/freebsd/usr.sbin/ppp/ |
H A D | mbuf.c | 83 len += bp->m_len; in m_length() 104 m_get(size_t m_len, int type) in m_get() argument 115 if (m_len > M_MAXLEN || m_len == 0) { in m_get() 117 (u_long)m_len, mbuftype(type)); in m_get() 121 mb = M_BUCKET(m_len); in m_get() 122 size = M_ROUNDUP(m_len); in m_get() 155 bp->m_len = m_len; in m_get() 201 if (len > bp->m_len) in mbuf_Read() 202 nb = bp->m_len; in mbuf_Read() 208 bp->m_len -= nb; in mbuf_Read() [all …]
|
H A D | deflate.c | 87 mi->m_len = 1; in DeflateOutput() 91 mi->m_len = 2; in DeflateOutput() 96 mo->m_len = 2; in DeflateOutput() 107 state->cx.avail_in = mi->m_len; in DeflateOutput() 129 state->cx.avail_in = mi->m_len; in DeflateOutput() 136 olen += (mo->m_len = DEFLATE_CHUNK_LEN); in DeflateOutput() 138 mo->m_len = 0; in DeflateOutput() 144 olen += (mo->m_len = DEFLATE_CHUNK_LEN - state->cx.avail_out); in DeflateOutput() 169 for (len = mo->m_len; len < olen; mo = mo->m_next, len += mo->m_len) in DeflateOutput() 171 mo->m_len -= len - olen; in DeflateOutput() [all …]
|
/freebsd/sys/contrib/libsodium/test/default/ |
H A D | xchacha20.c | 220 size_t m_len; in tv_secretbox_xchacha20poly1305() local 230 m_len = strlen(tv->m) / 2; in tv_secretbox_xchacha20poly1305() 231 m = (unsigned char *) sodium_malloc(m_len); in tv_secretbox_xchacha20poly1305() 236 sodium_hex2bin(m, m_len, tv->m, strlen(tv->m), NULL, NULL, NULL); in tv_secretbox_xchacha20poly1305() 238 (crypto_secretbox_xchacha20poly1305_MACBYTES + m_len); in tv_secretbox_xchacha20poly1305() 240 (crypto_secretbox_xchacha20poly1305_MACBYTES + m_len); in tv_secretbox_xchacha20poly1305() 241 sodium_hex2bin(out, crypto_secretbox_xchacha20poly1305_MACBYTES + m_len, in tv_secretbox_xchacha20poly1305() 244 assert(crypto_secretbox_xchacha20poly1305_easy(out2, m, m_len, nonce, key) == 0); in tv_secretbox_xchacha20poly1305() 246 crypto_secretbox_xchacha20poly1305_MACBYTES + m_len) == 0); in tv_secretbox_xchacha20poly1305() 247 n = randombytes_uniform(crypto_secretbox_xchacha20poly1305_MACBYTES + (uint32_t) m_len); in tv_secretbox_xchacha20poly1305() [all …]
|
H A D | box_seal.c | 13 size_t m_len; in main() local 17 m_len = (size_t) randombytes_uniform(1000); in main() 18 c_len = crypto_box_SEALBYTES + m_len; in main() 19 m = (unsigned char *) sodium_malloc(m_len); in main() 20 m2 = (unsigned char *) sodium_malloc(m_len); in main() 22 randombytes_buf(m, m_len); in main() 23 if (crypto_box_seal(c, m, m_len, pk) != 0) { in main() 31 printf("%d\n", memcmp(m, m2, m_len)); in main()
|
/freebsd/sys/netipsec/ |
H A D | ipsec_mbuf.c | 62 for (m = m0; m && skip > m->m_len; m = m->m_next) in m_makespace() 63 skip -= m->m_len; in m_makespace() 74 remain = m->m_len - skip; /* data to move */ in m_makespace() 87 m->m_len += hlen; in m_makespace() 114 n->m_len = len; in m_makespace() 120 m->m_len = skip + hlen; in m_makespace() 141 n->m_len = hlen; in m_makespace() 142 m->m_len = skip; in m_makespace() 155 m->m_len += hlen; in m_makespace() 184 while (m0->m_len < len) { in m_pad() [all …]
|
/freebsd/sys/kern/ |
H A D | uipc_mbuf.c | 351 if ((caddr_t)m->m_data + m->m_len > b) in m_sanity() 365 pktlen += m->m_len; in m_sanity() 519 m->m_len = len; in m_prepend() 545 if (off < m->m_len) in m_copym() 547 off -= m->m_len; in m_copym() 574 n->m_len = min(len, m->m_len - off); in m_copym() 580 (u_int)n->m_len); in m_copym() 582 len -= n->m_len; in m_copym() 616 n->m_len = m->m_len; in m_copypacket() 622 bcopy(mtod(m, char *), mtod(n, char *), n->m_len); in m_copypacket() [all …]
