Home
last modified time | relevance | path

Searched refs:msglen (Results 1 - 25 of 118) sorted by relevance

12345

/third_party/node/deps/openssl/openssl/ssl/
H A Dt1_trce.c24 # define ssl_trace_list(bio, indent, msg, msglen, value, table) \
25 do_ssl_trace_list(bio, indent, msg, msglen, value, \
41 const unsigned char *msg, size_t msglen, in do_ssl_trace_list()
46 if (msglen % vlen) in do_ssl_trace_list()
48 while (msglen) { in do_ssl_trace_list()
55 msglen -= vlen; in do_ssl_trace_list()
615 const unsigned char *msg, size_t msglen) in ssl_print_hex()
620 BIO_printf(bio, "%s (len=%d): ", name, (int)msglen); in ssl_print_hex()
621 for (i = 0; i < msglen; i++) in ssl_print_hex()
899 size_t extslen, msglen in ssl_print_extensions() local
40 do_ssl_trace_list(BIO *bio, int indent, const unsigned char *msg, size_t msglen, size_t vlen, const ssl_trace_tbl *tbl, size_t ntbl) do_ssl_trace_list() argument
614 ssl_print_hex(BIO *bio, int indent, const char *name, const unsigned char *msg, size_t msglen) ssl_print_hex() argument
948 ssl_print_client_hello(BIO *bio, const SSL *ssl, int indent, const unsigned char *msg, size_t msglen) ssl_print_client_hello() argument
1005 dtls_print_hello_vfyrequest(BIO *bio, int indent, const unsigned char *msg, size_t msglen) dtls_print_hello_vfyrequest() argument
1015 ssl_print_server_hello(BIO *bio, int indent, const unsigned char *msg, size_t msglen) ssl_print_server_hello() argument
1099 ssl_print_client_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_client_keyex() argument
1151 ssl_print_server_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_server_keyex() argument
1222 size_t msglen = *pmsglen; ssl_print_certificate() local
1254 ssl_print_certificates(BIO *bio, const SSL *ssl, int server, int indent, const unsigned char *msg, size_t msglen) ssl_print_certificates() argument
1284 ssl_print_cert_request(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_cert_request() argument
1373 ssl_print_ticket(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_ticket() argument
1422 ssl_print_handshake(BIO *bio, const SSL *ssl, int server, const unsigned char *msg, size_t msglen, int indent) ssl_print_handshake() argument
1531 SSL_trace(int write_p, int version, int content_type, const void *buf, size_t msglen, SSL *ssl, void *arg) SSL_trace() argument
[all...]
/third_party/openssl/ssl/
H A Dt1_trce.c24 # define ssl_trace_list(bio, indent, msg, msglen, value, table) \
25 do_ssl_trace_list(bio, indent, msg, msglen, value, \
41 const unsigned char *msg, size_t msglen, in do_ssl_trace_list()
46 if (msglen % vlen) in do_ssl_trace_list()
48 while (msglen) { in do_ssl_trace_list()
55 msglen -= vlen; in do_ssl_trace_list()
615 const unsigned char *msg, size_t msglen) in ssl_print_hex()
620 BIO_printf(bio, "%s (len=%d): ", name, (int)msglen); in ssl_print_hex()
621 for (i = 0; i < msglen; i++) in ssl_print_hex()
899 size_t extslen, msglen in ssl_print_extensions() local
40 do_ssl_trace_list(BIO *bio, int indent, const unsigned char *msg, size_t msglen, size_t vlen, const ssl_trace_tbl *tbl, size_t ntbl) do_ssl_trace_list() argument
614 ssl_print_hex(BIO *bio, int indent, const char *name, const unsigned char *msg, size_t msglen) ssl_print_hex() argument
948 ssl_print_client_hello(BIO *bio, const SSL *ssl, int indent, const unsigned char *msg, size_t msglen) ssl_print_client_hello() argument
1005 dtls_print_hello_vfyrequest(BIO *bio, int indent, const unsigned char *msg, size_t msglen) dtls_print_hello_vfyrequest() argument
1015 ssl_print_server_hello(BIO *bio, int indent, const unsigned char *msg, size_t msglen) ssl_print_server_hello() argument
1099 ssl_print_client_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_client_keyex() argument
1151 ssl_print_server_keyex(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_server_keyex() argument
1222 size_t msglen = *pmsglen; ssl_print_certificate() local
1254 ssl_print_certificates(BIO *bio, const SSL *ssl, int server, int indent, const unsigned char *msg, size_t msglen) ssl_print_certificates() argument
1284 ssl_print_cert_request(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_cert_request() argument
1373 ssl_print_ticket(BIO *bio, int indent, const SSL *ssl, const unsigned char *msg, size_t msglen) ssl_print_ticket() argument
1422 ssl_print_handshake(BIO *bio, const SSL *ssl, int server, const unsigned char *msg, size_t msglen, int indent) ssl_print_handshake() argument
