/openbsd/lib/libssl/ |
H A D | d1_both.c | 130 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 376 unsigned long msg_len; in dtls1_get_message() local 407 msg_len = msg_hdr->msg_len; in dtls1_get_message() 439 msg_len = msg_hdr->msg_len; in dtls1_preprocess_fragment() 467 s->d1->r_msg_hdr.msg_len = msg_len; in dtls1_preprocess_fragment() 471 } else if (msg_len != s->d1->r_msg_hdr.msg_len) { in dtls1_preprocess_fragment() 585 if (frag->msg_header.msg_len != msg_hdr->msg_len) { in dtls1_reassemble_fragment() 784 len = msg_hdr.msg_len; in dtls1_get_message_fragment() 963 frag->msg_header.msg_len = s->d1->w_msg_hdr.msg_len; in dtls1_buffer_message() 1105 msg_hdr->msg_len = len; in dtls1_set_message_header_int() [all …]
|
H A D | tls13_handshake_msg.c | 27 uint32_t msg_len; member 126 uint32_t msg_len; in tls13_handshake_msg_recv() local 144 if (!CBS_get_u24(&cbs, &msg_len)) in tls13_handshake_msg_recv() 148 if (msg_len > TLS13_HANDSHAKE_MSG_MAX_LEN) in tls13_handshake_msg_recv() 152 msg->msg_len = msg_len; in tls13_handshake_msg_recv() 156 TLS13_HANDSHAKE_MSG_HEADER_LEN + msg->msg_len, in tls13_handshake_msg_recv()
|
H A D | dtls_local.h | 87 unsigned long msg_len; member
|
/openbsd/usr.bin/ssh/ |
H A D | msg.c | 68 u_int msg_len; in ssh_msg_recv() local 78 msg_len = get_u32(buf); in ssh_msg_recv() 79 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv() 80 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv() 84 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv() 88 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
|
H A D | ssh-pkcs11-helper.c | 257 u_int msg_len; in process() local 268 msg_len = get_u32(cp); in process() 269 if (msg_len > MAX_MSG_LENGTH) { in process() 270 error("bad message len %d", msg_len); in process() 273 if (buf_len < msg_len + 4) in process() 302 if (msg_len < consumed) { in process() 303 error("msg_len %d < consumed %d", msg_len, consumed); in process() 306 if (msg_len > consumed) { in process() 307 if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
|
H A D | umac.c | 778 UINT32 msg_len; /* Total length of data passed */ member 934 pc->msg_len = 0; in uhash_reset() 1052 if (ctx->msg_len + len <= L1_KEY_LEN) { in uhash_update() 1054 ctx->msg_len += len; in uhash_update() 1057 bytes_hashed = ctx->msg_len % L1_KEY_LEN; in uhash_update() 1058 if (ctx->msg_len == L1_KEY_LEN) in uhash_update() 1070 ctx->msg_len += bytes_remaining; in uhash_update() 1080 ctx->msg_len += L1_KEY_LEN; in uhash_update() 1090 ctx->msg_len += len; in uhash_update() 1105 if (ctx->msg_len > L1_KEY_LEN) { in uhash_final() [all …]
|
H A D | monitor_wrap.c | 168 u_int msg_len; in mm_request_receive() local 181 msg_len = PEEK_U32(buf); in mm_request_receive() 182 if (msg_len > 256 * 1024) in mm_request_receive() 183 fatal_f("read: bad msg_len %d", msg_len); in mm_request_receive() 185 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) in mm_request_receive() 187 if (atomicio(read, sock, p, msg_len) != msg_len) { in mm_request_receive()
|
H A D | sftp-server.c | 1772 u_int msg_len; in process() local 1784 msg_len = get_u32(cp); in process() 1785 if (msg_len > SFTP_MAX_MSG_LENGTH) { in process() 1790 if (buf_len < msg_len + 4) in process() 1835 if (msg_len < consumed) { in process() 1836 error("msg_len %u < consumed %u", msg_len, consumed); in process() 1839 if (msg_len > consumed && in process() 1840 (r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
|
/openbsd/lib/libcrypto/sm2/ |
H A D | sm2_crypt.c | 147 if (msg_len <= overhead) { in SM2_plaintext_size() 152 *pl_size = msg_len - overhead; in SM2_plaintext_size() 383 if ((msg_mask = calloc(1, msg_len)) == NULL) { in SM2_encrypt() 393 for (i = 0; i != msg_len; i++) in SM2_encrypt() 406 if (!EVP_DigestUpdate(hash, msg, msg_len)) { in SM2_encrypt() 476 int msg_len = 0, rc = 0; in SM2_decrypt() local 509 msg_len = sm2_ctext->C2->length; in SM2_decrypt() 526 if ((msg_mask = calloc(1, msg_len)) == NULL) { in SM2_decrypt() 576 for (i = 0; i != msg_len; ++i) in SM2_decrypt() 594 if (!EVP_DigestUpdate(hash, ptext_buf, msg_len)) { in SM2_decrypt() [all …]
|
H A D | sm2.h | 44 int SM2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 47 int SM2_plaintext_size(const EC_KEY *key, const EVP_MD *digest, size_t msg_len, 51 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len);
