Searched refs:msg_len (Results 1 - 8 of 8) sorted by relevance
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | d1_both.c | 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 141 OPENSSL_assert((msg_len) > 0); \ 143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \ 150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \ 274 (int)s->d1->w_msg_hdr.msg_len 415 unsigned long msg_len; local 494 size_t frag_off,frag_len,msg_len; local [all...] |
H A D | dtls1.h | 134 unsigned long msg_len; member in struct:hm_header_st
|
H A D | d1_srvr.c | 708 unsigned int msg_len; local 730 msg_len = p - msg; 733 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len); 1315 unsigned int msg_len; local 1393 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; 1395 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local 1448 unsigned int hlen, msg_len; local 1540 msg_len 1542 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local [all...] |
/barrelfish-master/lib/libc/gen/ |
H A D | sendmmsg.c | 60 msgvec[i].msg_len = ret;
|
H A D | recvmmsg.c | 92 msgvec[i].msg_len = ret;
|
/barrelfish-master/include/openssl/ |
H A D | dtls1.h | 134 unsigned long msg_len; member in struct:hm_header_st
|
/barrelfish-master/lib/libc/net/ |
H A D | sctp_sys_calls.c | 683 sctp_sendx(int sd, const void *msg, size_t msg_len, argument 711 msg, msg_len, addrs, l, sinfo, flags); 773 ret = sctp_send(sd, msg, msg_len, sinfo, flags);
|
/barrelfish-master/include/sys/ |
H A D | socket.h | 605 ssize_t msg_len; /* message length */ member in struct:mmsghdr
|
Completed in 105 milliseconds