1531 SSL_trace(int write_p, int version, int content_type, const void *buf, size_t msglen, SSL *ssl, void *arg) SSL_trace() argument
[all...]
/third_party/lwip/src/netif/ppp/
H A Dupap.c130 static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen);
366 int msglen; in upap_rauthreq() local
411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) { in upap_rauthreq()
430 msglen = strlen(msg); in upap_rauthreq()
431 if (msglen > 255) in upap_rauthreq()
432 msglen = 255; in upap_rauthreq()
435 upap_sresp(pcb, retcode, id, msg, msglen); in upap_rauthreq()
459 u_char msglen; in upap_rauthack() local
472 GETCHAR(msglen, inp); in upap_rauthack()
473 if (msglen > in upap_rauthack()
494 u_char msglen; upap_rauthnak() local
567 upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen) upap_sresp() argument
[all...]
H A Deap.c1018 int msglen; in eap_send_response() local
1020 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; in eap_send_response()
1021 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE); in eap_send_response()
1036 PUTSHORT(msglen, outp); in eap_send_response()
1051 int msglen; in eap_chap_response() local
1053 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + in eap_chap_response()
1055 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE); in eap_chap_response()
1070 PUTSHORT(msglen, outp); in eap_chap_response()
1097 int msglen; local
1099 msglen
1138 int msglen; global() local
1170 int msglen; eap_send_nak() local
[all...]
/third_party/ltp/utils/sctp/func_tests/
H A Dtest_1_to_1_initmsg_connect.c42 int sk1, sk2, sk3, msglen; in test_sctp() local
87 msglen = strlen(message) + 1; in test_sctp()
88 TEST(sctp_sendmsg(sk1, message, msglen, (struct sockaddr *)&lstn_addr, in test_sctp()
91 if (TST_RET != msglen) { in test_sctp()
95 buffer_rcv = malloc(msglen); in test_sctp()
96 TEST(recv(sk2, buffer_rcv, msglen, MSG_NOSIGNAL)); in test_sctp()
98 if (TST_RET != msglen || strncmp(buffer_rcv, message, msglen)) { in test_sctp()
H A Dtest_recvmsg.c70 int error, msglen, i; in main() local
142 for (i = 0, msglen = 30000; i < 15; i++, msglen-=2000) { in main()
146 test_check_msg_data(&inmessage, error, msglen, in main()
/third_party/musl/src/network/
H A Dres_send.c4 int __res_send(const unsigned char *msg, int msglen, unsigned char *answer, int anslen) in __res_send() argument
9 r = __res_send(msg, msglen, buf, sizeof buf); in __res_send()
13 r = __res_msend(1, &msg, &msglen, &answer, &anslen, anslen); in __res_send()
H A Dns_parse.c50 int ns_initparse(const unsigned char *msg, int msglen, ns_msg *handle) in ns_initparse() argument
55 handle->_eom = msg + msglen; in ns_initparse()
56 if (msglen < (2 + ns_s_max) * NS_INT16SZ) goto bad; in ns_initparse()
/third_party/libwebsockets/minimal-examples/ws-server/minimal-ws-server-echo/
H A Dprotocol_lws_minimal_server_echo.c35 uint32_t msglen; member
158 "last %d, bin %d, msglen %d (+ %d = %d))\n", in callback_minimal_server_echo()
162 lws_frame_is_binary(wsi), pss->msglen, (int)len, in callback_minimal_server_echo()
163 (int)pss->msglen + (int)len); in callback_minimal_server_echo()
181 pss->msglen = 0; in callback_minimal_server_echo()
183 pss->msglen += (uint32_t)len; in callback_minimal_server_echo()
/third_party/NuttX/drivers/usbdev/gadget/
H A Drndis_std.h133 uint32_t msglen; /* MessageLength */ member
140 uint32_t msglen; /* MessageLength */ member
204 uint32_t msglen; /* MessageLength */ member
214 uint32_t msglen; /* MessageLength */ member
H A Drndis.c848 msg->msglen = RNDIS_PACKET_HDR_SIZE + datalen; in rndis_fillrequest()
1035 priv->current_rx_msglen = msg->msglen; in rndis_recvpacket()
1155 hdr->msglen = size; in rndis_prepare_response()
1274 resp->hdr.msglen = sizeof(struct rndis_query_cmplt); in rndis_handle_control_message()
1354 resp->hdr.msglen += resp->buflen; in rndis_handle_control_message()
2015 ret = memcpy_s(ctrlreq->buf, hdr->msglen, priv->resp_buf, hdr->msglen); in usbclass_setup()
2023 ret = hdr->msglen; in usbclass_setup()
/third_party/ltp/testcases/network/stress/ns-tools/
H A Dns-udpserver.c145 ssize_t msglen; /* the length of message */ in respond_to_client() local
168 if ((msglen = recvfrom(sock_fd, msgbuf, msgbuf_size, 0, in respond_to_client()
172 msgbuf[msglen] = '\0'; in respond_to_client()
178 if (sendto(sock_fd, msgbuf, msglen, 0, in respond_to_client()
180 sizeof(client_addr)) != msglen) in respond_to_client()
H A Dns-mcast_receiver.c372 ssize_t msglen; /* the length of message */ in receive_mcast() local
408 msglen = recvfrom(sd, msgbuf, msgbuf_size, MSG_DONTWAIT, in receive_mcast()
