| /src/external/mit/libuv/dist/src/unix/ |
| darwin-syscalls.h | 11 size_t msg_len; member in struct:mmsghdr
|
| /src/crypto/external/bsd/openssh/dist/ |
| msg.c | 70 u_int msg_len; local 80 msg_len = get_u32(buf); 81 if (msg_len > sshbuf_max_size(m)) { 82 error_f("read: bad msg_len %u", msg_len); 86 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { 90 if (atomicio(read, fd, p, msg_len) != msg_len) {
|
| ssh-pkcs11-helper.c | 154 u_int msg_len; local 165 msg_len = get_u32(cp); 166 if (msg_len > MAX_MSG_LENGTH) { 167 error("bad message len %d", msg_len); 170 if (buf_len < msg_len + 4) 195 if (msg_len < consumed) { 196 error("msg_len %d < consumed %d", msg_len, consumed); 199 if (msg_len > consumed) { 200 if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0 [all...] |
| /src/crypto/external/apache2/openssl/dist/demos/encrypt/ |
| rsa_encrypt.c | 215 size_t msg_len = sizeof(msg) - 1; local 220 if (!do_encrypt(libctx, msg, msg_len, &encrypted, &encrypted_len)) {
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/passwd/pbkdf2/ |
| pw-pbkdf2.c | 117 int rc, msg_len; local 133 msg_len = asprintf(&msg->bv_val, "%s%d$%s$%s", 136 if(msg_len < 0){ 141 msg->bv_len = msg_len;
|
| /src/sys/external/bsd/drm2/dist/drm/vmwgfx/ |
| vmwgfx_msg.c | 157 unsigned long msg_len = strlen(msg); local 168 msg_len, si, di, 179 while (msg_len && (HIGH_WORD(ecx) & MESSAGE_STATUS_SUCCESS)) { 180 unsigned int bytes = min_t(size_t, msg_len, 4); 184 msg_len -= bytes; 268 size_t msg_len = strlen(msg); local 279 msg_len, si, di, 315 * @msg_len: message length 318 size_t *msg_len) 326 *msg_len = 0 [all...] |
| /src/sys/sys/ |
| mqueue.h | 106 size_t msg_len; member in struct:mq_msg
|
| /src/crypto/external/apache2/openssl/dist/fuzz/ |
| slh-dsa.c | 316 size_t msg_len; local 341 msg_len = *len; 343 /* if msg_len > 255, sign_message_init will fail */ 344 if (msg_len > 255 && (selector & 0x1) != 0) 351 msg, msg_len); 387 OPENSSL_assert(EVP_PKEY_sign(ctx, NULL, &sig_len, msg, msg_len)); 391 OPENSSL_assert(EVP_PKEY_sign(ctx, sig, &sig_len, msg, msg_len)); 394 OPENSSL_assert(EVP_PKEY_verify(ctx, sig, sig_len, msg, msg_len));
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/ |
| slh_dsa_kmgmt.c | 299 size_t msg_len = sizeof(msg); local 330 if (ossl_slh_dsa_sign(ctx, msg, msg_len, NULL, 0, NULL, 0, 337 if (ossl_slh_dsa_verify(ctx, msg, msg_len, NULL, 0, 0, sig, sig_len) != 1)
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| ecdsatest.c | 80 long q_len, msg_len = 0; local 106 || !TEST_ptr(message = OPENSSL_hexstr2buf(tbs, &msg_len)) 108 || !TEST_true(EVP_DigestUpdate(mctx, message, msg_len))
|
| sm2_internal_test.c | 139 const size_t msg_len = strlen(message); local 148 size_t recovered_len = msg_len; 165 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, 175 (const uint8_t *)message, msg_len, 186 || !TEST_int_eq(ptext_len, msg_len)) 193 || !TEST_int_eq(recovered_len, msg_len) 194 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) 308 const size_t msg_len = strlen(message); local 338 strlen(userid), (const uint8_t *)message, msg_len); 354 strlen(userid), (const uint8_t *)message, msg_len); [all...] |
| ml_dsa_test.c | 153 td->msg, td->msg_len), 160 td->msg, td->msg_len), 199 td->msg, td->msg_len), 373 size_t msg_len; member in struct:sig_params_st 422 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, sp->msg, sp->msg_len), 1) 426 if (!TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, sp->msg, sp->msg_len), 0)) 429 if (!TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, sp->msg, sp->msg_len), 1) 432 || !TEST_int_eq(EVP_PKEY_verify(vctx, sig, sig_len, sp->msg, sp->msg_len), 1)) 490 if (!TEST_int_eq(EVP_DigestSign(mctx, NULL, &sig_len, sp->msg, sp->msg_len), 1) 494 if (!TEST_int_eq(EVP_DigestSign(mctx, sig, &sig_len, sp->msg, sp->msg_len), 0) [all...] |
