/freebsd-current/crypto/openssl/ssl/ |
H A D | t1_trce.c | 24 # define ssl_trace_list(bio, indent, msg, msglen, value, table) \ 25 do_ssl_trace_list(bio, indent, msg, msglen, value, \ 41 const unsigned char *msg, size_t msglen, 46 if (msglen % vlen) 48 while (msglen) { 55 msglen -= vlen; 615 const unsigned char *msg, size_t msglen) 620 BIO_printf(bio, "%s (len=%d): ", name, (int)msglen); 621 for (i = 0; i < msglen; i++) 899 size_t extslen, msglen local 40 do_ssl_trace_list(BIO *bio, int indent, const unsigned char *msg, size_t msglen, size_t vlen, const ssl_trace_tbl *tbl, size_t ntbl) argument 614 ssl_print_hex(BIO *bio, int indent, const char *name, const unsigned char *msg, size_t msglen) argument 948 ssl_print_client_hello(BIO *bio, const SSL *ssl, int indent, const unsigned char *msg, size_t msglen) argument 1005 dtls_print_hello_vfyrequest(BIO *bio, int indent, const unsigned char *msg, size_t msglen) argument 1015 ssl_print_server_hello(BIO *bio, int indent, const unsigned char *msg, size_t msglen) argument 1099 ssl_print_client_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) argument 1151 ssl_print_server_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) argument 1222 size_t msglen = *pmsglen; local 1254 ssl_print_certificates(BIO *bio, const SSL *ssl, int server, int indent, const unsigned char *msg, size_t msglen) argument 1284 ssl_print_cert_request(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) argument 1373 ssl_print_ticket(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) argument 1422 ssl_print_handshake(BIO *bio, const SSL *ssl, int server, const unsigned char *msg, size_t msglen, int indent) argument 1531 SSL_trace(int write_p, int version, int content_type, const void *buf, size_t msglen, SSL *ssl, void *arg) argument [all...] |
/freebsd-current/crypto/openssh/ |
H A D | xmss_fast.h | 84 int xmss_sign(unsigned char *sk, bds_state *state, unsigned char *sig_msg, unsigned long long *sig_msg_len, const unsigned char *msg,unsigned long long msglen, const xmss_params *params); 88 * Note: msg and msglen are pure outputs which carry the message in case verification succeeds. The (input) message is assumed to be within sig_msg which has the form (sig||msg). 90 int xmss_sign_open(unsigned char *msg,unsigned long long *msglen, const unsigned char *sig_msg,unsigned long long sig_msg_len, const unsigned char *pk, const xmss_params *params); 105 int xmssmt_sign(unsigned char *sk, bds_state *state, unsigned char *wots_sigs, unsigned char *sig_msg, unsigned long long *sig_msg_len, const unsigned char *msg, unsigned long long msglen, const xmssmt_params *params); 109 int xmssmt_sign_open(unsigned char *msg, unsigned long long *msglen, const unsigned char *sig_msg, unsigned long long sig_msg_len, const unsigned char *pk, const xmssmt_params *params);
|
H A D | xmss_fast.c | 551 int xmss_sign(unsigned char *sk, bds_state *state, unsigned char *sig_msg, unsigned long long *sig_msg_len, const unsigned char *msg, unsigned long long msglen, const xmss_params *params) argument 599 h_msg(msg_h, msg, msglen, hash_key, 3*n, n); 654 memcpy(sig_msg, msg, msglen); 655 *sig_msg_len += msglen; 663 int xmss_sign_open(unsigned char *msg, unsigned long long *msglen, const unsigned char *sig_msg, unsigned long long sig_msg_len, const unsigned char *pk, const xmss_params *params) argument 730 *msglen = sig_msg_len; 731 for (i = 0; i < *msglen; i++) 738 *msglen = sig_msg_len; 739 for (i = 0; i < *msglen; i++) 741 *msglen 787 xmssmt_sign(unsigned char *sk, bds_state *states, unsigned char *wots_sigs, unsigned char *sig_msg, unsigned long long *sig_msg_len, const unsigned char *msg, unsigned long long msglen, const xmssmt_params *params) argument 970 xmssmt_sign_open(unsigned char *msg, unsigned long long *msglen, const unsigned char *sig_msg, unsigned long long sig_msg_len, const unsigned char *pk, const xmssmt_params *params) argument [all...] |
/freebsd-current/tests/sys/kern/ |