410 if (msglen < 0) { in receive_mcast()
414 fprintf(stderr, "received %zd byte message\n", msglen); in receive_mcast()
/third_party/openssl/test/
H A Dclienthellotest.c71 size_t msglen; in test_client_hello() local
200 msglen = PACKET_remaining(&pkt); in test_client_hello()
239 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN); in test_client_hello()
/third_party/ltp/testcases/kernel/syscalls/recvmsg/
H A Drecvmsg02.c27 static const unsigned msglen = ARRAY_SIZE(msg) - 1; variable
66 R = sendto(sdw, msg, msglen, 0, (struct sockaddr*)&addr_r, addrlen_r); in verify_recvmsg()
/third_party/lwip/src/netif/ppp/polarssl/
H A Dmd4.c248 unsigned char msglen[8]; in md4_finish() local
254 PUT_ULONG_LE( low, msglen, 0 ); in md4_finish()
255 PUT_ULONG_LE( high, msglen, 4 ); in md4_finish()
261 md4_update( ctx, msglen, 8 ); in md4_finish()
H A Dmd5.c267 unsigned char msglen[8]; in md5_finish() local
273 PUT_ULONG_LE( low, msglen, 0 ); in md5_finish()
274 PUT_ULONG_LE( high, msglen, 4 ); in md5_finish()
280 md5_update( ctx, msglen, 8 ); in md5_finish()
H A Dsha1.c301 unsigned char msglen[8]; in sha1_finish() local
307 PUT_ULONG_BE( high, msglen, 0 ); in sha1_finish()
308 PUT_ULONG_BE( low, msglen, 4 ); in sha1_finish()
314 sha1_update( ctx, msglen, 8 ); in sha1_finish()
/third_party/toybox/toys/pending/
H A Dip.c1576 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local
1581 if (msglen < 0) return 1; in display_route_info()
1609 tvar = msglen; in display_route_info()
1711 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local
1714 tvar = msglen; in display_route_info()
1734 int msglen = recv(sockfd, toybuf, sizeof(toybuf), 0); in display_route_info() local
1736 if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue; in display_route_info()
1737 else if (msglen < 0) { in display_route_info()
1741 } else if (!msglen) { in display_route_info()
1747 for (mhdr = (struct nlmsghdr*)toybuf; NLMSG_OK(mhdr, msglen); in display_route_info()
1842 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); route_get() local
2330 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); show_rules() local
2790 int msglen = recv(TT.sockfd, TT.gbuf, MESG_LEN, 0); filter_nlmesg() local
[all...]
/third_party/node/deps/openssl/openssl/crypto/crmf/
H A Dcrmf_pbm.c121 * |msglen| length of the message
130 const unsigned char *msg, size_t msglen, in OSSL_CRMF_pbm_new()
209 msg, msglen, mac_res, EVP_MAX_MD_SIZE, outlen) == NULL) in OSSL_CRMF_pbm_new()
128 OSSL_CRMF_pbm_new(OSSL_LIB_CTX *libctx, const char *propq, const OSSL_CRMF_PBMPARAMETER *pbmp, const unsigned char *msg, size_t msglen, const unsigned char *sec, size_t seclen, unsigned char **out, size_t *outlen) OSSL_CRMF_pbm_new() argument
/third_party/openssl/crypto/crmf/
H A Dcrmf_pbm.c121 * |msglen| length of the message
130 const unsigned char *msg, size_t msglen, in OSSL_CRMF_pbm_new()
209 msg, msglen, mac_res, EVP_MAX_MD_SIZE, outlen) == NULL) in OSSL_CRMF_pbm_new()
128 OSSL_CRMF_pbm_new(OSSL_LIB_CTX *libctx, const char *propq, const OSSL_CRMF_PBMPARAMETER *pbmp, const unsigned char *msg, size_t msglen, const unsigned char *sec, size_t seclen, unsigned char **out, size_t *outlen) OSSL_CRMF_pbm_new() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dpreauth.c135 size_t msglen; in rsn_preauth_eapol_send() local
144 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send()
148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send()
150 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dpreauth.c150 size_t msglen; in rsn_preauth_eapol_send() local
159 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send()
163 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send()
165 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client_write.c876 size_t msglen; in tls_send_client_key_exchange() local
880 msglen = 2000; in tls_send_client_key_exchange()
882 msglen += tls_client_cert_chain_der_len(conn); in tls_send_client_key_exchange()
884 msg = os_malloc(msglen); in tls_send_client_key_exchange()
889 end = msg + msglen; in tls_send_client_key_exchange()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_write.c864 size_t msglen; in tls_send_client_key_exchange() local
868 msglen = 2000; in tls_send_client_key_exchange()
870 msglen += tls_client_cert_chain_der_len(conn); in tls_send_client_key_exchange()
872 msg = os_malloc(msglen); in tls_send_client_key_exchange()
877 end = msg + msglen; in tls_send_client_key_exchange()

Completed in 21 milliseconds

12345