Searched refs:msg_len (Results 1 - 25 of 52) sorted by relevance

123

/openbsd-current/usr.bin/ssh/
H A Dmsg.c68 u_int msg_len; local
78 msg_len = get_u32(buf);
79 if (msg_len > sshbuf_max_size(m)) {
80 error_f("read: bad msg_len %u", msg_len);
84 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) {
88 if (atomicio(read, fd, p, msg_len) != msg_len) {
H A Dssh-pkcs11-helper.c245 u_int msg_len; local
256 msg_len = get_u32(cp);
257 if (msg_len > MAX_MSG_LENGTH) {
258 error("bad message len %d", msg_len);
261 if (buf_len < msg_len + 4)
290 if (msg_len < consumed) {
291 error("msg_len %d < consumed %d", msg_len, consumed);
294 if (msg_len > consumed) {
295 if ((r = sshbuf_consume(iqueue, msg_len
[all...]
H A Dumac.c778 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx
934 pc->msg_len = 0;
1052 if (ctx->msg_len + len <= L1_KEY_LEN) {
1054 ctx->msg_len += len;
1057 bytes_hashed = ctx->msg_len % L1_KEY_LEN;
1058 if (ctx->msg_len == L1_KEY_LEN)
1070 ctx->msg_len += bytes_remaining;
1080 ctx->msg_len += L1_KEY_LEN;
1090 ctx->msg_len += len;
1105 if (ctx->msg_len > L1_KEY_LE
[all...]
H A Dmonitor_wrap.c178 u_int msg_len; local
191 msg_len = PEEK_U32(buf);
192 if (msg_len > 256 * 1024)
193 fatal_f("read: bad msg_len %d", msg_len);
195 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0)
197 if (atomicio(read, sock, p, msg_len) != msg_len) {
/openbsd-current/lib/libcrypto/sm2/
H A Dsm2_local.h33 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len);
37 const uint8_t *msg, size_t msg_len);
H A Dsm2.h48 int SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
51 int SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len,
55 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len);
H A Dsm2_crypt.c130 SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, argument
147 if (msg_len <= overhead) {
152 *pl_size = msg_len - overhead;
157 SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, argument
175 ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING);
248 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len)
383 if ((msg_mask = calloc(1, msg_len)) == NULL) {
388 if (!sm2_kdf(msg_mask, msg_len, x2y2, 2 * field_size, digest)) {
393 for (i = 0; i != msg_len; i++)
406 if (!EVP_DigestUpdate(hash, msg, msg_len)) {
247 SM2_encrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *msg, size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) argument
476 int msg_len = 0, rc = 0; local
[all...]
H A Dsm2_sign.c32 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len)
69 if (!EVP_DigestUpdate(hash, msg, msg_len)) {
353 size_t uid_len, const uint8_t *msg, size_t msg_len)
358 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len);
373 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len)
378 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len);
31 sm2_compute_msg_hash(const EVP_MD *digest, const EC_KEY *key, const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) argument
352 sm2_do_sign(const EC_KEY *key, const EVP_MD *digest, const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) argument
372 sm2_do_verify(const EC_KEY *key, const EVP_MD *digest, const ECDSA_SIG *sig, const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) argument
/openbsd-current/lib/libssl/
H A Dd1_both.c130 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
143 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
145 OPENSSL_assert((msg_len) > 0); \
147 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
148 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
242 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH);
332 0, msg_hdr->msg_len, p))
376 unsigned long msg_len; local
437 size_t frag_off, frag_len, msg_len; local
1174 uint32_t msg_len, frag_off, frag_len; local
[all...]
H A Dtls13_handshake_msg.c27 uint32_t msg_len; member in struct:tls13_handshake_msg
