Searched refs:msg_len (Results 1 - 8 of 8) sorted by relevance

/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Dd1_both.c126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
274 (int)s->d1->w_msg_hdr.msg_len
415 unsigned long msg_len; local
494 size_t frag_off,frag_len,msg_len; local
[all...]
H A Ddtls1.h134 unsigned long msg_len; member in struct:hm_header_st
H A Dd1_srvr.c708 unsigned int msg_len; local
730 msg_len = p - msg;
733 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len);
1315 unsigned int msg_len; local
1393 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH;
1395 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local
1448 unsigned int hlen, msg_len; local
1540 msg_len
1542 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local
[all...]
/barrelfish-master/lib/libc/gen/
H A Dsendmmsg.c60 msgvec[i].msg_len = ret;
H A Drecvmmsg.c92 msgvec[i].msg_len = ret;
/barrelfish-master/include/openssl/
H A Ddtls1.h134 unsigned long msg_len; member in struct:hm_header_st
/barrelfish-master/lib/libc/net/
H A Dsctp_sys_calls.c683 sctp_sendx(int sd, const void *msg, size_t msg_len, argument
711 msg, msg_len, addrs, l, sinfo, flags);
773 ret = sctp_send(sd, msg, msg_len, sinfo, flags);
/barrelfish-master/include/sys/
H A Dsocket.h605 ssize_t msg_len; /* message length */ member in struct:mmsghdr

Completed in 105 milliseconds