/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_dtls.c | 21 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 331 size_t msg_len; in dtls_get_message() local 363 msg_len = msg_hdr->msg_len; in dtls_get_message() 367 l2n3(msg_len, p); in dtls_get_message() 370 l2n3(msg_len, p); in dtls_get_message() 439 msg_len = msg_hdr->msg_len; in dtls1_preprocess_fragment() 461 s->d1->r_msg_hdr.msg_len = msg_len; in dtls1_preprocess_fragment() 465 } else if (msg_len != s->d1->r_msg_hdr.msg_len) { in dtls1_preprocess_fragment() 628 if (frag->msg_header.msg_len != msg_hdr->msg_len) { in dtls1_reassemble_fragment() 859 mlen = msg_hdr.msg_len; in dtls_get_reassembled_message() [all …]
|
/freebsd/crypto/openssh/ |
H A D | msg.c | 69 u_int msg_len; in ssh_msg_recv() local 79 msg_len = get_u32(buf); in ssh_msg_recv() 80 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv() 81 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv() 85 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv() 89 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
|
H A D | ssh-pkcs11-helper.c | 256 u_int msg_len; in process() local 267 msg_len = get_u32(cp); in process() 268 if (msg_len > MAX_MSG_LENGTH) { in process() 269 error("bad message len %d", msg_len); in process() 272 if (buf_len < msg_len + 4) in process() 301 if (msg_len < consumed) { in process() 302 error("msg_len %d < consumed %d", msg_len, consumed); in process() 305 if (msg_len > consumed) { in process() 306 if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
|
H A D | umac.c | 782 UINT32 msg_len; /* Total length of data passed */ member 938 pc->msg_len = 0; in uhash_reset() 1056 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update() 1058 ctx->msg_len += len; in uhash_update() 1061 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update() 1062 if (ctx->msg_len == L1_KEY_LEN) in uhash_update() 1074 ctx->msg_len += bytes_remaining; in uhash_update() 1084 ctx->msg_len += L1_KEY_LEN; in uhash_update() 1094 ctx->msg_len += len; in uhash_update() 1109 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final() [all …]
|
/freebsd/sys/dev/ipmi/ |
H A D | ipmi_opal.c | 91 *msg_len = sizeof(struct opal_ipmi_msg) + IPMI_MAX_RX; in opal_ipmi_recv() 95 vtophys(sc->sc_msg), vtophys(msg_len)); in opal_ipmi_recv() 112 sc->sc_msg->data[0], *msg_len); in opal_ipmi_recv() 126 uint64_t msg_len; in opal_ipmi_discard_msgs() local 133 err = opal_ipmi_recv(sc, &msg_len, 100); in opal_ipmi_discard_msgs() 137 err = opal_ipmi_recv(sc, &msg_len, 10); in opal_ipmi_discard_msgs() 148 uint64_t msg_len; in opal_ipmi_polled_request() local 169 msg_len = sizeof(*sc->sc_msg) + req->ir_requestlen; in opal_ipmi_polled_request() 171 msg_len); in opal_ipmi_polled_request() 174 sc->sc_msg->cmd, sc->sc_msg->netfn, msg_len, err); in opal_ipmi_polled_request() [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | print-olsr.c | 94 nd_uint16_t msg_len; member 104 nd_uint16_t msg_len; member 322 u_int msg_type, msg_len, msg_tlen, hello_len; in olsr_print() local 369 msg_len = GET_BE_U_2(msgptr.v6->msg_len); in olsr_print() 370 if ((msg_len >= sizeof (struct olsr_msg6)) in olsr_print() 371 && (msg_len <= length)) in olsr_print() 375 if (msg_type == 0 || msg_len == 0) { in olsr_print() 400 msg_len = GET_BE_U_2(msgptr.v4->msg_len); in olsr_print() 402 && (msg_len <= length)) in olsr_print() 406 if (msg_type == 0 || msg_len == 0) { in olsr_print() [all …]
|