|
H A D | uipc_mbuf2.c | 112 printf(" %d", t->m_len); in m_pulldown() 118 if (n->m_len > off) in m_pulldown() 120 off -= n->m_len; in m_pulldown() 124 while (n != NULL && n->m_len == 0) in m_pulldown() 160 if ((off == 0 || offp) && len <= n->m_len - off) in m_pulldown() 169 if (len <= n->m_len - off) { in m_pulldown() 170 o = m_dup1(n, off, n->m_len - off, M_NOWAIT); in m_pulldown() 175 n->m_len = off; in m_pulldown() 188 hlen = n->m_len - off; in m_pulldown() 197 olen += o->m_len; in m_pulldown() [all …]
|
H A D | uipc_sockbuf.c | 145 m->m_len += hdr_len; in sbready_compress() 147 n->m_len -= hdr_len; in sbready_compress() 153 if ((m->m_flags & M_EXTPG) && m->m_len <= MLEN && in sbready_compress() 165 n->m_len <= MCLBYTES / 4 && /* XXX: Don't copy too much */ in sbready_compress() 166 n->m_len <= M_TRAILINGSPACE(m) && in sbready_compress() 171 m_copydata(n, 0, n->m_len, mtodo(m, m->m_len)); in sbready_compress() 172 m->m_len += n->m_len; in sbready_compress() 223 sb->sb_acc += m->m_len; in sbready() 247 sb->sb_acc += m->m_len; in sbready() 265 sb->sb_ccc += m->m_len; in sballoc() [all …]
|
H A D | subr_memdesc.c | 390 m->m_len = m->m_epg_last_len; in append_paddr_range() 403 m->m_len += PAGE_SIZE; in append_paddr_range() 415 m->m_len += len; in append_paddr_range() 638 m->m_len = m->m_epg_last_len; in vmpages_ext_mbuf() 655 tail->m_len += PAGE_SIZE; in vmpages_ext_mbuf() 673 tail->m_len += len; in vmpages_ext_mbuf() 694 while (offset >= m0->m_len) { in mbuf_subchain() 695 offset -= m0->m_len; in mbuf_subchain() 700 totlen = m0->m_len - offset; in mbuf_subchain() 707 m->m_len = totlen; in mbuf_subchain() [all …]
|
/freebsd/sbin/setkey/ |
H A D | test-pfkey.c | 54 u_int m_len; variable 118 if ((len = send(so, m_buf, m_len, 0)) < 0) { in sendkeymsg() 152 m_len = sizeof(struct sadb_msg); 153 memcpy(m_buf, &m_msg, m_len); 256 memcpy(m_buf + m_len, &m_policy, sizeof(struct sadb_x_policy)); 257 m_len += sizeof(struct sadb_x_policy); 267 ((struct sadb_msg *)m_buf)->sadb_msg_len = PFKEY_UNIT64(m_len); 297 key_setsadbextbuf(m_buf, m_len, in key_setsadbsens() 300 m_len += len; in key_setsadbsens() 359 key_setsadbextbuf(m_buf, m_len, in key_setsadbprop() [all …]
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 243 const unsigned char *m, size_t m_len) in encode_pkcs1() argument 259 dig_info_len = di_prefix_len + m_len; in encode_pkcs1() 266 memcpy(dig_info + di_prefix_len, m, m_len); in encode_pkcs1() 273 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, in RSA_sign() argument 283 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa) > 0; in RSA_sign() 293 if (m_len != SSL_SIG_LENGTH) { in RSA_sign() 300 if (!encode_pkcs1(&tmps, &encoded_len, type, m, m_len)) in RSA_sign() 331 int ossl_rsa_verify(int type, const unsigned char *m, unsigned int m_len, in ossl_rsa_verify() argument 373 if (m_len != SSL_SIG_LENGTH) { in ossl_rsa_verify() 393 if (m_len != 16) { in ossl_rsa_verify() [all …]
|
H A D | rsa_saos.c | 24 const unsigned char *m, unsigned int m_len, in RSA_sign_ASN1_OCTET_STRING() argument 33 sig.length = m_len; in RSA_sign_ASN1_OCTET_STRING() 61 unsigned int m_len, unsigned char *sigbuf, in RSA_verify_ASN1_OCTET_STRING() argument 89 if (((unsigned int)sig->length != m_len) || in RSA_verify_ASN1_OCTET_STRING() 90 (memcmp(m, sig->data, m_len) != 0)) { in RSA_verify_ASN1_OCTET_STRING()
