Home
last modified time | relevance | path

Searched refs:msg_len (Results 1 – 25 of 53) sorted by relevance

123

/openbsd-src/lib/libssl/
H A Dd1_both.c130 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument
143 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument
145 OPENSSL_assert((msg_len) > 0); \
147 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
148 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
242 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH); in dtls1_do_write()
332 0, msg_hdr->msg_len, p)) in dtls1_do_write()
376 unsigned long msg_len; in dtls1_get_message() local
407 msg_len = msg_hdr->msg_len; in dtls1_get_message()
410 if (!dtls1_write_message_header(msg_hdr, 0, msg_len, p)) in dtls1_get_message()
[all …]
H A Dtls13_handshake_msg.c27 uint32_t msg_len; member
126 uint32_t msg_len; in tls13_handshake_msg_recv() local
144 if (!CBS_get_u24(&cbs, &msg_len)) in tls13_handshake_msg_recv()
148 if (msg_len > TLS13_HANDSHAKE_MSG_MAX_LEN) in tls13_handshake_msg_recv()
152 msg->msg_len = msg_len; in tls13_handshake_msg_recv()
156 TLS13_HANDSHAKE_MSG_HEADER_LEN + msg->msg_len, in tls13_handshake_msg_recv()
H A Ddtls_local.h87 unsigned long msg_len; member
/openbsd-src/usr.bin/ssh/
H A Dmsg.c68 u_int msg_len; in ssh_msg_recv() local
78 msg_len = get_u32(buf); in ssh_msg_recv()
79 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv()
80 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv()
84 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv()
88 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
H A Dssh-pkcs11-helper.c257 u_int msg_len; in process()
268 msg_len = get_u32(cp); in process()
269 if (msg_len > MAX_MSG_LENGTH) { in process()
270 error("bad message len %d", msg_len); in process()
273 if (buf_len < msg_len + 4) in process()
302 if (msg_len < consumed) { in cleanup_exit()
303 error("msg_len %d < consumed %d", msg_len, consumed); in cleanup_exit()
306 if (msg_len > consumed) {
307 if ((r = sshbuf_consume(iqueue, msg_len
245 u_int msg_len; process() local
[all...]
H A Dumac.c778 UINT32 msg_len; /* Total length of data passed */ member
934 pc->msg_len = 0; in uhash_reset()
1052 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update()
1054 ctx->msg_len += len; in uhash_update()
1057 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update()
1058 if (ctx->msg_len == L1_KEY_LEN) in uhash_update()
1070 ctx->msg_len += bytes_remaining; in uhash_update()
1080 ctx->msg_len += L1_KEY_LEN; in uhash_update()
1090 ctx->msg_len += len; in uhash_update()
1105 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final()
[all …]
H A Dmonitor_wrap.c168 u_int msg_len; in mm_request_send()
181 msg_len = PEEK_U32(buf); in mm_request_receive()
182 if (msg_len > 256 * 1024) in mm_request_receive()
183 fatal_f("read: bad msg_len %d", msg_len); in mm_request_receive()
185 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) in mm_request_receive()
187 if (atomicio(read, sock, p, msg_len) != msg_len) { in mm_request_receive()
178 u_int msg_len; mm_request_receive() local
H A Dsftp-server.c1772 u_int msg_len; in process() local
1784 msg_len = get_u32(cp); in process()
1785 if (msg_len > SFTP_MAX_MSG_LENGTH) { in process()
1790 if (buf_len < msg_len + 4) in process()
1835 if (msg_len < consumed) { in process()
1836 error("msg_len %u < consumed %u", msg_len, consumed); in process()
1839 if (msg_len > consumed && in process()
1840 (r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
/openbsd-src/lib/libcrypto/sm2/
H A Dsm2_crypt.c130 SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, in SM2_plaintext_size() argument
147 if (msg_len <= overhead) { in SM2_plaintext_size()
152 *pl_size = msg_len - overhead; in SM2_plaintext_size()
157 SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, in SM2_ciphertext_size() argument
175 ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in SM2_ciphertext_size()
248 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) in SM2_encrypt() argument
383 if ((msg_mask = calloc(1, msg_len)) == NULL) { in SM2_encrypt()
388 if (!sm2_kdf(msg_mask, msg_len, x2y2, 2 * field_size, digest)) { in SM2_encrypt()
393 for (i = 0; i != msg_len; i++) in SM2_encrypt()
406 if (!EVP_DigestUpdate(hash, msg, msg_len)) { in SM2_encrypt()
[all …]
H A Dsm2.h44 int SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
47 int SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