H A D | print-ldp.c | 576 u_short pdu_len,msg_len,msg_type; in ldp_pdu_print() local 623 msg_len=GET_BE_U_2(ldp_msg_header->length); in ldp_pdu_print() 626 if (msg_len < sizeof(struct ldp_msg_header)-4) { in ldp_pdu_print() 634 msg_len, in ldp_pdu_print() 645 msg_len, in ldp_pdu_print() 650 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ in ldp_pdu_print() 653 ND_TCHECK_LEN(tptr, msg_len); in ldp_pdu_print() 692 msg_len); in ldp_pdu_print() 694 tptr += msg_len+4; in ldp_pdu_print() 695 tlen -= msg_len+4; in ldp_pdu_print()
|
/freebsd/crypto/openssl/crypto/sm2/ |
H A D | sm2_crypt.c | 89 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() argument 110 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument 201 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt() 214 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt() 224 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt() 290 int msg_len = 0; in ossl_sm2_decrypt() local 314 msg_len = sm2_ctext->C2->length; in ossl_sm2_decrypt() 315 if (*ptext_len < (size_t)msg_len) { in ossl_sm2_decrypt() 335 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_decrypt() 367 for (i = 0; i != msg_len; ++i) in ossl_sm2_decrypt() [all …]
|
H A D | sm2_sign.c | 145 const uint8_t *msg, size_t msg_len) in sm2_compute_msg_hash() argument 179 || !EVP_DigestUpdate(hash, msg, msg_len) in sm2_compute_msg_hash() 395 const uint8_t *msg, size_t msg_len) in ossl_sm2_do_sign() argument 400 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign() 418 const uint8_t *msg, size_t msg_len) in ossl_sm2_do_verify() argument 423 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_verify()
|
/freebsd/crypto/openssl/test/ |
H A D | sm2_internal_test.c | 140 const size_t msg_len = strlen(message); in test_sm2_crypt() local 149 size_t recovered_len = msg_len; in test_sm2_crypt() 166 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, in test_sm2_crypt() 176 (const uint8_t *)message, msg_len, in test_sm2_crypt() 187 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt() 194 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt() 195 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt() 310 const size_t msg_len = strlen(message); in test_sm2_sign() local 338 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 354 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | sm2.h | 41 const uint8_t *msg, size_t msg_len); 48 const uint8_t *msg, size_t msg_len); 68 size_t msg_len, size_t *ct_size); 75 const uint8_t *msg, size_t msg_len,
|
/freebsd/sys/arm/broadcom/bcm2835/ |
H A D | bcm2835_firmware.c | 116 size_t msg_len; in bcm2835_firmware_property() local 126 msg_len = sizeof(*msg_hdr) + len + sizeof(uint32_t); in bcm2835_firmware_property() 127 msg_hdr = malloc(sizeof(*msg_hdr) + msg_len + sizeof(uint32_t), in bcm2835_firmware_property() 130 msg_hdr->hdr.buf_size = msg_len; in bcm2835_firmware_property() 137 err = bcm2835_mbox_property(msg_hdr, msg_len); in bcm2835_firmware_property()
|
/freebsd/sys/dev/qat/qat_common/ |
H A D | adf_pfvf_vf_proto.c | 253 unsigned int msg_len; in adf_send_vf2pf_blkmsg_req() local 306 msg_len = in adf_send_vf2pf_blkmsg_req() 308 msg_len = min(*buffer_len, msg_len); in adf_send_vf2pf_blkmsg_req() 311 for (index = ADF_PFVF_BLKMSG_HEADER_SIZE; index < msg_len; index++) { in adf_send_vf2pf_blkmsg_req() 320 ret = adf_vf2pf_blkmsg_get_crc(accel_dev, type, msg_len, &remote_crc); in adf_send_vf2pf_blkmsg_req() 324 local_crc = adf_pfvf_calc_blkmsg_crc(buffer, msg_len); in adf_send_vf2pf_blkmsg_req() 335 *buffer_len = msg_len; in adf_send_vf2pf_blkmsg_req()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