|
/freebsd/sys/netinet/ |
H A D | tcp_pcap.c | 170 KASSERT(n->m_len == 0, ("%s: called with n->m_len=%d (expected 0)", in tcp_pcap_copy_bestfit() 171 __func__, n->m_len)); in tcp_pcap_copy_bestfit() 182 while (m && m->m_len == 0) in tcp_pcap_copy_bestfit() 200 n->m_len = bytes_to_copy; in tcp_pcap_copy_bestfit() 210 (caddr_t) th < (caddr_t) (m_cur->m_data + m_cur->m_len)) in tcp_pcap_copy_bestfit() 212 bytes_to_copy += m_cur->m_len; in tcp_pcap_copy_bestfit() 246 trailing_data = m_cur->m_len - tcp_off; in tcp_pcap_copy_bestfit() 250 trailing_data += m_cur->m_len; in tcp_pcap_copy_bestfit() 260 n->m_len = bytes_to_copy; in tcp_pcap_copy_bestfit() 374 n->m_len = m->m_len; in tcp_pcap_add() [all …]
|
H A D | ip_icmp.c | 235 if (n->m_len < sizeof(struct ip) + ICMP_MINLEN) in icmp_error() 239 if (n->m_len < oiphlen + ICMP_MINLEN) in icmp_error() 264 if (oiphlen + sizeof(struct tcphdr) > n->m_len && in icmp_error() 267 if (n->m_len < oiphlen + sizeof(struct tcphdr) && in icmp_error() 277 if (oiphlen + tcphlen > n->m_len && n->m_next == NULL) in icmp_error() 279 if (n->m_len < oiphlen + tcphlen && in icmp_error() 291 if (oiphlen + sizeof(struct sctphdr) > n->m_len && in icmp_error() 294 if (n->m_len < oiphlen + sizeof(struct sctphdr) && in icmp_error() 304 (n->m_len >= oiphlen + sizeof(struct sctphdr) + 8 || in icmp_error() 306 if (n->m_len < oiphlen + sizeof(struct sctphdr) + 8 && in icmp_error() [all …]
|
H A D | ip_options.c | 443 m->m_len = opts->ip_nhops * sizeof(struct in_addr) + in ip_srcroute() 487 m->m_len -= olen; in ip_stripoptions() 494 (size_t )(m->m_len - sizeof(struct ip))); in ip_stripoptions() 512 optlen = opt->m_len - sizeof(p->ipopt_dst); in ip_insertoptions() 530 m->m_len -= sizeof(struct ip); in ip_insertoptions() 534 m->m_len = optlen + sizeof(struct ip); in ip_insertoptions() 539 m->m_len += optlen; in ip_insertoptions() 616 if (m == NULL || m->m_len == 0) { in ip_pcbopts() 625 if (m->m_len % sizeof(int32_t)) in ip_pcbopts() 631 if (m->m_data + m->m_len + sizeof(struct in_addr) >= &m->m_dat[MLEN]) in ip_pcbopts() [all …]
|
/freebsd/sys/xdr/ |
H A D | xdr_mbuf.c | 76 xdrs->x_handy = m->m_len; in xdrmbuf_create() 101 xdrs->x_handy = m->m_len; in xdrmbuf_putmbuf() 193 sz = m->m_len - xdrs->x_handy; in xdrmbuf_getbytes() 202 if (xdrs->x_handy == m->m_len) { in xdrmbuf_getbytes() 220 sz = M_TRAILINGSPACE(m) + (m->m_len - xdrs->x_handy); in xdrmbuf_putbytes() 226 if (xdrs->x_handy > m->m_len) in xdrmbuf_putbytes() 227 m->m_len = xdrs->x_handy; in xdrmbuf_putbytes() 230 if (xdrs->x_handy == m->m_len && M_TRAILINGSPACE(m) == 0) { in xdrmbuf_putbytes() 255 pos += m0->m_len; in xdrmbuf_getpos() 268 while (m && pos > m->m_len) { in xdrmbuf_setpos() [all …]
|
/freebsd/contrib/netbsd-tests/net/in_cksum/ |
H A D | in_cksum.c | 95 m->m_len = len; in allocate_mbuf_chain() 113 if (off > m->m_len) in dump_mbuf() 114 off -= m->m_len; in dump_mbuf() 117 if (m == NULL || off > m->m_len) in dump_mbuf() 122 unsigned char *eptr = ptr + m->m_len; in dump_mbuf() 130 eptr = ptr + m->m_len; in dump_mbuf() 150 for (i = 0; i < m->m_len; i += sizeof(int)) { in randomise_mbuf_chain() 152 if (i + sizeof(int) < (size_t)m->m_len) in randomise_mbuf_chain() 155 len = m->m_len - i; in randomise_mbuf_chain() 165 return m == NULL ? 0 : m->m_len + mbuf_len(m->m_next); in mbuf_len() [all …]