H A D | socket_msg_waitall.c | 25 size_t msglen; member in struct:close_test_params 37 buflen = p->msglen + 1; 52 ATF_REQUIRE_MSG(n == (ssize_t)p->msglen, 53 "recv: got %zd expected %zd", n, (ssize_t)p->msglen); 68 size_t msglen; local 82 msglen = strlen(msg) + 1; 85 .msglen = msglen, 101 n = send(cs, msg, msglen, 0); 102 ATF_REQUIRE_MSG(n == (ssize_t)msglen, [all...] |
/freebsd-current/contrib/libpcap/ |
H A D | fmtutils.c | 283 size_t msglen; local 288 msglen = strlen(errbuf); 294 if (msglen + 3 > errbuflen) { 298 p = errbuf + msglen; 299 errbuflen_remaining = errbuflen - msglen; 399 size_t msglen; local 407 msglen = strlen(errbuf); 413 if (msglen + 3 > errbuflen) { 417 p = errbuf + msglen; 418 errbuflen_remaining = errbuflen - msglen; [all...] |
H A D | sockutils.c | 768 size_t msglen; local 773 msglen = strlen(errbuf); 774 errbufptr = errbuf + msglen; 775 bufspaceleft = errbuflen - msglen; 788 msglen = strlen(errbuf); 789 errbufptr = errbuf + msglen; 790 bufspaceleft = errbuflen - msglen; 826 msglen = strlen(errbuf); 827 errbufptr = errbuf + msglen; 828 bufspaceleft = errbuflen - msglen; [all...] |
/freebsd-current/contrib/libfido2/src/ |
H A D | authkey.c | 65 int msglen; local 78 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 84 r = cbor_parse_reply(msg, (size_t)msglen, authkey, parse_authkey);
|
H A D | credman.c | 205 int msglen; local 215 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 221 if ((r = cbor_parse_reply(msg, (size_t)msglen, metadata, 339 int msglen; local 349 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 356 if ((r = cbor_parse_reply(msg, (size_t)msglen, rk, 369 if ((r = cbor_parse_reply(msg, (size_t)msglen, &rk->ptr[0], 387 int msglen; local 395 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 409 if ((r = cbor_parse_reply(msg, (size_t)msglen, 567 int msglen; local 615 int msglen; local [all...] |
H A D | pin.c | 290 int msglen; local 303 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 309 if ((r = cbor_parse_reply(msg, (size_t)msglen, aes_token, 590 int msglen; local 600 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 606 if ((r = cbor_parse_reply(msg, (size_t)msglen, retries, 643 int msglen; local 653 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 659 if ((r = cbor_parse_reply(msg, (size_t)msglen, retries,
|
H A D | bio.c | 238 int msglen; local 248 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 254 if ((r = cbor_parse_reply(msg, (size_t)msglen, ta, 399 int msglen; local 412 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 418 if ((r = cbor_parse_reply(msg, (size_t)msglen, e, 424 if ((r = cbor_parse_reply(msg, (size_t)msglen, &t->id, 511 int msglen; local 522 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 528 if ((r = cbor_parse_reply(msg, (size_t)msglen, 687 int msglen; local [all...] |
/freebsd-current/sys/dev/ixl/ |
H A D | virtchnl.h | 602 * @msglen: msg length 608 u8 *msg, u16 msglen) 632 if (msglen >= valid_len) { 644 if (msglen >= valid_len) { 660 if (msglen >= valid_len) { 672 if (msglen >= valid_len) { 691 if (msglen) 692 valid_len = msglen; 700 if (msglen >= valid_len) { 713 if (msglen > 607 virtchnl_vc_validate_vf_msg(struct virtchnl_version_info *ver, u32 v_opcode, u8 *msg, u16 msglen) argument [all...] |
/freebsd-current/sbin/ipf/libipf/ |
H A D | save_v2trap.c | 292 int msglen) 306 basesize += strlen(community) + msglen; 393 if (msglen < 128) { 394 if (msglen + 1 + 1 + sizeof(ipf_trap0_2) >= 128) 399 if (msglen + 2 + 1 + sizeof(ipf_trap0_2) >= 128) 409 n = writelength(t, msglen); 411 bcopy(msg, t, msglen); 412 t += msglen; 431 sendtrap_v2_0(int fd, char *community, char *msg, int msglen) argument 438 (u_char *)msg, msglen); 291 maketrap_v2(char *community, u_char *buffer, int bufsize, u_char *msg, int msglen) argument [all...] |
H A D | save_v1trap.c | 290 int msglen, u_32_t ipaddr, time_t when) 303 basesize += strlen(community) + msglen; 408 n = writelength(t, msglen); 410 bcopy(msg, t, msglen); 411 t += msglen; 430 sendtrap_v1_0(int fd, char *community, char *msg, int msglen, time_t when) argument 437 (u_char *)msg, msglen, 0, when); 289 maketrap_v1(char *community, u_char *buffer, int bufsize, u_char *msg, int msglen, u_32_t ipaddr, time_t when) argument