/freebsd/lib/libtacplus/ |
H A D | taclib_private.h | 81 u_int16_t msg_len; member 108 u_int16_t msg_len; member 127 u_int16_t msg_len; member
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | preauth_test.c | 52 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 56 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 57 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 79 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 81 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
/freebsd/lib/libsys/ |
H A D | recvmmsg.c | 69 msgvec[0].msg_len = ret; in recvmmsg() 90 msgvec[i].msg_len = ret; in recvmmsg()
|
H A D | sendmmsg.c | 57 msgvec[i].msg_len = ret; in sendmmsg()
|
/freebsd/lib/libpam/modules/pam_tacplus/ |
H A D | pam_tacplus.c | 156 size_t msg_len; in pam_sm_authenticate() local 248 srvr_msg = (char *)tac_get_data(tach, &msg_len); in pam_sm_authenticate() 249 if (srvr_msg != NULL && msg_len != 0) { in pam_sm_authenticate()
|
/freebsd/sys/dev/iavf/ |
H A D | iavf_vc_common.c | 290 memcpy(sc->vf_res, event.msg_buf, min(event.msg_len, len)); in iavf_get_vf_config() 693 int msg_len, key_length; in iavf_config_rss_key() local 705 msg_len = sizeof(struct virtchnl_rss_key) + (sizeof(u8) * key_length) - 1; in iavf_config_rss_key() 707 malloc(msg_len, M_IAVF, M_NOWAIT | M_ZERO); in iavf_config_rss_key() 721 (u8 *)rss_key_msg, msg_len); in iavf_config_rss_key() 769 int msg_len; in iavf_config_rss_lut() local 775 msg_len = sizeof(struct virtchnl_rss_lut) + (lut_length * sizeof(u8)) - 1; in iavf_config_rss_lut() 777 malloc(msg_len, M_IAVF, M_NOWAIT | M_ZERO); in iavf_config_rss_lut() 805 (u8 *)rss_lut_msg, msg_len); in iavf_config_rss_lut()
|
/freebsd/sys/dev/atopcase/ |
H A D | atopcase.c | 140 uint16_t msg_len) in atopcase_process_message() argument 150 if (pl_len + sizeof(*hdr) + sizeof(crc) != msg_len) { in atopcase_process_message() 157 if (crc != crc16(0, msg, msg_len - sizeof(crc))) { in atopcase_process_message() 216 uint16_t length, remaining, offset, msg_len; in atopcase_receive_packet() local 300 msg_len = sc->sc_msg_len; in atopcase_receive_packet() 303 msg_len = length; in atopcase_receive_packet() 307 err = atopcase_process_message(sc, pkt.device, msg, msg_len); in atopcase_receive_packet()
|
/freebsd/usr.bin/gencat/ |
H A D | gencat.c | 554 int msg_len = strlen(msg->str) + 1; local 557 msg_hdr->__msglen = htonl(msg_len); 560 memcpy(strings, msg->str, msg_len); 561 strings += msg_len; 562 msg_offset += msg_len;
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-ED25519.pod | 69 void do_sign(EVP_PKEY *ed_key, unsigned char *msg, size_t msg_len) 77 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len); 80 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
|
/freebsd/contrib/libpcap/ |
H A D | pcap-netfilter-linux.c | 149 uint32_t msg_len; in netfilter_read_linux() local 279 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); in netfilter_read_linux() 292 if (msg_len > (uint32_t)(ep - bp)) in netfilter_read_linux() 293 msg_len = (uint32_t)(ep - bp); in netfilter_read_linux() 295 bp += msg_len; in netfilter_read_linux()
|
/freebsd/contrib/unbound/libunbound/ |
H A D | context.c | 370 q->msg_len = 0; in context_deserialize_answer() 377 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer() 379 q->msg_len); in context_deserialize_answer() 382 q->msg_len = 0; in context_deserialize_answer()
|