sigtest.c | 99 const size_t msg_len = strlen(message); in test_sm2() local 119 (const uint8_t *)message, msg_len); in test_sm2() 127 (const uint8_t *)message, msg_len); in test_sm2()
|
| /openbsd-src/usr.sbin/ldpd/ |
| H A D | packet.c | 142 uint16_t msg_len; in disc_recv_packet() local 240 msg_len = ntohs(msg.length); in disc_recv_packet() 241 if (msg_len < LDP_MSG_LEN || ((msg_len + LDP_MSG_DEAD_LEN) > pdu_len)) { in disc_recv_packet() 430 uint16_t pdu_len, msg_len, msg_size, max_pdu_len; in session_read() local 496 msg_len = ntohs(msg->length); in session_read() 497 if (msg_len < LDP_MSG_LEN || in session_read() 498 (msg_len + LDP_MSG_DEAD_LEN) > pdu_len) { in session_read() 504 msg_size = msg_len + LDP_MSG_DEAD_LEN; in session_read()
|
| /openbsd-src/sys/kern/ |
| H A D | sysv_msg.c | 539 que->msqid_ds.msg_cbytes += msg->msg_len; in msg_enqueue() 550 que->msqid_ds.msg_cbytes -= msg->msg_len; in msg_dequeue() 589 msg->msg_len = 0; in msg_copyin() 592 while (msg->msg_len < len) { in msg_copyin() 601 msg->msg_len += xfer; in msg_copyin() 625 if (msg->msg_len > MSGMAX) in msg_copyout() 630 xfer = min(*len, msg->msg_len); in msg_copyout()
|
| /openbsd-src/usr.bin/gencat/ |
| H A D | gencat.c | 569 int msg_len = strlen(msg->str) + 1; in MCWriteCat() local 572 msg_hdr->__msglen = htonl(msg_len); in MCWriteCat() 575 memcpy(strings, msg->str, msg_len); in MCWriteCat() 576 strings += msg_len; in MCWriteCat() 577 msg_offset += msg_len; in MCWriteCat()
|
| /openbsd-src/sbin/unwind/libunbound/libunbound/ |
| H A D | context.c | 372 q->msg_len = 0; in context_deserialize_answer() 379 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer() 381 q->msg_len); in context_deserialize_answer() 384 q->msg_len = 0; in context_deserialize_answer()
|
| H A D | context.h | 174 size_t msg_len; member
|
| /openbsd-src/usr.sbin/unbound/libunbound/ |
| H A D | context.c | 372 q->msg_len = 0; in context_deserialize_answer() 379 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer() 381 q->msg_len); in context_deserialize_answer() 384 q->msg_len = 0; in context_deserialize_answer()
|
| H A D | context.h | 174 size_t msg_len; member
|
| /openbsd-src/gnu/llvm/compiler-rt/include/sanitizer/ |
| H A D | netbsd_syscall_hooks.h | 1383 #define __sanitizer_syscall_pre_mq_send(mqdes, msg_ptr, msg_len, msg_prio) \ argument 1385 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ 1387 #define __sanitizer_syscall_post_mq_send(res, mqdes, msg_ptr, msg_len, \ argument 1390 res, (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ 1392 #define __sanitizer_syscall_pre_mq_receive(mqdes, msg_ptr, msg_len, msg_prio) \ argument 1394 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ 1396 #define __sanitizer_syscall_post_mq_receive(res, mqdes, msg_ptr, msg_len, \ argument 1399 res, (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ 1402 mqdes, msg_ptr, msg_len, msg_prio, abs_timeout) \ argument 1404 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ [all …]
|
| /openbsd-src/sys/sys/ |
| H A D | msg.h | 61 size_t msg_len; member
|
| /openbsd-src/regress/lib/libc/sys/ |
| H A D | t_recvmmsg.c | 146 ATF_CHECK_EQ_MSG(mmsghdr[i].msg_len, in ATF_TC_BODY()
|
| /openbsd-src/sys/nfs/ |
| H A D | nfs_boot.c | 336 int error, msg_len; in bp_whoami() local 373 msg_len = fxdr_unsigned(u_int32_t, reply->encap_len); in bp_whoami()
|