/third_party/node/deps/openssl/openssl/ssl/ |
H A D | t1_trce.c | 24 # define ssl_trace_list(bio, indent, msg, msglen, value, table) \ 25 do_ssl_trace_list(bio, indent, msg, msglen, value, \ 41 const unsigned char *msg, size_t msglen, in do_ssl_trace_list() 46 if (msglen % vlen) in do_ssl_trace_list() 48 while (msglen) { in do_ssl_trace_list() 55 msglen -= vlen; in do_ssl_trace_list() 615 const unsigned char *msg, size_t msglen) in ssl_print_hex() 620 BIO_printf(bio, "%s (len=%d): ", name, (int)msglen); in ssl_print_hex() 621 for (i = 0; i < msglen; i++) in ssl_print_hex() 899 size_t extslen, msglen in ssl_print_extensions() local 40 do_ssl_trace_list(BIO *bio, int indent, const unsigned char *msg, size_t msglen, size_t vlen, const ssl_trace_tbl *tbl, size_t ntbl) do_ssl_trace_list() argument 614 ssl_print_hex(BIO *bio, int indent, const char *name, const unsigned char *msg, size_t msglen) ssl_print_hex() argument 948 ssl_print_client_hello(BIO *bio, const SSL *ssl, int indent, const unsigned char *msg, size_t msglen) ssl_print_client_hello() argument 1005 dtls_print_hello_vfyrequest(BIO *bio, int indent, const unsigned char *msg, size_t msglen) dtls_print_hello_vfyrequest() argument 1015 ssl_print_server_hello(BIO *bio, int indent, const unsigned char *msg, size_t msglen) ssl_print_server_hello() argument 1099 ssl_print_client_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_client_keyex() argument 1151 ssl_print_server_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_server_keyex() argument 1222 size_t msglen = *pmsglen; ssl_print_certificate() local 1254 ssl_print_certificates(BIO *bio, const SSL *ssl, int server, int indent, const unsigned char *msg, size_t msglen) ssl_print_certificates() argument 1284 ssl_print_cert_request(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_cert_request() argument 1373 ssl_print_ticket(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_ticket() argument 1422 ssl_print_handshake(BIO *bio, const SSL *ssl, int server, const unsigned char *msg, size_t msglen, int indent) ssl_print_handshake() argument 1531 SSL_trace(int write_p, int version, int content_type, const void *buf, size_t msglen, SSL *ssl, void *arg) SSL_trace() argument [all...] |
/third_party/openssl/ssl/ |
H A D | t1_trce.c | 24 # define ssl_trace_list(bio, indent, msg, msglen, value, table) \ 25 do_ssl_trace_list(bio, indent, msg, msglen, value, \ 41 const unsigned char *msg, size_t msglen, in do_ssl_trace_list() 46 if (msglen % vlen) in do_ssl_trace_list() 48 while (msglen) { in do_ssl_trace_list() 55 msglen -= vlen; in do_ssl_trace_list() 615 const unsigned char *msg, size_t msglen) in ssl_print_hex() 620 BIO_printf(bio, "%s (len=%d): ", name, (int)msglen); in ssl_print_hex() 621 for (i = 0; i < msglen; i++) in ssl_print_hex() 899 size_t extslen, msglen in ssl_print_extensions() local 40 do_ssl_trace_list(BIO *bio, int indent, const unsigned char *msg, size_t msglen, size_t vlen, const ssl_trace_tbl *tbl, size_t ntbl) do_ssl_trace_list() argument 614 ssl_print_hex(BIO *bio, int indent, const char *name, const unsigned char *msg, size_t msglen) ssl_print_hex() argument 948 ssl_print_client_hello(BIO *bio, const SSL *ssl, int indent, const unsigned char *msg, size_t msglen) ssl_print_client_hello() argument 1005 dtls_print_hello_vfyrequest(BIO *bio, int indent, const unsigned char *msg, size_t msglen) dtls_print_hello_vfyrequest() argument 1015 ssl_print_server_hello(BIO *bio, int indent, const unsigned char *msg, size_t msglen) ssl_print_server_hello() argument 1099 ssl_print_client_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_client_keyex() argument 1151 ssl_print_server_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_server_keyex() argument 1222 size_t msglen = *pmsglen; ssl_print_certificate() local 1254 ssl_print_certificates(BIO *bio, const SSL *ssl, int server, int indent, const unsigned char *msg, size_t msglen) ssl_print_certificates() argument 1284 ssl_print_cert_request(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_cert_request() argument 1373 ssl_print_ticket(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_ticket() argument 1422 ssl_print_handshake(BIO *bio, const SSL *ssl, int server, const unsigned char *msg, size_t msglen, int indent) ssl_print_handshake() argument 1531 SSL_trace(int write_p, int version, int content_type, const void *buf, size_t msglen, SSL *ssl, void *arg) SSL_trace() argument [all...] |
/third_party/lwip/src/netif/ppp/ |