51 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len);
H A Dsm2_sign.c32 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_compute_msg_hash() argument
69 if (!EVP_DigestUpdate(hash, msg, msg_len)) { in sm2_compute_msg_hash()
353 size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_do_sign() argument
358 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len); in sm2_do_sign()
373 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_do_verify() argument
378 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len); in sm2_do_verify()
H A Dsm2_local.h33 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len);
37 const uint8_t *msg, size_t msg_len);
/openbsd-src/regress/lib/libcrypto/sm2/
H A Dsm2crypttest.c97 const size_t msg_len = strlen(message); in test_sm2() local
105 size_t recovered_len = msg_len; in test_sm2()
121 if (!SM2_ciphertext_size(key, digest, msg_len, &ctext_len)) in test_sm2()
127 rc = SM2_encrypt(key, digest, (const uint8_t *)message, msg_len, ctext, &ctext_len); in test_sm2()
132 recovered = calloc(1, msg_len); in test_sm2()
139 if (recovered_len != msg_len) in test_sm2()
141 if (memcmp(recovered, message, msg_len) != 0) in test_sm2()
H A Dsm2sigtest.c99 const size_t msg_len = strlen(message); in test_sm2() local
119 (const uint8_t *)message, msg_len); in test_sm2()
127 (const uint8_t *)message, msg_len); in test_sm2()
/openbsd-src/usr.sbin/ldpd/
H A Dpacket.c142 uint16_t msg_len; in disc_recv_packet() local
240 msg_len = ntohs(msg.length); in disc_recv_packet()
241 if (msg_len < LDP_MSG_LEN || ((msg_len + LDP_MSG_DEAD_LEN) > pdu_len)) { in disc_recv_packet()
430 uint16_t pdu_len, msg_len, msg_size, max_pdu_len; in session_read() local
496 msg_len = ntohs(msg->length); in session_read()
497 if (msg_len < LDP_MSG_LEN || in session_read()
498 (msg_len + LDP_MSG_DEAD_LEN) > pdu_len) { in session_read()
504 msg_size = msg_len + LDP_MSG_DEAD_LEN; in session_read()
/openbsd-src/sys/kern/
H A Dsysv_msg.c539 que->msqid_ds.msg_cbytes += msg->msg_len; in msg_enqueue()
550 que->msqid_ds.msg_cbytes -= msg->msg_len; in msg_dequeue()
589 msg->msg_len = 0; in msg_copyin()
592 while (msg->msg_len < len) { in msg_copyin()
601 msg->msg_len += xfer; in msg_copyin()
625 if (msg->msg_len > MSGMAX) in msg_copyout()
630 xfer = min(*len, msg->msg_len); in msg_copyout()
/openbsd-src/usr.bin/gencat/
H A Dgencat.c569 int msg_len = strlen(msg->str) + 1; in MCWriteCat() local
572 msg_hdr->__msglen = htonl(msg_len); in MCWriteCat()
575 memcpy(strings, msg->str, msg_len); in MCWriteCat()
576 strings += msg_len; in MCWriteCat()
577 msg_offset += msg_len; in MCWriteCat()
/openbsd-src/sbin/unwind/libunbound/libunbound/
H A Dcontext.c372 q->msg_len = 0; in context_deserialize_answer()
379 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer()
381 q->msg_len); in context_deserialize_answer()
384 q->msg_len = 0; in context_deserialize_answer()
H A Dcontext.h174 size_t msg_len; member
/openbsd-src/usr.sbin/unbound/libunbound/
H A Dcontext.c372 q->msg_len = 0; in context_deserialize_answer()
379 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer()
381 q->msg_len); in context_deserialize_answer()
384 q->msg_len = 0; in context_deserialize_answer()
H A Dcontext.h174 size_t msg_len; member
/openbsd-src/gnu/llvm/compiler-rt/include/sanitizer/
H A Dnetbsd_syscall_hooks.h1383 #define __sanitizer_syscall_pre_mq_send(mqdes, msg_ptr, msg_len, msg_prio) \ argument
1385 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
1387 #define __sanitizer_syscall_post_mq_send(res, mqdes, msg_ptr, msg_len, \ argument
1390 res, (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
1392 #define __sanitizer_syscall_pre_mq_receive(mqdes, msg_ptr, msg_len, msg_prio) \ argument
1394 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
1396 #define __sanitizer_syscall_post_mq_receive(res, mqdes, msg_ptr, msg_len, \ argument
1399 res, (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
1402 mqdes, msg_ptr, msg_len, msg_prio, abs_timeout) \ argument
1404 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
[all …]
/openbsd-src/sys/sys/
H A Dmsg.h61 size_t msg_len; member
/openbsd-src/regress/lib/libc/sys/
H A Dt_recvmmsg.c146 ATF_CHECK_EQ_MSG(mmsghdr[i].msg_len, in ATF_TC_BODY()
/openbsd-src/sys/nfs/
H A Dnfs_boot.c336 int error, msg_len; in bp_whoami() local
373 msg_len = fxdr_unsigned(u_int32_t, reply->encap_len); in bp_whoami()

123