/openbsd-current/usr.bin/ssh/ |
H A D | msg.c | 68 u_int msg_len; local 78 msg_len = get_u32(buf); 79 if (msg_len > sshbuf_max_size(m)) { 80 error_f("read: bad msg_len %u", msg_len); 84 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { 88 if (atomicio(read, fd, p, msg_len) != msg_len) {
|
H A D | ssh-pkcs11-helper.c | 245 u_int msg_len; local 256 msg_len = get_u32(cp); 257 if (msg_len > MAX_MSG_LENGTH) { 258 error("bad message len %d", msg_len); 261 if (buf_len < msg_len + 4) 290 if (msg_len < consumed) { 291 error("msg_len %d < consumed %d", msg_len, consumed); 294 if (msg_len > consumed) { 295 if ((r = sshbuf_consume(iqueue, msg_len [all...] |
H A D | umac.c | 778 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx 934 pc->msg_len = 0; 1052 if (ctx->msg_len + len <= L1_KEY_LEN) { 1054 ctx->msg_len += len; 1057 bytes_hashed = ctx->msg_len % L1_KEY_LEN; 1058 if (ctx->msg_len == L1_KEY_LEN) 1070 ctx->msg_len += bytes_remaining; 1080 ctx->msg_len += L1_KEY_LEN; 1090 ctx->msg_len += len; 1105 if (ctx->msg_len > L1_KEY_LE [all...] |
H A D | monitor_wrap.c | 178 u_int msg_len; local 191 msg_len = PEEK_U32(buf); 192 if (msg_len > 256 * 1024) 193 fatal_f("read: bad msg_len %d", msg_len); 195 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) 197 if (atomicio(read, sock, p, msg_len) != msg_len) {
|
/openbsd-current/lib/libcrypto/sm2/ |
H A D | sm2_local.h | 33 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len); 37 const uint8_t *msg, size_t msg_len);
|
H A D | sm2.h | 48 int SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 51 int SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 55 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len);
|
H A D | sm2_crypt.c | 130 SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, argument 147 if (msg_len <= overhead) { 152 *pl_size = msg_len - overhead; 157 SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, argument 175 ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); 248 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) 383 if ((msg_mask = calloc(1, msg_len)) == NULL) { 388 if (!sm2_kdf(msg_mask, msg_len, x2y2, 2 * field_size, digest)) { 393 for (i = 0; i != msg_len; i++) 406 if (!EVP_DigestUpdate(hash, msg, msg_len)) { 247 SM2_encrypt(const EC_KEY *key, const EVP_MD *digest, const uint8_t *msg, size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) argument 476 int msg_len = 0, rc = 0; local [all...] |
H A D | sm2_sign.c | 32 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) 69 if (!EVP_DigestUpdate(hash, msg, msg_len)) { 353 size_t uid_len, const uint8_t *msg, size_t msg_len) 358 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len); 373 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) 378 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len); 31 sm2_compute_msg_hash(const EVP_MD *digest, const EC_KEY *key, const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) argument 352 sm2_do_sign(const EC_KEY *key, const EVP_MD *digest, const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) argument 372 sm2_do_verify(const EC_KEY *key, const EVP_MD *digest, const ECDSA_SIG *sig, const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) argument
|
/openbsd-current/lib/libssl/ |
H A D | d1_both.c | 130 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 143 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 145 OPENSSL_assert((msg_len) > 0); \ 147 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 148 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 242 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH); 332 0, msg_hdr->msg_len, p)) 376 unsigned long msg_len; local 437 size_t frag_off, frag_len, msg_len; local 1174 uint32_t msg_len, frag_off, frag_len; local [all...] |