H A D | upap.c | 130 static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen); 366 int msglen; in upap_rauthreq() local 411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) { in upap_rauthreq() 430 msglen = strlen(msg); in upap_rauthreq() 431 if (msglen > 255) in upap_rauthreq() 432 msglen = 255; in upap_rauthreq() 435 upap_sresp(pcb, retcode, id, msg, msglen); in upap_rauthreq() 459 u_char msglen; in upap_rauthack() local 472 GETCHAR(msglen, inp); in upap_rauthack() 473 if (msglen > in upap_rauthack() 494 u_char msglen; upap_rauthnak() local 567 upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen) upap_sresp() argument [all...] |
H A D | eap.c | 1018 int msglen; in eap_send_response() local 1020 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; in eap_send_response() 1021 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE); in eap_send_response() 1036 PUTSHORT(msglen, outp); in eap_send_response() 1051 int msglen; in eap_chap_response() local 1053 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + in eap_chap_response() 1055 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE); in eap_chap_response() 1070 PUTSHORT(msglen, outp); in eap_chap_response() 1097 int msglen; local 1099 msglen 1138 int msglen; global() local 1170 int msglen; eap_send_nak() local [all...] |
/third_party/ltp/utils/sctp/func_tests/ |
H A D | test_1_to_1_initmsg_connect.c | 42 int sk1, sk2, sk3, msglen; in test_sctp() local 87 msglen = strlen(message) + 1; in test_sctp() 88 TEST(sctp_sendmsg(sk1, message, msglen, (struct sockaddr *)&lstn_addr, in test_sctp() 91 if (TST_RET != msglen) { in test_sctp() 95 buffer_rcv = malloc(msglen); in test_sctp() 96 TEST(recv(sk2, buffer_rcv, msglen, MSG_NOSIGNAL)); in test_sctp() 98 if (TST_RET != msglen || strncmp(buffer_rcv, message, msglen)) { in test_sctp()
|
H A D | test_recvmsg.c | 70 int error, msglen, i; in main() local 142 for (i = 0, msglen = 30000; i < 15; i++, msglen-=2000) { in main() 146 test_check_msg_data(&inmessage, error, msglen, in main()
|
/third_party/musl/src/network/ |
H A D | res_send.c | 4 int __res_send(const unsigned char *msg, int msglen, unsigned char *answer, int anslen) in __res_send() argument 9 r = __res_send(msg, msglen, buf, sizeof buf); in __res_send() 13 r = __res_msend(1, &msg, &msglen, &answer, &anslen, anslen); in __res_send()
|
H A D | ns_parse.c | 50 int ns_initparse(const unsigned char *msg, int msglen, ns_msg *handle) in ns_initparse() argument 55 handle->_eom = msg + msglen; in ns_initparse() 56 if (msglen < (2 + ns_s_max) * NS_INT16SZ) goto bad; in ns_initparse()
|
/third_party/libwebsockets/minimal-examples/ws-server/minimal-ws-server-echo/ |
H A D | protocol_lws_minimal_server_echo.c | 35 uint32_t msglen; member 158 "last %d, bin %d, msglen %d (+ %d = %d))\n", in callback_minimal_server_echo() 162 lws_frame_is_binary(wsi), pss->msglen, (int)len, in callback_minimal_server_echo() 163 (int)pss->msglen + (int)len); in callback_minimal_server_echo() 181 pss->msglen = 0; in callback_minimal_server_echo() 183 pss->msglen += (uint32_t)len; in callback_minimal_server_echo()
|
/third_party/NuttX/drivers/usbdev/gadget/ |
H A D | rndis_std.h | 133 uint32_t msglen; /* MessageLength */ member 140 uint32_t msglen; /* MessageLength */ member 204 uint32_t msglen; /* MessageLength */ member 214 uint32_t msglen; /* MessageLength */ member
|
H A D | rndis.c | 848 msg->msglen = RNDIS_PACKET_HDR_SIZE + datalen; in rndis_fillrequest() 1035 priv->current_rx_msglen = msg->msglen; in rndis_recvpacket() 1155 hdr->msglen = size; in rndis_prepare_response() 1274 resp->hdr.msglen = sizeof(struct rndis_query_cmplt); in rndis_handle_control_message() 1354 resp->hdr.msglen += resp->buflen; in rndis_handle_control_message() 2015 ret = memcpy_s(ctrlreq->buf, hdr->msglen, priv->resp_buf, hdr->msglen); in usbclass_setup() 2023 ret = hdr->msglen; in usbclass_setup()
|
/third_party/ltp/testcases/network/stress/ns-tools/ |
H A D | ns-udpserver.c | 145 ssize_t msglen; /* the length of message */ in respond_to_client() local 168 if ((msglen = recvfrom(sock_fd, msgbuf, msgbuf_size, 0, in respond_to_client() 172 msgbuf[msglen] = '\0'; in respond_to_client() 178 if (sendto(sock_fd, msgbuf, msglen, 0, in respond_to_client() 180 sizeof(client_addr)) != msglen) in respond_to_client()
|
H A D | ns-mcast_receiver.c | 372 ssize_t msglen; /* the length of message */ in receive_mcast() local 408 msglen = recvfrom(sd, msgbuf, msgbuf_size, MSG_DONTWAIT, in receive_mcast() 410 if (msglen < 0) { in receive_mcast() 414 fprintf(stderr, "received %zd byte message\n", msglen); in receive_mcast()
