Searched refs:msg_len (Results 1 - 25 of 47) sorted by relevance

12

/freebsd-9.3-release/crypto/openssh/
H A Dmsg.c68 u_int msg_len; local
77 msg_len = get_u32(buf);
78 if (msg_len > 256 * 1024) {
79 error("ssh_msg_recv: read: bad msg_len %u", msg_len);
83 buffer_append_space(m, msg_len);
84 if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
H A Dssh-pkcs11-helper.c209 u_int msg_len; local
219 msg_len = get_u32(cp);
220 if (msg_len > MAX_MSG_LENGTH) {
221 error("bad message len %d", msg_len);
224 if (buf_len < msg_len + 4)
252 if (msg_len < consumed) {
253 error("msg_len %d < consumed %d", msg_len, consumed);
256 if (msg_len > consumed)
257 buffer_consume(&iqueue, msg_len
[all...]
H A Dumac.c788 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx
944 pc->msg_len = 0;
1061 if (ctx->msg_len + len <= L1_KEY_LEN) {
1063 ctx->msg_len += len;
1066 bytes_hashed = ctx->msg_len % L1_KEY_LEN;
1067 if (ctx->msg_len == L1_KEY_LEN)
1079 ctx->msg_len += bytes_remaining;
1089 ctx->msg_len += L1_KEY_LEN;
1099 ctx->msg_len += len;
1114 if (ctx->msg_len > L1_KEY_LE
[all...]
H A Dsftp-server.c1350 u_int msg_len, buf_len, consumed, type, i; local
1358 msg_len = get_u32(cp);
1359 if (msg_len > SFTP_MAX_MSG_LENGTH) {
1364 if (buf_len < msg_len + 4)
1405 if (msg_len < consumed) {
1406 error("msg_len %u < consumed %u", msg_len, consumed);
1409 if (msg_len > consumed)
1410 buffer_consume(&iqueue, msg_len - consumed);
/freebsd-9.3-release/contrib/tcpdump/
H A Dprint-olsr.c96 u_int8_t msg_len[2]; member in struct:olsr_msg4
106 u_int8_t msg_len[2]; member in struct:olsr_msg6
263 u_int msg_type, msg_len, msg_tlen, hello_len; local
312 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len);
313 if ((msg_len >= sizeof (struct olsr_msg6))
314 && (msg_len <= length))
318 if (msg_type == 0 || msg_len == 0) {
330 msg_len, (msg_len_valid == 0) ? " (invalid)" : "");
332 msg_tlen = msg_len
[all...]
H A Dprint-ldp.c567 u_short pdu_len,msg_len,msg_type,msg_tlen; local
607 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
616 msg_len,
620 if (msg_len == 0) /* infinite loop protection */
624 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */
627 TCHECK2(*tptr, msg_len);
666 msg_len);
668 tptr += msg_len+4;
669 tlen -= msg_len+4;
/freebsd-9.3-release/crypto/openssl/ssl/
H A Dd1_both.c126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 # define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
278 (int)s->d1->w_msg_hdr.msg_len
420 unsigned long msg_len; local
488 size_t frag_off, frag_len, msg_len; local
[all...]
H A Ddtls1.h130 unsigned long msg_len; member in struct:hm_header_st
H A Dd1_srvr.c711 unsigned int msg_len; local
734 msg_len = p - msg;
737 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0,
738 msg_len);
1102 unsigned int msg_len; local
1178 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH;
1180 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, local
1181 msg_len); local
1230 unsigned int hlen, msg_len; local
1319 msg_len
1321 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, local
1322 msg_len); local
[all...]
/freebsd-9.3-release/lib/libtacplus/
H A Dtaclib_private.h103 u_int16_t msg_len; member in struct:tac_authen_reply
130 u_int16_t msg_len; member in struct:tac_author_response
149 u_int16_t msg_len; member in struct:tac_acct_reply
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/
H A Dpreauth_test.c61 size_t *msg_len, void **data_pos)
65 *msg_len = sizeof(*hdr) + data_len;
66 hdr = os_malloc(*msg_len);
88 size_t *msg_len, void **data_pos)
90 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
59 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
86 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
H A Dwpas_glue.c67 size_t *msg_len, void **data_pos)
71 *msg_len = sizeof(*hdr) + data_len;
72 hdr = os_malloc(*msg_len);
356 size_t *msg_len, void **data_pos)
358 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
65 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
354 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
H A Dibss_rsn.c60 u16 data_len, size_t *msg_len, void **data_pos)
67 *msg_len = sizeof(*hdr) + data_len;
68 hdr = os_malloc(*msg_len);
59 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap_server_gtc.c61 size_t msg_len; local
65 msg_len = os_strlen(msg);
66 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
75 wpabuf_put_data(req, msg, msg_len);
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/
H A Dwpa_i.h185 size_t *msg_len, void **data_pos)
189 msg_len, data_pos);
243 u8 *msg, size_t msg_len, u8 *key_mic);
183 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/freebsd-9.3-release/lib/libpam/modules/pam_tacplus/
H A Dpam_tacplus.c157 size_t msg_len; local
249 srvr_msg = (char *)tac_get_data(tach, &msg_len);
250 if (srvr_msg != NULL && msg_len != 0) {
/freebsd-9.3-release/contrib/libpcap/
H A Dpcap-netfilter-linux.c103 u_int32_t msg_len; local
194 msg_len = NLMSG_ALIGN(nlh->nlmsg_len);
195 if (msg_len > len)
196 msg_len = len;
198 len -= msg_len;
199 buf += msg_len;
/freebsd-9.3-release/contrib/wpa/wpa_supplicant/tests/
H A Dtest_wpa.c101 u16 data_len, size_t *msg_len, void **data_pos)
108 *msg_len = sizeof(*hdr) + data_len;
109 hdr = os_malloc(*msg_len);
100 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap.h269 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len);
/freebsd-9.3-release/contrib/wpa/src/eap_common/
H A Deap_sim_common.h94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
H A Deap_sim_common.c210 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument
218 len[0] = msg_len;
224 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len);
405 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, argument
413 len[0] = msg_len;
419 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
/freebsd-9.3-release/usr.bin/gencat/
H A Dgencat.c637 int msg_len = strlen(msg->str) + 1; local
640 msg_hdr->__msglen = htonl(msg_len);
643 memcpy(strings, msg->str, msg_len);
644 strings += msg_len;
645 msg_offset += msg_len;
/freebsd-9.3-release/sys/dev/aic/
H A Daic.c406 aic->msg_len = 1;
476 aic->msg_len = 1;
545 aic->msg_len = 0;
562 aic->msg_buf[aic->msg_len++] = aic_inb(aic, SCSIBUS);
564 if (aic->msg_len < 2) {
592 if (aic->msg_len == msglen) {
594 aic->msg_len = 0;
800 if (msgidx > 0 && msgidx == aic->msg_len) {
818 aic->msg_len = 1;
825 aic->msg_len
[all...]
H A Daicvar.h92 int msg_len; member in struct:aic_softc
/freebsd-9.3-release/sys/netinet/libalias/
H A Dalias_smedia.c437 u_short msg_id, msg_len; local
447 memcpy(&msg_len, work, 2);
475 work += ntohs(msg_len);

Completed in 142 milliseconds

12