/freebsd-9.3-release/crypto/openssh/ |
H A D | msg.c | 68 u_int msg_len; local 77 msg_len = get_u32(buf); 78 if (msg_len > 256 * 1024) { 79 error("ssh_msg_recv: read: bad msg_len %u", msg_len); 83 buffer_append_space(m, msg_len); 84 if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
|
H A D | ssh-pkcs11-helper.c | 209 u_int msg_len; local 219 msg_len = get_u32(cp); 220 if (msg_len > MAX_MSG_LENGTH) { 221 error("bad message len %d", msg_len); 224 if (buf_len < msg_len + 4) 252 if (msg_len < consumed) { 253 error("msg_len %d < consumed %d", msg_len, consumed); 256 if (msg_len > consumed) 257 buffer_consume(&iqueue, msg_len [all...] |
H A D | umac.c | 788 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx 944 pc->msg_len = 0; 1061 if (ctx->msg_len + len <= L1_KEY_LEN) { 1063 ctx->msg_len += len; 1066 bytes_hashed = ctx->msg_len % L1_KEY_LEN; 1067 if (ctx->msg_len == L1_KEY_LEN) 1079 ctx->msg_len += bytes_remaining; 1089 ctx->msg_len += L1_KEY_LEN; 1099 ctx->msg_len += len; 1114 if (ctx->msg_len > L1_KEY_LE [all...] |
H A D | sftp-server.c | 1350 u_int msg_len, buf_len, consumed, type, i; local 1358 msg_len = get_u32(cp); 1359 if (msg_len > SFTP_MAX_MSG_LENGTH) { 1364 if (buf_len < msg_len + 4) 1405 if (msg_len < consumed) { 1406 error("msg_len %u < consumed %u", msg_len, consumed); 1409 if (msg_len > consumed) 1410 buffer_consume(&iqueue, msg_len - consumed);
|
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-olsr.c | 96 u_int8_t msg_len[2]; member in struct:olsr_msg4 106 u_int8_t msg_len[2]; member in struct:olsr_msg6 263 u_int msg_type, msg_len, msg_tlen, hello_len; local 312 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len); 313 if ((msg_len >= sizeof (struct olsr_msg6)) 314 && (msg_len <= length)) 318 if (msg_type == 0 || msg_len == 0) { 330 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); 332 msg_tlen = msg_len [all...] |
H A D | print-ldp.c | 567 u_short pdu_len,msg_len,msg_type,msg_tlen; local 607 msg_len=EXTRACT_16BITS(ldp_msg_header->length); 616 msg_len, 620 if (msg_len == 0) /* infinite loop protection */ 624 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */ 627 TCHECK2(*tptr, msg_len); 666 msg_len); 668 tptr += msg_len+4; 669 tlen -= msg_len+4;
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | d1_both.c | 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 141 OPENSSL_assert((msg_len) > 0); \ 143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 148 # define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \ 150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \ 278 (int)s->d1->w_msg_hdr.msg_len 420 unsigned long msg_len; local 488 size_t frag_off, frag_len, msg_len; local [all...] |
H A D | dtls1.h | 130 unsigned long msg_len; member in struct:hm_header_st
|
H A D | d1_srvr.c | 711 unsigned int msg_len; local 734 msg_len = p - msg; 737 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, 738 msg_len); 1102 unsigned int msg_len; local 1178 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; 1180 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, local 1181 msg_len); local 1230 unsigned int hlen, msg_len; local 1319 msg_len 1321 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, local 1322 msg_len); local [all...] |
/freebsd-9.3-release/lib/libtacplus/ |
H A D | taclib_private.h | 103 u_int16_t msg_len; member in struct:tac_authen_reply 130 u_int16_t msg_len; member in struct:tac_author_response 149 u_int16_t msg_len; member in struct:tac_acct_reply
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | preauth_test.c | 61 size_t *msg_len, void **data_pos) 65 *msg_len = sizeof(*hdr) + data_len; 66 hdr = os_malloc(*msg_len); 88 size_t *msg_len, void **data_pos) 90 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); 59 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 86 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
H A D | wpas_glue.c | 67 size_t *msg_len, void **data_pos) 71 *msg_len = sizeof(*hdr) + data_len; 72 hdr = os_malloc(*msg_len); 356 size_t *msg_len, void **data_pos) 358 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); 65 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 354 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
H A D | ibss_rsn.c | 60 u16 data_len, size_t *msg_len, void **data_pos) 67 *msg_len = sizeof(*hdr) + data_len; 68 hdr = os_malloc(*msg_len); 59 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_gtc.c | 61 size_t msg_len; local 65 msg_len = os_strlen(msg); 66 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 75 wpabuf_put_data(req, msg, msg_len);
|
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/ |
H A D | wpa_i.h | 185 size_t *msg_len, void **data_pos) 189 msg_len, data_pos); 243 u8 *msg, size_t msg_len, u8 *key_mic); 183 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/freebsd-9.3-release/lib/libpam/modules/pam_tacplus/ |
H A D | pam_tacplus.c | 157 size_t msg_len; local 249 srvr_msg = (char *)tac_get_data(tach, &msg_len); 250 if (srvr_msg != NULL && msg_len != 0) {
|
/freebsd-9.3-release/contrib/libpcap/ |
H A D | pcap-netfilter-linux.c | 103 u_int32_t msg_len; local 194 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); 195 if (msg_len > len) 196 msg_len = len; 198 len -= msg_len; 199 buf += msg_len;
|
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/tests/ |
H A D | test_wpa.c | 101 u16 data_len, size_t *msg_len, void **data_pos) 108 *msg_len = sizeof(*hdr) + data_len; 109 hdr = os_malloc(*msg_len); 100 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap.h | 269 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len);
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
|
H A D | eap_sim_common.c | 210 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 218 len[0] = msg_len; 224 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 405 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, argument 413 len[0] = msg_len; 419 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
|
/freebsd-9.3-release/usr.bin/gencat/ |
H A D | gencat.c | 637 int msg_len = strlen(msg->str) + 1; local 640 msg_hdr->__msglen = htonl(msg_len); 643 memcpy(strings, msg->str, msg_len); 644 strings += msg_len; 645 msg_offset += msg_len;
|
/freebsd-9.3-release/sys/dev/aic/ |
H A D | aic.c | 406 aic->msg_len = 1; 476 aic->msg_len = 1; 545 aic->msg_len = 0; 562 aic->msg_buf[aic->msg_len++] = aic_inb(aic, SCSIBUS); 564 if (aic->msg_len < 2) { 592 if (aic->msg_len == msglen) { 594 aic->msg_len = 0; 800 if (msgidx > 0 && msgidx == aic->msg_len) { 818 aic->msg_len = 1; 825 aic->msg_len [all...] |
H A D | aicvar.h | 92 int msg_len; member in struct:aic_softc
|
/freebsd-9.3-release/sys/netinet/libalias/ |
H A D | alias_smedia.c | 437 u_short msg_id, msg_len; local 447 memcpy(&msg_len, work, 2); 475 work += ntohs(msg_len);
|