|
/freebsd-current/sys/dev/iavf/ |
H A D | virtchnl.h | 785 * @msglen: msg length 791 u8 *msg, u16 msglen) 815 if (msglen >= valid_len) { 832 if (msglen >= valid_len) { 853 if (msglen >= valid_len) { 870 if (msglen >= valid_len) { 894 if (msglen) 895 valid_len = msglen; 903 if (msglen >= valid_len) { 919 if (msglen > 790 virtchnl_vc_validate_vf_msg(struct virtchnl_version_info *ver, u32 v_opcode, u8 *msg, u16 msglen) argument [all...] |
H A D | iavf_vc_common.h | 73 enum virtchnl_status_code v_retval, u8 *msg, u16 msglen);
|
/freebsd-current/sys/contrib/openzfs/lib/libzfs/os/freebsd/ |
H A D | libzfs_compat.c | 204 size_t msglen = sizeof (errbuf); local 207 size_t len = snprintf(msg, msglen, dgettext(TEXT_DOMAIN, 209 if (len >= msglen) 210 len = msglen - 1; 212 msglen -= len; 215 (void) snprintf(msg, msglen, "%s", zfs_strerror(error));
|
/freebsd-current/sys/gdb/ |
H A D | gdb_packet.c | 258 size_t msglen, i; local 261 msglen = gdb_txp - gdb_txbuf; 267 for (i = 0; i < msglen; i++) 269 snprintf(&gdb_tx_fullbuf[1 + msglen], 4, "#%02x", (unsigned)csum); 271 gdb_cur->gdb_sendpacket(gdb_tx_fullbuf, msglen + 4);
|
/freebsd-current/crypto/openssl/test/ |
H A D | clienthellotest.c | 71 size_t msglen; local 200 msglen = PACKET_remaining(&pkt); 239 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN);
|
/freebsd-current/usr.bin/top/ |
H A D | display.c | 718 static int msglen = 0; variable 719 /* Invariant: msglen is always the length of the message currently displayed 735 msglen = strlen(next_msg); 738 else if (msglen > 0) 740 (void) clear_eol(msglen); 741 msglen = 0; 993 if (msglen > 0) 1007 clear_eol(msglen - i); 1008 msglen = i; 1022 msglen [all...] |
H A D | commands.c | 279 int msglen; local 282 msglen = strlen(msg) + 2; 283 if (len <= msglen) 289 return(len - msglen);
|
/freebsd-current/lib/libc/nameser/ |
H A D | ns_print.c | 56 static int addname(const u_char *msg, size_t msglen, 105 ns_sprintrrf(const u_char *msg, size_t msglen, argument 171 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 198 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 202 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 273 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 291 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 295 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 380 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 399 T(addname(msg, msglen, 1167 addname(const u_char *msg, size_t msglen, const u_char **pp, const char *origin, char **buf, size_t *buflen) argument [all...] |
/freebsd-current/sys/dev/ice/ |
H A D | virtchnl.h | 2088 * @msglen: msg length 2094 u8 *msg, u16 msglen) 2118 if (msglen >= valid_len) { 2135 if (msglen >= valid_len) { 2158 if (msglen >= valid_len) { 2175 if (msglen >= valid_len) { 2196 if (msglen >= valid_len) { 2210 if (msglen >= valid_len) { 2235 if (msglen >= valid_len) { 2275 if (msglen > 2093 virtchnl_vc_validate_vf_msg(struct virtchnl_version_info *ver, u32 v_opcode, u8 *msg, u16 msglen) argument [all...] |
/freebsd-current/usr.bin/gencat/ |
H A D | gencat.c | 304 static long msglen = 0; local 313 if (clen > msglen) { 314 if (msglen) 318 msglen = clen; 340 msglen += strlen(cptr); 342 msg = xrealloc(msg, msglen);
|
/freebsd-current/crypto/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 121 * |msglen| length of the message 130 const unsigned char *msg, size_t msglen, 209 msg, msglen, mac_res, EVP_MAX_MD_SIZE, outlen) == NULL) 128 OSSL_CRMF_pbm_new(OSSL_LIB_CTX *libctx, const char *propq, const OSSL_CRMF_PBMPARAMETER *pbmp, const unsigned char *msg, size_t msglen, const unsigned char *sec, size_t seclen, unsigned char **out, size_t *outlen) argument
|
/freebsd-current/lib/libipsec/ |
H A D | policy_parse.y | 87 static caddr_t policy_parse(const char *msg, int msglen); 386 policy_parse(const char *msg, int msglen) 416 ipsec_set_policy(const char *msg, int msglen) 420 policy = policy_parse(msg, msglen);
|