/freebsd-10.1-release/contrib/wpa/wpa_supplicant/ |
H A D | hs20_supplicant.h | 14 const u8 *payload, size_t payload_len); 16 size_t payload_len);
|
H A D | hs20_supplicant.c | 37 size_t payload_len) 42 buf = gas_anqp_build_initial_req(0, 100 + payload_len); 53 wpabuf_put_data(buf, payload, payload_len); 72 const u8 *payload, size_t payload_len) 92 buf = hs20_build_anqp_req(stypes, payload, payload_len); 36 hs20_build_anqp_req(u32 stypes, const u8 *payload, size_t payload_len) argument 71 hs20_anqp_send_req(struct wpa_supplicant *wpa_s, const u8 *dst, u32 stypes, const u8 *payload, size_t payload_len) argument
|
/freebsd-10.1-release/contrib/wpa/src/eap_common/ |
H A D | eap_common.h | 17 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len,
|
H A D | eap_common.c | 116 * @payload_len: Payload length in bytes (data after Type) 126 * payload_len bytes and has the EAP header and Type field already filled in. 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 136 payload_len;
|
/freebsd-10.1-release/contrib/wpa/src/tls/ |
H A D | tlsv1_record.c | 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 171 WPA_PUT_BE16(length, payload_len); 196 if (pos + payload_len > buf + buf_size) 198 os_memmove(pos, payload, payload_len); 199 pos += payload_len; 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|
H A D | tlsv1_record.h | 65 size_t buf_size, const u8 *payload, size_t payload_len,
|
/freebsd-10.1-release/tools/tools/netrate/tcpp/ |
H A D | tcpp_client.c | 91 static uint64_t payload_len; variable 144 conn->conn_header.th_len = payload_len; 183 iov[1].iov_len = min(sizeof(buffer), payload_len); 201 payload_len - conn->conn_data_sent)); 213 if (conn->conn_data_sent >= payload_len) { 289 payload_len = bflag - sizeof(struct tcpp_header);
|
/freebsd-10.1-release/contrib/tcpdump/ |
H A D | print-ip6.c | 91 register u_int payload_len; local 107 payload_len = EXTRACT_16BITS(&ip6->ip6_plen); 108 len = payload_len + sizeof(struct ip6_hdr); 134 payload_len));
|
/freebsd-10.1-release/contrib/wpa/src/eap_server/ |
H A D | eap_tls_common.h | 69 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len,
|
H A D | eap_server_tls_common.c | 21 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 28 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
H A D | eap_server_pwd.c | 570 const u8 *payload, size_t payload_len) 574 if (payload_len < sizeof(struct eap_pwd_id)) { 588 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 593 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 621 const u8 *payload, size_t payload_len) 736 const u8 *payload, size_t payload_len) 568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
|
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/freebsd-10.1-release/contrib/wpa/src/eap_peer/ |
H A D | eap_sake.c | 146 size_t payload_len) 158 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 190 size_t payload_len) 208 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 290 size_t payload_len) 304 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 185 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 285 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_gpsk.c | 256 size_t payload_len) 269 end = payload + payload_len; 549 size_t payload_len) 561 end = payload + payload_len; 251 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 544 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_pwd.c | 186 const u8 *payload, size_t payload_len) 196 if (payload_len < sizeof(struct eap_pwd_id)) { 214 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 220 data->id_server_len = payload_len - sizeof(struct eap_pwd_id); 268 const u8 *payload, size_t payload_len) 460 const u8 *payload, size_t payload_len) 183 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 265 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 457 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 26 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
H A D | ikev2.c | 658 u8 *payload, size_t payload_len) 665 payload_len) < 0) { 656 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/freebsd-10.1-release/sys/ofed/drivers/infiniband/ulp/sdp/ |
H A D | sdp_zcopy.c | 53 int payload_len; local 84 payload_len = MIN(tx_sa->umem->page_size - off, len); 85 payload_len = MIN(payload_len, ssk->xmit_size_goal - sizeof(struct sdp_srcah)); 90 off, payload_pg, payload_len); 93 payload_pg, off, payload_len); 95 mb->len += payload_len; 96 mb->data_len = payload_len; 97 mb->truesize += payload_len; 98 // sk->sk_wmem_queued += payload_len; [all...] |
/freebsd-10.1-release/contrib/ofed/management/opensm/libvendor/ |
H A D | osm_vendor_umadt.c | 107 ib_net32_t payload_len; member in struct:_ib_sa_mad_vM3 616 uint32_t payload_len; local 618 payload_len = 619 cl_ntoh32(((ib_sa_mad_t_vM3 *) p_mad)->payload_len); 620 num_mads = payload_len / IB_SA_DATA_SIZE; 621 if (payload_len % IB_SA_DATA_SIZE != 0) { 666 p_sa_mad->payload_len = 685 p_sa_mad->payload_len = 688 payload_len) % IB_SA_DATA_SIZE); 692 cl_ntoh32(p_sa_mad->payload_len)); [all...] |
/freebsd-10.1-release/sys/dev/oce/ |
H A D | oce_mbox.c | 1474 int rc = 0, payload_len = 0; local 1478 payload_len = sizeof(struct mbx_common_read_write_flashrom) + 32*1024; 1484 payload_len, 1492 mbx.payload_length = payload_len; 1498 sgl->length = payload_len; 1519 int rc = 0, payload_len = 0; local 1531 payload_len = sizeof(struct mbx_common_read_write_flashrom) + 4; 1537 payload_len, 1546 mbx.payload_length = payload_len; 1618 int rc = 0, payload_len local [all...] |
/freebsd-10.1-release/crypto/heimdal/lib/roken/ |
H A D | socket_wrapper.c | 774 size_t payload_len, 798 wire_len = wire_hdr_len + payload_len; 804 wire_len = wire_hdr_len + payload_len; 887 packet->ip.p.udp.length = htons(8 + payload_len); 893 if (payload && payload_len > 0) { 897 memcpy(p, payload, payload_len); 769 swrap_packet_init(struct timeval *tval, const struct sockaddr_in *src_addr, const struct sockaddr_in *dest_addr, int socket_type, const unsigned char *payload, size_t payload_len, unsigned long tcp_seq, unsigned long tcp_ack, unsigned char tcp_ctl, int unreachable, size_t *_packet_len) argument
|
/freebsd-10.1-release/sys/dev/netmap/ |
H A D | netmap_offloadings.c | 93 ip6h->payload_len = htobe16(len-14-iphlen);
|
H A D | netmap_kern.h | 1590 uint16_t payload_len; member in struct:nm_ipv6hdr
|
/freebsd-10.1-release/sys/dev/xen/netback/ |
H A D | netback_unit_tests.c | 2361 const size_t payload_len = 8; local 2364 sizeof(struct tcphdr) + tcp_options_len + payload_len; 2402 const size_t payload_len = 8; local 2405 sizeof(struct tcphdr) + tcp_options_len + payload_len;
|