|
H A D | sm2_sign.c | 32 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_compute_msg_hash() argument 69 if (!EVP_DigestUpdate(hash, msg, msg_len)) { in sm2_compute_msg_hash() 353 size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_do_sign() argument 358 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len); in sm2_do_sign() 373 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len) in sm2_do_verify() argument 378 e = sm2_compute_msg_hash(digest, key, uid, uid_len, msg, msg_len); in sm2_do_verify()
|
H A D | sm2_local.h | 33 const uint8_t *uid, size_t uid_len, const uint8_t *msg, size_t msg_len); 37 const uint8_t *msg, size_t msg_len);
|
/openbsd/regress/lib/libcrypto/sm2/ |
H A D | sm2crypttest.c | 97 const size_t msg_len = strlen(message); in test_sm2() local 105 size_t recovered_len = msg_len; in test_sm2() 121 if (!SM2_ciphertext_size(key, digest, msg_len, &ctext_len)) in test_sm2() 127 rc = SM2_encrypt(key, digest, (const uint8_t *)message, msg_len, ctext, &ctext_len); in test_sm2() 132 recovered = calloc(1, msg_len); in test_sm2() 139 if (recovered_len != msg_len) in test_sm2() 141 if (memcmp(recovered, message, msg_len) != 0) in test_sm2()
|
H A D | sm2sigtest.c | 99 const size_t msg_len = strlen(message); in test_sm2() local 119 (const uint8_t *)message, msg_len); in test_sm2() 127 (const uint8_t *)message, msg_len); in test_sm2()
|
/openbsd/usr.sbin/ldpd/ |
H A D | packet.c | 142 uint16_t msg_len; in disc_recv_packet() local 240 msg_len = ntohs(msg.length); in disc_recv_packet() 241 if (msg_len < LDP_MSG_LEN || ((msg_len + LDP_MSG_DEAD_LEN) > pdu_len)) { in disc_recv_packet() 430 uint16_t pdu_len, msg_len, msg_size, max_pdu_len; in session_read() local 496 msg_len = ntohs(msg->length); in session_read() 497 if (msg_len < LDP_MSG_LEN || in session_read() 498 (msg_len + LDP_MSG_DEAD_LEN) > pdu_len) { in session_read() 504 msg_size = msg_len + LDP_MSG_DEAD_LEN; in session_read()
|
/openbsd/sys/kern/ |
H A D | sysv_msg.c | 539 que->msqid_ds.msg_cbytes += msg->msg_len; in msg_enqueue() 550 que->msqid_ds.msg_cbytes -= msg->msg_len; in msg_dequeue() 589 msg->msg_len = 0; in msg_copyin() 592 while (msg->msg_len < len) { in msg_copyin() 601 msg->msg_len += xfer; in msg_copyin() 625 if (msg->msg_len > MSGMAX) in msg_copyout() 630 xfer = min(*len, msg->msg_len); in msg_copyout()
|
/openbsd/usr.bin/gencat/ |
H A D | gencat.c | 569 int msg_len = strlen(msg->str) + 1; in MCWriteCat() local 572 msg_hdr->__msglen = htonl(msg_len); in MCWriteCat() 575 memcpy(strings, msg->str, msg_len); in MCWriteCat() 576 strings += msg_len; in MCWriteCat() 577 msg_offset += msg_len; in MCWriteCat()
|
/openbsd/sbin/unwind/libunbound/libunbound/ |
H A D | context.c | 372 q->msg_len = 0; in context_deserialize_answer() 379 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer() 381 q->msg_len); in context_deserialize_answer() 384 q->msg_len = 0; in context_deserialize_answer()
|
H A D | context.h | 174 size_t msg_len; member
|
/openbsd/usr.sbin/unbound/libunbound/ |
H A D | context.c | 372 q->msg_len = 0; in context_deserialize_answer() 379 q->msg_len = len - size_of_uint32s - wlen; in context_deserialize_answer() 381 q->msg_len); in context_deserialize_answer() 384 q->msg_len = 0; in context_deserialize_answer()
|
H A D | context.h | 174 size_t msg_len; member
|
/openbsd/gnu/llvm/compiler-rt/include/sanitizer/ |
H A D | netbsd_syscall_hooks.h | 3889 long long msg_len, 3895 long long msg_len, 3899 long long msg_len, 3903 long long msg_len, 3907 long long res, long long mqdes, long long msg_ptr, long long msg_len, 3910 long long mqdes, long long msg_ptr, long long msg_len, long long msg_prio, 3913 long long res, long long mqdes, long long msg_ptr, long long msg_len, 4637 long long msg_len, 4641 long long res, long long mqdes, long long msg_ptr, long long msg_len, 4645 long long msg_len, [all …]
|
/openbsd/sys/sys/ |
H A D | msg.h | 61 size_t msg_len; member
|
/openbsd/regress/lib/libc/sys/ |
H A D | t_recvmmsg.c | 146 ATF_CHECK_EQ_MSG(mmsghdr[i].msg_len, in ATF_TC_BODY()
|
/openbsd/sys/nfs/ |
H A D | nfs_boot.c | 336 int error, msg_len; in bp_whoami() local 373 msg_len = fxdr_unsigned(u_int32_t, reply->encap_len); in bp_whoami()
|