126 uint32_t msg_len; local
144 if (!CBS_get_u24(&cbs, &msg_len))
148 if (msg_len > TLS13_HANDSHAKE_MSG_MAX_LEN)
152 msg->msg_len = msg_len;
156 TLS13_HANDSHAKE_MSG_HEADER_LEN + msg->msg_len,
H A Ddtls_local.h87 unsigned long msg_len; member in struct:hm_header_st
/openbsd-current/regress/lib/libcrypto/sm2/
H A Dsm2crypttest.c97 const size_t msg_len = strlen(message); local
105 size_t recovered_len = msg_len;
121 if (!SM2_ciphertext_size(key, digest, msg_len, &ctext_len))
127 rc = SM2_encrypt(key, digest, (const uint8_t *)message, msg_len, ctext, &ctext_len);
132 recovered = calloc(1, msg_len);
139 if (recovered_len != msg_len)
141 if (memcmp(recovered, message, msg_len) != 0)
H A Dsm2sigtest.c99 const size_t msg_len = strlen(message); local
119 (const uint8_t *)message, msg_len);
127 (const uint8_t *)message, msg_len);
/openbsd-current/usr.sbin/ldpd/
H A Dpacket.c142 uint16_t msg_len; local
240 msg_len = ntohs(msg.length);
241 if (msg_len < LDP_MSG_LEN || ((msg_len + LDP_MSG_DEAD_LEN) > pdu_len)) {
430 uint16_t pdu_len, msg_len, msg_size, max_pdu_len; local
496 msg_len = ntohs(msg->length);
497 if (msg_len < LDP_MSG_LEN ||
498 (msg_len + LDP_MSG_DEAD_LEN) > pdu_len) {
504 msg_size = msg_len + LDP_MSG_DEAD_LEN;
/openbsd-current/sys/sys/
H A Dmsg.h61 size_t msg_len; member in struct:msg
/openbsd-current/usr.bin/gencat/
H A Dgencat.c569 int msg_len = strlen(msg->str) + 1; local
572 msg_hdr->__msglen = htonl(msg_len);
575 memcpy(strings, msg->str, msg_len);
576 strings += msg_len;
577 msg_offset += msg_len;
/openbsd-current/sys/kern/
H A Dsysv_msg.c539 que->msqid_ds.msg_cbytes += msg->msg_len;
550 que->msqid_ds.msg_cbytes -= msg->msg_len;
589 msg->msg_len = 0;
592 while (msg->msg_len < len) {
601 msg->msg_len += xfer;
625 if (msg->msg_len > MSGMAX)
630 xfer = min(*len, msg->msg_len);
/openbsd-current/sbin/unwind/libunbound/libunbound/
H A Dcontext.h174 size_t msg_len; member in struct:ctx_query
H A Dcontext.c370 q->msg_len = 0;
377 q->msg_len = len - size_of_uint32s - wlen;
379 q->msg_len);
382 q->msg_len = 0;
/openbsd-current/usr.sbin/unbound/libunbound/
H A Dcontext.h174 size_t msg_len; member in struct:ctx_query
H A Dcontext.c370 q->msg_len = 0;
377 q->msg_len = len - size_of_uint32s - wlen;
379 q->msg_len);
382 q->msg_len = 0;
/openbsd-current/regress/lib/libc/sys/
H A Dt_recvmmsg.c146 ATF_CHECK_EQ_MSG(mmsghdr[i].msg_len,
/openbsd-current/gnu/llvm/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_common_syscalls.inc108 unsigned msg_len;
187 POST_WRITE(&msg->msg_len, sizeof(msg->msg_len));
2382 (long mqdes, const void *msg_ptr, long msg_len, long msg_prio,
2385 PRE_READ(msg_ptr, msg_len);
2391 (long res, long mqdes, const void *msg_ptr, long msg_len, long msg_prio,
2395 (long mqdes, void *msg_ptr, long msg_len, void *msg_prio,
2402 (long res, long mqdes, void *msg_ptr, long msg_len, int *msg_prio,
/openbsd-current/gnu/llvm/compiler-rt/include/sanitizer/
H A Dnetbsd_syscall_hooks.h1383 #define __sanitizer_syscall_pre_mq_send(mqdes, msg_ptr, msg_len, msg_prio) \
1385 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
1387 #define __sanitizer_syscall_post_mq_send(res, mqdes, msg_ptr, msg_len, \
1390 res, (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
1392 #define __sanitizer_syscall_pre_mq_receive(mqdes, msg_ptr, msg_len, msg_prio) \
1394 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
1396 #define __sanitizer_syscall_post_mq_receive(res, mqdes, msg_ptr, msg_len, \
1399 res, (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
1402 mqdes, msg_ptr, msg_len, msg_prio, abs_timeout) \
1404 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \
[all...]
/openbsd-current/sys/nfs/
H A Dnfs_boot.c336 int error, msg_len; local
373 msg_len = fxdr_unsigned(u_int32_t, reply->encap_len);

Completed in 311 milliseconds

123