|
/freebsd/sys/i386/i386/ |
H A D | in_cksum_machdep.c | 78 if (m->m_len > skip) { in in_cksum_skip() 79 mlen = m->m_len - skip; in in_cksum_skip() 83 skip -= m->m_len; in in_cksum_skip() 88 if (m->m_len == 0) in in_cksum_skip() 104 mlen = m->m_len - 1; in in_cksum_skip() 107 mlen = m->m_len; in in_cksum_skip()
|
/freebsd/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 578 m->m_len = tlen; in krb5_make_token() 661 if (m->m_len < 2) { in krb5_verify_token() 683 if (m->m_len < len_len + 1) { in krb5_verify_token() 728 if (m->m_len < hlen) { in krb5_verify_token() 888 mic->m_len = p - (uint8_t *) mic->m_data; in krb5_get_mic_old() 891 tm->m_len = cklen; in krb5_get_mic_old() 894 krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8, in krb5_get_mic_old() 937 mic->m_len += 8 + cklen; in krb5_get_mic_old() 938 krb5_encrypt(kc->kc_tokenkey, mic, mic->m_len - cklen - 8, 8, buf, 8); in krb5_get_mic_old() 961 mic->m_len = 16 + cklen; in krb5_get_mic_new() [all …]
|
/freebsd/sys/net80211/ |
H A D | ieee80211_crypto_ccmp.c | 475 space = m->m_len - (hdrlen + ccmp.ic_header); in ccmp_encrypt() 522 if (n->m_len >= space_next) { in ccmp_encrypt() 535 xor_block(b+sp, pos_next, n->m_len); in ccmp_encrypt() 536 sp += n->m_len, dl -= n->m_len; in ccmp_encrypt() 551 if (m->m_len >= space_next) { in ccmp_encrypt() 555 xor_block(pos_next, e+sp, m->m_len); in ccmp_encrypt() 556 sp += m->m_len, dl -= m->m_len; in ccmp_encrypt() 572 space = m->m_len - space_next; in ccmp_encrypt() 578 space = m->m_len; in ccmp_encrypt() 628 space = m->m_len - (hdrlen + ccmp.ic_header); in ccmp_decrypt() [all …]
|
/freebsd/sys/arm/arm/ |
H A D | in_cksum_machdep.c | 113 if (m->m_len > skip) { in in_cksum_skip() 114 mlen = m->m_len - skip; in in_cksum_skip() 118 skip -= m->m_len; in in_cksum_skip() 123 if (m->m_len == 0) in in_cksum_skip() 125 mlen = m->m_len; in in_cksum_skip()
|
/freebsd/sys/netgraph/bluetooth/l2cap/ |
H A D | ng_l2cap_cmds.h | 80 (_m)->m_pkthdr.len = (_m)->m_len = sizeof(c->hdr) + \ 98 (_m)->m_pkthdr.len = (_m)->m_len = sizeof(*c); \ 121 (_m)->m_pkthdr.len = (_m)->m_len = sizeof(*c); \ 148 (_m)->m_pkthdr.len = (_m)->m_len = sizeof(*c); \ 182 (_m)->m_pkthdr.len = (_m)->m_len = sizeof(*c); \ 212 (_m)->m_pkthdr.len = (_m)->m_len = sizeof(*c); \ 231 (_m)->m_pkthdr.len = (_m)->m_len = 0; \ 293 (_m)->m_len = (_m)->m_pkthdr.len; \ 308 (_m)->m_pkthdr.len = (_m)->m_len = sizeof(*c); \ 331 (_m)->m_pkthdr.len = (_m)->m_len = sizeof(*c); \ [all …]
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | p_verify.c | 22 unsigned int m_len = 0; in EVP_VerifyFinal_ex() local 27 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_VerifyFinal_ex() 39 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_VerifyFinal_ex() 53 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal_ex()
|
H A D | p_sign.c | 22 unsigned int m_len = 0; in EVP_SignFinal_ex() local 29 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_SignFinal_ex() 41 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_SignFinal_ex() 56 if (EVP_PKEY_sign(pkctx, sigret, &sltmp, m, m_len) <= 0) in EVP_SignFinal_ex()
|
/freebsd/sys/rpc/ |
H A D | rpcm_subs.h | 87 mb->m_len = 0; \ 91 mb->m_len += (s); \ 95 { t1 = mtod(md, caddr_t)+md->m_len-dpos; \ 118 { t1 = mtod(md, caddr_t)+md->m_len-dpos; \
|