|
/third_party/openssl/test/ |
H A D | clienthellotest.c | 71 size_t msglen; in test_client_hello() local 200 msglen = PACKET_remaining(&pkt); in test_client_hello() 239 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN); in test_client_hello()
|
/third_party/ltp/testcases/kernel/syscalls/recvmsg/ |
H A D | recvmsg02.c | 27 static const unsigned msglen = ARRAY_SIZE(msg) - 1; variable 66 R = sendto(sdw, msg, msglen, 0, (struct sockaddr*)&addr_r, addrlen_r); in verify_recvmsg()
|
/third_party/lwip/src/netif/ppp/polarssl/ |
H A D | md4.c | 248 unsigned char msglen[8]; in md4_finish() local 254 PUT_ULONG_LE( low, msglen, 0 ); in md4_finish() 255 PUT_ULONG_LE( high, msglen, 4 ); in md4_finish() 261 md4_update( ctx, msglen, 8 ); in md4_finish()
|
H A D | md5.c | 267 unsigned char msglen[8]; in md5_finish() local 273 PUT_ULONG_LE( low, msglen, 0 ); in md5_finish() 274 PUT_ULONG_LE( high, msglen, 4 ); in md5_finish() 280 md5_update( ctx, msglen, 8 ); in md5_finish()
|
H A D | sha1.c | 301 unsigned char msglen[8]; in sha1_finish() local 307 PUT_ULONG_BE( high, msglen, 0 ); in sha1_finish() 308 PUT_ULONG_BE( low, msglen, 4 ); in sha1_finish() 314 sha1_update( ctx, msglen, 8 ); in sha1_finish()
|
/third_party/toybox/toys/pending/ |
H A D | ip.c | 1576 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local 1581 if (msglen < 0) return 1; in display_route_info() 1609 tvar = msglen; in display_route_info() 1711 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local 1714 tvar = msglen; in display_route_info() 1734 int msglen = recv(sockfd, toybuf, sizeof(toybuf), 0); in display_route_info() local 1736 if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue; in display_route_info() 1737 else if (msglen < 0) { in display_route_info() 1741 } else if (!msglen) { in display_route_info() 1747 for (mhdr = (struct nlmsghdr*)toybuf; NLMSG_OK(mhdr, msglen); in display_route_info() 1842 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); route_get() local 2330 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); show_rules() local 2790 int msglen = recv(TT.sockfd, TT.gbuf, MESG_LEN, 0); filter_nlmesg() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 121 * |msglen| length of the message 130 const unsigned char *msg, size_t msglen, in OSSL_CRMF_pbm_new() 209 msg, msglen, mac_res, EVP_MAX_MD_SIZE, outlen) == NULL) in OSSL_CRMF_pbm_new() 128 OSSL_CRMF_pbm_new(OSSL_LIB_CTX *libctx, const char *propq, const OSSL_CRMF_PBMPARAMETER *pbmp, const unsigned char *msg, size_t msglen, const unsigned char *sec, size_t seclen, unsigned char **out, size_t *outlen) OSSL_CRMF_pbm_new() argument
|
/third_party/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 121 * |msglen| length of the message 130 const unsigned char *msg, size_t msglen, in OSSL_CRMF_pbm_new() 209 msg, msglen, mac_res, EVP_MAX_MD_SIZE, outlen) == NULL) in OSSL_CRMF_pbm_new() 128 OSSL_CRMF_pbm_new(OSSL_LIB_CTX *libctx, const char *propq, const OSSL_CRMF_PBMPARAMETER *pbmp, const unsigned char *msg, size_t msglen, const unsigned char *sec, size_t seclen, unsigned char **out, size_t *outlen) OSSL_CRMF_pbm_new() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | preauth.c | 135 size_t msglen; in rsn_preauth_eapol_send() local 144 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send() 148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send() 150 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | preauth.c | 150 size_t msglen; in rsn_preauth_eapol_send() local 159 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send() 163 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send() 165 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_write.c | 876 size_t msglen; in tls_send_client_key_exchange() local 880 msglen = 2000; in tls_send_client_key_exchange() 882 msglen += tls_client_cert_chain_der_len(conn); in tls_send_client_key_exchange() 884 msg = os_malloc(msglen); in tls_send_client_key_exchange() 889 end = msg + msglen; in tls_send_client_key_exchange()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_write.c | 864 size_t msglen; in tls_send_client_key_exchange() local 868 msglen = 2000; in tls_send_client_key_exchange() 870 msglen += tls_client_cert_chain_der_len(conn); in tls_send_client_key_exchange() 872 msg = os_malloc(msglen); in tls_send_client_key_exchange() 877 end = msg + msglen; in tls_send_client_key_exchange()
|