H A D | tls13_handshake_msg.c | 27 uint32_t msg_len; member in struct:tls13_handshake_msg 126 uint32_t msg_len; local 144 if (!CBS_get_u24(&cbs, &msg_len)) 148 if (msg_len > TLS13_HANDSHAKE_MSG_MAX_LEN) 152 msg->msg_len = msg_len; 156 TLS13_HANDSHAKE_MSG_HEADER_LEN + msg->msg_len,
|
H A D | dtls_local.h | 87 unsigned long msg_len; member in struct:hm_header_st
|
/openbsd-current/regress/lib/libcrypto/sm2/ |
H A D | sm2crypttest.c | 97 const size_t msg_len = strlen(message); local 105 size_t recovered_len = msg_len; 121 if (!SM2_ciphertext_size(key, digest, msg_len, &ctext_len)) 127 rc = SM2_encrypt(key, digest, (const uint8_t *)message, msg_len, ctext, &ctext_len); 132 recovered = calloc(1, msg_len); 139 if (recovered_len != msg_len) 141 if (memcmp(recovered, message, msg_len) != 0)
|
H A D | sm2sigtest.c | 99 const size_t msg_len = strlen(message); local 119 (const uint8_t *)message, msg_len); 127 (const uint8_t *)message, msg_len);
|
/openbsd-current/usr.sbin/ldpd/ |
H A D | packet.c | 142 uint16_t msg_len; local 240 msg_len = ntohs(msg.length); 241 if (msg_len < LDP_MSG_LEN || ((msg_len + LDP_MSG_DEAD_LEN) > pdu_len)) { 430 uint16_t pdu_len, msg_len, msg_size, max_pdu_len; local 496 msg_len = ntohs(msg->length); 497 if (msg_len < LDP_MSG_LEN || 498 (msg_len + LDP_MSG_DEAD_LEN) > pdu_len) { 504 msg_size = msg_len + LDP_MSG_DEAD_LEN;
|
/openbsd-current/sys/sys/ |
H A D | msg.h | 61 size_t msg_len; member in struct:msg
|
/openbsd-current/usr.bin/gencat/ |
H A D | gencat.c | 569 int msg_len = strlen(msg->str) + 1; local 572 msg_hdr->__msglen = htonl(msg_len); 575 memcpy(strings, msg->str, msg_len); 576 strings += msg_len; 577 msg_offset += msg_len;
|
/openbsd-current/sys/kern/ |
H A D | sysv_msg.c | 539 que->msqid_ds.msg_cbytes += msg->msg_len; 550 que->msqid_ds.msg_cbytes -= msg->msg_len; 589 msg->msg_len = 0; 592 while (msg->msg_len < len) { 601 msg->msg_len += xfer; 625 if (msg->msg_len > MSGMAX) 630 xfer = min(*len, msg->msg_len);
|
/openbsd-current/sbin/unwind/libunbound/libunbound/ |
H A D | context.h | 174 size_t msg_len; member in struct:ctx_query
|
H A D | context.c | 370 q->msg_len = 0; 377 q->msg_len = len - size_of_uint32s - wlen; 379 q->msg_len); 382 q->msg_len = 0;
|
/openbsd-current/usr.sbin/unbound/libunbound/ |
H A D | context.h | 174 size_t msg_len; member in struct:ctx_query
|
H A D | context.c | 370 q->msg_len = 0; 377 q->msg_len = len - size_of_uint32s - wlen; 379 q->msg_len); 382 q->msg_len = 0;
|
/openbsd-current/regress/lib/libc/sys/ |
H A D | t_recvmmsg.c | 146 ATF_CHECK_EQ_MSG(mmsghdr[i].msg_len,
|
/openbsd-current/gnu/llvm/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_syscalls.inc | 108 unsigned msg_len; 187 POST_WRITE(&msg->msg_len, sizeof(msg->msg_len)); 2382 (long mqdes, const void *msg_ptr, long msg_len, long msg_prio, 2385 PRE_READ(msg_ptr, msg_len); 2391 (long res, long mqdes, const void *msg_ptr, long msg_len, long msg_prio, 2395 (long mqdes, void *msg_ptr, long msg_len, void *msg_prio, 2402 (long res, long mqdes, void *msg_ptr, long msg_len, int *msg_prio,
|
/openbsd-current/gnu/llvm/compiler-rt/include/sanitizer/ |
H A D | netbsd_syscall_hooks.h | 1383 #define __sanitizer_syscall_pre_mq_send(mqdes, msg_ptr, msg_len, msg_prio) \ 1385 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ 1387 #define __sanitizer_syscall_post_mq_send(res, mqdes, msg_ptr, msg_len, \ 1390 res, (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ 1392 #define __sanitizer_syscall_pre_mq_receive(mqdes, msg_ptr, msg_len, msg_prio) \ 1394 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ 1396 #define __sanitizer_syscall_post_mq_receive(res, mqdes, msg_ptr, msg_len, \ 1399 res, (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ 1402 mqdes, msg_ptr, msg_len, msg_prio, abs_timeout) \ 1404 (long long)(mqdes), (long long)(msg_ptr), (long long)(msg_len), \ [all...] |
/openbsd-current/sys/nfs/ |
H A D | nfs_boot.c | 336 int error, msg_len; local 373 msg_len = fxdr_unsigned(u_int32_t, reply->encap_len);
|