/macosx-10.10/OpenSSH-189/openssh/ |
H A D | msg.c | 68 u_int msg_len; local 77 msg_len = get_u32(buf); 78 if (msg_len > 256 * 1024) { 79 error("ssh_msg_recv: read: bad msg_len %u", msg_len); 83 buffer_append_space(m, msg_len); 84 if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
|
H A D | ssh-pkcs11-helper.c | 209 u_int msg_len; local 219 msg_len = get_u32(cp); 220 if (msg_len > MAX_MSG_LENGTH) { 221 error("bad message len %d", msg_len); 224 if (buf_len < msg_len + 4) 252 if (msg_len < consumed) { 253 error("msg_len %d < consumed %d", msg_len, consumed); 256 if (msg_len > consumed) 257 buffer_consume(&iqueue, msg_len [all...] |
H A D | umac.c | 790 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx 946 pc->msg_len = 0; 1063 if (ctx->msg_len + len <= L1_KEY_LEN) { 1065 ctx->msg_len += len; 1068 bytes_hashed = ctx->msg_len % L1_KEY_LEN; 1069 if (ctx->msg_len == L1_KEY_LEN) 1081 ctx->msg_len += bytes_remaining; 1091 ctx->msg_len += L1_KEY_LEN; 1101 ctx->msg_len += len; 1116 if (ctx->msg_len > L1_KEY_LE [all...] |
H A D | sftp-server.c | 1275 u_int msg_len; local 1285 msg_len = get_u32(cp); 1286 if (msg_len > SFTP_MAX_MSG_LENGTH) { 1291 if (buf_len < msg_len + 4) 1367 if (msg_len < consumed) { 1368 error("msg_len %d < consumed %d", msg_len, consumed); 1371 if (msg_len > consumed) 1372 buffer_consume(&iqueue, msg_len - consumed);
|
H A D | monitor_wrap.c | 153 u_int msg_len; local 162 msg_len = get_u32(buf); 163 if (msg_len > 256 * 1024) 164 fatal("%s: read: bad msg_len %d", __func__, msg_len); 166 buffer_append_space(m, msg_len); 167 if (atomicio(read, sock, buffer_ptr(m), msg_len) != msg_len)
|
H A D | ssh-agent.c | 869 u_int msg_len, type; local 875 msg_len = get_u32(cp); 876 if (msg_len > 256 * 1024) { 880 if (buffer_len(&e->input) < msg_len + 4) 886 buffer_append(&e->request, buffer_ptr(&e->input), msg_len); 887 buffer_consume(&e->input, msg_len);
|
H A D | sftp-client.c | 125 u_int msg_len; local 136 msg_len = buffer_get_int(m); 137 if (msg_len > SFTP_MAX_MSG_LENGTH) 138 fatal("Received message too long %u", msg_len); 140 buffer_append_space(m, msg_len); 141 if (atomicio6(read, conn->fd_in, buffer_ptr(m), msg_len, 143 != msg_len) {
|
/macosx-10.10/xnu-2782.1.97/bsd/nfs/ |
H A D | nfs_boot.c | 385 mbuf_get_with_len(size_t msg_len, mbuf_t *m) argument 391 if (msg_len > mbuf_maxlen(*m)) { 397 if (msg_len > mbuf_maxlen(*m)) 398 panic("nfs_boot: msg_len > MCLBYTES"); 400 mbuf_setlen(*m, msg_len); 401 mbuf_pkthdr_setlen(*m, msg_len); 462 size_t msg_len, cn_len, dn_len; local 469 msg_len = sizeof(*call); 470 error = mbuf_get_with_len(msg_len, &m); 502 msg_len 591 int error, msg_len; local [all...] |
/macosx-10.10/tcpdump-61/tcpdump/ |
H A D | print-olsr.c | 96 u_int8_t msg_len[2]; member in struct:olsr_msg4 106 u_int8_t msg_len[2]; member in struct:olsr_msg6 263 u_int msg_type, msg_len, msg_tlen, hello_len; local 312 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len); 313 if ((msg_len >= sizeof (struct olsr_msg6)) 314 && (msg_len <= length)) 318 if (msg_type == 0 || msg_len == 0) { 330 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); 332 msg_tlen = msg_len [all...] |
H A D | print-ldp.c | 567 u_short pdu_len,msg_len,msg_type,msg_tlen; local 607 msg_len=EXTRACT_16BITS(ldp_msg_header->length); 616 msg_len, 620 if (msg_len == 0) /* infinite loop protection */ 624 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */ 627 TCHECK2(*tptr, msg_len); 666 msg_len); 668 tptr += msg_len+4; 669 tlen -= msg_len+4;
|
H A D | print-ppp.c | 880 int peerid_len, passwd_len, msg_len; local 952 msg_len = *p; /* Msg-Length */ 954 if (length - (p - p0) < msg_len) 957 for (i = 0; i< msg_len; i++) {
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | d1_both.c | 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 141 OPENSSL_assert((msg_len) > 0); \ 143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \ 150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \ 272 (int)s->d1->w_msg_hdr.msg_len 414 unsigned long msg_len; local 482 size_t frag_off,frag_len,msg_len; local [all...] |
H A D | dtls1.h | 132 unsigned long msg_len; member in struct:hm_header_st
|
H A D | d1_srvr.c | 697 unsigned int msg_len; local 723 msg_len = p - msg; 726 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len); 1107 unsigned int msg_len; local 1185 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; 1187 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local 1239 unsigned int hlen, msg_len; local 1331 msg_len 1333 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local [all...] |
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | dtls1.h | 132 unsigned long msg_len; member in struct:hm_header_st
|
/macosx-10.10/libpcap-48/libpcap/ |
H A D | pcap-netfilter-linux.c | 111 u_int32_t msg_len; local 202 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); 203 if (msg_len > len) 204 msg_len = len; 206 len -= msg_len; 207 buf += msg_len;
|
/macosx-10.10/network_cmds-457/alias/ |
H A D | alias_smedia.c | 396 u_short msg_id, msg_len; local 406 memcpy(&msg_len, work, 2); 430 work += ntohs(msg_len);
|