Searched refs:msglen (Results 1 - 24 of 24) sorted by relevance

/barrelfish-master/lib/lwip2/src/netif/ppp/
H A Dupap.c130 static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen);
366 int msglen; local
411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) {
430 msglen = strlen(msg);
431 if (msglen > 255)
432 msglen = 255;
435 upap_sresp(pcb, retcode, id, msg, msglen);
459 u_char msglen; local
472 GETCHAR(msglen, inp);
473 if (msglen >
494 u_char msglen; local
567 upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen) argument
[all...]
H A Deap.c1018 int msglen; local
1020 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr;
1021 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE);
1036 PUTSHORT(msglen, outp);
1051 int msglen; local
1053 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE +
1055 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE);
1070 PUTSHORT(msglen, outp);
1097 int msglen; local
1099 msglen
1138 int msglen; local
1170 int msglen; local
[all...]
H A Dauth.c1004 * In either case, msg points to an appropriate message and msglen to the message len.
1006 int auth_check_passwd(ppp_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen) { argument
1018 *msglen = sizeof("Login ok")-1;
1024 *msglen = sizeof("Login incorrect")-1;
/barrelfish-master/include/lwip2/netif/ppp/
H A Dupap.c130 static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen);
366 int msglen; local
411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) {
430 msglen = strlen(msg);
431 if (msglen > 255)
432 msglen = 255;
435 upap_sresp(pcb, retcode, id, msg, msglen);
459 u_char msglen; local
472 GETCHAR(msglen, inp);
473 if (msglen >
494 u_char msglen; local
567 upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen) argument
[all...]
H A Deap.c1018 int msglen; local
1020 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr;
1021 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE);
1036 PUTSHORT(msglen, outp);
1051 int msglen; local
1053 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE +
1055 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE);
1070 PUTSHORT(msglen, outp);
1097 int msglen; local
1099 msglen
1138 int msglen; local
1170 int msglen; local
[all...]
H A Dppp_impl.h561 int auth_check_passwd(ppp_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen);
H A Dauth.c1004 * In either case, msg points to an appropriate message and msglen to the message len.
1006 int auth_check_passwd(ppp_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen) { argument
1018 *msglen = sizeof("Login ok")-1;
1024 *msglen = sizeof("Login incorrect")-1;
/barrelfish-master/usr/monitor/
H A Ddomain.c89 if(msg.buf.msglen == 1) {
97 } else if(msg.buf.msglen == sizeof(struct RAM) / sizeof(uintptr_t) + 1) {
124 disp_name(), msg.buf.msglen);
/barrelfish-master/lib/libc/nameser/
H A Dns_print.c60 static int addname(const u_char *msg, size_t msglen,
109 ns_sprintrrf(const u_char *msg, size_t msglen, argument
175 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
202 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
206 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
277 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
295 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
299 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
384 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
403 T(addname(msg, msglen,
1171 addname(const u_char *msg, size_t msglen, const u_char **pp, const char *origin, char **buf, size_t *buflen) argument
[all...]
H A Dns_parse.c106 ns_initparse(const u_char *msg, int msglen, ns_msg *handle) { argument
107 const u_char *eom = msg + msglen;
/barrelfish-master/include/barrelfish/
H A Dlmp_endpoints.h52 size_t msglen; ///< Length of message payload (in words) member in struct:lmp_recv_buf
H A Dmultihop_chan.h184 struct event_closure _continuation, void *msg, size_t msglen);
/barrelfish-master/lib/lwip2/src/netif/ppp/polarssl/
H A Dmd4.c248 unsigned char msglen[8]; local
254 PUT_ULONG_LE( low, msglen, 0 );
255 PUT_ULONG_LE( high, msglen, 4 );
261 md4_update( ctx, msglen, 8 );
H A Dmd5.c267 unsigned char msglen[8]; local
273 PUT_ULONG_LE( low, msglen, 0 );
274 PUT_ULONG_LE( high, msglen, 4 );
280 md5_update( ctx, msglen, 8 );
H A Dsha1.c301 unsigned char msglen[8]; local
307 PUT_ULONG_BE( high, msglen, 0 );
308 PUT_ULONG_BE( low, msglen, 4 );
314 sha1_update( ctx, msglen, 8 );
/barrelfish-master/include/lwip2/netif/ppp/polarssl/
H A Dmd4.c248 unsigned char msglen[8]; local
254 PUT_ULONG_LE( low, msglen, 0 );
255 PUT_ULONG_LE( high, msglen, 4 );
261 md4_update( ctx, msglen, 8 );
H A Dmd5.c267 unsigned char msglen[8]; local
273 PUT_ULONG_LE( low, msglen, 0 );
274 PUT_ULONG_LE( high, msglen, 4 );
280 md5_update( ctx, msglen, 8 );
H A Dsha1.c301 unsigned char msglen[8]; local
307 PUT_ULONG_BE( high, msglen, 0 );
308 PUT_ULONG_BE( low, msglen, 4 );
314 sha1_update( ctx, msglen, 8 );
/barrelfish-master/lib/barrelfish/
H A Dmultihop_chan.c439 * \param msglen length of the message payload (in bytes)
443 struct event_closure _continuation, void *msg, size_t msglen)
460 (uint8_t *) msg, msglen);
442 multihop_send_message(struct multihop_chan *mc, struct event_closure _continuation, void *msg, size_t msglen) argument
H A Dflounder_support.c327 if (msg->buf.msglen == 0) {
339 for (; msgpos < msg->buf.msglen && *pos < *len; msgpos++) {
H A Dinthandler.c76 if (buf.buf.msglen == 1 && buf.words[0] == 1) {
H A Dlmp_endpoints.c408 buf->msglen = header.x.length;
/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Ds3_clnt.c2469 size_t msglen; local
2523 msglen=255;
2524 if (EVP_PKEY_encrypt(pkey_ctx,tmp,&msglen,premaster_secret,32)<0) {
2529 if (msglen >= 0x80)
2532 *(p++)= msglen & 0xff;
2533 n=msglen+3;
2537 *(p++)= msglen & 0xff;
2538 n=msglen+2;
2540 memcpy(p, tmp, msglen);
/barrelfish-master/lib/libc/resolv/
H A Dres_debug.c369 p_fqnname(const u_char *cp, const u_char *msg, int msglen, char *name, argument
374 if ((n = dn_expand(msg, cp + msglen, cp, name, namelen)) < 0)

Completed in 124 milliseconds