| slh_dsa_test.c | 232 td->msg, td->msg_len), 279 td->msg, td->msg_len), 286 td->msg, td->msg_len), 382 size_t msg_len = sizeof(msg) - 1; local 407 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len), 1) 409 || !TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, msg, msg_len), 1)) 421 || !TEST_int_eq(EVP_PKEY_verify(vctx, sig, sig_len, msg, msg_len), 1)) 452 size_t msg_len = sizeof(msg); local 488 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len), 1)) 492 || !TEST_int_eq(EVP_PKEY_sign(sctx, sig, &len, msg, msg_len), 1 541 size_t msg_len = sizeof(msg); local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| ecdsatest.c | 80 long q_len, msg_len = 0; local 106 || !TEST_ptr(message = OPENSSL_hexstr2buf(tbs, &msg_len)) 108 || !TEST_true(EVP_DigestUpdate(mctx, message, msg_len))
|
| sm2_internal_test.c | 140 const size_t msg_len = strlen(message); local 149 size_t recovered_len = msg_len; 166 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, 176 (const uint8_t *)message, msg_len, 187 || !TEST_int_eq(ptext_len, msg_len)) 194 || !TEST_int_eq(recovered_len, msg_len) 195 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) 311 const size_t msg_len = strlen(message); local 341 strlen(userid), (const uint8_t *)message, msg_len); 357 strlen(userid), (const uint8_t *)message, msg_len); [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| ecdsatest.c | 102 long q_len, msg_len = 0; local 123 || !TEST_ptr(message = OPENSSL_hexstr2buf(tbs, &msg_len)) 125 || !TEST_true(EVP_DigestUpdate(mctx, message, msg_len))
|
| sm2_internal_test.c | 144 const size_t msg_len = strlen(message); local 153 size_t recovered_len = msg_len; 170 || !TEST_true(sm2_ciphertext_size(key, digest, msg_len, &ctext_len))) 178 if (!TEST_true(sm2_encrypt(key, digest, (const uint8_t *)message, msg_len, 189 || !TEST_int_eq(ptext_len, msg_len)) 195 || !TEST_int_eq(recovered_len, msg_len) 196 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) 311 const size_t msg_len = strlen(message); local 339 (const uint8_t *)message, msg_len); 355 strlen(userid), (const uint8_t *)message, msg_len); [all...] |
| /src/external/bsd/libpcap/dist/ |
| pcap-netfilter-linux.c | 152 uint32_t msg_len; local 282 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); 289 * is unsigned and is the type of msg_len; ep >= bp, and 295 if (msg_len > (uint32_t)(ep - bp)) 296 msg_len = (uint32_t)(ep - bp); 298 bp += msg_len;
|
| /src/external/bsd/ppp/dist/pppd/plugins/pppol2tp/ |
| l2tp_event.h | 80 uint16_t msg_len; /* length of data that follows */ member in struct:openl2tp_event_msg
|
| /src/external/bsd/unbound/dist/libunbound/ |
| context.h | 174 size_t msg_len; member in struct:ctx_query
|
| /src/usr.bin/gencat/ |
| gencat.c | 727 int32_t msg_len = strlen(msg->str) + 1; local 730 msg_hdr->__msglen = htonl(msg_len); 733 memcpy(strings, msg->str, msg_len); 734 strings += msg_len; 735 msg_offset += msg_len;
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 37 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 125 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) 284 l2n3(msg_hdr->msg_len, p); 287 l2n3(msg_hdr->msg_len, p); 331 size_t msg_len; local 389 size_t msg_len = s->init_num + DTLS1_HM_HEADER_LENGTH; local 437 size_t frag_off, frag_len, msg_len; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 34 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 37 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 38 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 129 s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) 288 l2n3(msg_hdr->msg_len, p); 291 l2n3(msg_hdr->msg_len, p); 335 size_t msg_len; local 420 size_t frag_off, frag_len, msg_len; local [all...] |
| /src/external/gpl3/gdb.old/dist/gdb/ |
| linux-record.c | 1877 ULONGEST msg_len; local 1879 regcache_raw_read_unsigned (regcache, tdep->arg3, &msg_len); 1881 (int) msg_len))
|