Searched refs:msg_len (Results 1 - 17 of 17) sorted by relevance

/macosx-10.10/OpenSSH-189/openssh/
H A Dmsg.c68 u_int msg_len; local
77 msg_len = get_u32(buf);
78 if (msg_len > 256 * 1024) {
79 error("ssh_msg_recv: read: bad msg_len %u", msg_len);
83 buffer_append_space(m, msg_len);
84 if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
H A Dssh-pkcs11-helper.c209 u_int msg_len; local
219 msg_len = get_u32(cp);
220 if (msg_len > MAX_MSG_LENGTH) {
221 error("bad message len %d", msg_len);
224 if (buf_len < msg_len + 4)
252 if (msg_len < consumed) {
253 error("msg_len %d < consumed %d", msg_len, consumed);
256 if (msg_len > consumed)
257 buffer_consume(&iqueue, msg_len
[all...]
H A Dumac.c790 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx
946 pc->msg_len = 0;
1063 if (ctx->msg_len + len <= L1_KEY_LEN) {
1065 ctx->msg_len += len;
1068 bytes_hashed = ctx->msg_len % L1_KEY_LEN;
1069 if (ctx->msg_len == L1_KEY_LEN)
1081 ctx->msg_len += bytes_remaining;
1091 ctx->msg_len += L1_KEY_LEN;
1101 ctx->msg_len += len;
1116 if (ctx->msg_len > L1_KEY_LE
[all...]
H A Dsftp-server.c1275 u_int msg_len; local
1285 msg_len = get_u32(cp);
1286 if (msg_len > SFTP_MAX_MSG_LENGTH) {
1291 if (buf_len < msg_len + 4)
1367 if (msg_len < consumed) {
1368 error("msg_len %d < consumed %d", msg_len, consumed);
1371 if (msg_len > consumed)
1372 buffer_consume(&iqueue, msg_len - consumed);
H A Dmonitor_wrap.c153 u_int msg_len; local
162 msg_len = get_u32(buf);
163 if (msg_len > 256 * 1024)
164 fatal("%s: read: bad msg_len %d", __func__, msg_len);
166 buffer_append_space(m, msg_len);
167 if (atomicio(read, sock, buffer_ptr(m), msg_len) != msg_len)
H A Dssh-agent.c869 u_int msg_len, type; local
875 msg_len = get_u32(cp);
876 if (msg_len > 256 * 1024) {
880 if (buffer_len(&e->input) < msg_len + 4)
886 buffer_append(&e->request, buffer_ptr(&e->input), msg_len);
887 buffer_consume(&e->input, msg_len);
H A Dsftp-client.c125 u_int msg_len; local
136 msg_len = buffer_get_int(m);
137 if (msg_len > SFTP_MAX_MSG_LENGTH)
138 fatal("Received message too long %u", msg_len);
140 buffer_append_space(m, msg_len);
141 if (atomicio6(read, conn->fd_in, buffer_ptr(m), msg_len,
143 != msg_len) {
/macosx-10.10/xnu-2782.1.97/bsd/nfs/
H A Dnfs_boot.c385 mbuf_get_with_len(size_t msg_len, mbuf_t *m) argument
391 if (msg_len > mbuf_maxlen(*m)) {
397 if (msg_len > mbuf_maxlen(*m))
398 panic("nfs_boot: msg_len > MCLBYTES");
400 mbuf_setlen(*m, msg_len);
401 mbuf_pkthdr_setlen(*m, msg_len);
462 size_t msg_len, cn_len, dn_len; local
469 msg_len = sizeof(*call);
470 error = mbuf_get_with_len(msg_len, &m);
502 msg_len
591 int error, msg_len; local
[all...]
/macosx-10.10/tcpdump-61/tcpdump/
H A Dprint-olsr.c96 u_int8_t msg_len[2]; member in struct:olsr_msg4
106 u_int8_t msg_len[2]; member in struct:olsr_msg6
263 u_int msg_type, msg_len, msg_tlen, hello_len; local
312 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len);
313 if ((msg_len >= sizeof (struct olsr_msg6))
314 && (msg_len <= length))
318 if (msg_type == 0 || msg_len == 0) {
330 msg_len, (msg_len_valid == 0) ? " (invalid)" : "");
332 msg_tlen = msg_len
[all...]
H A Dprint-ldp.c567 u_short pdu_len,msg_len,msg_type,msg_tlen; local
607 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
616 msg_len,
620 if (msg_len == 0) /* infinite loop protection */
624 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */
627 TCHECK2(*tptr, msg_len);
666 msg_len);
668 tptr += msg_len+4;
669 tlen -= msg_len+4;
H A Dprint-ppp.c880 int peerid_len, passwd_len, msg_len; local
952 msg_len = *p; /* Msg-Length */
954 if (length - (p - p0) < msg_len)
957 for (i = 0; i< msg_len; i++) {
/macosx-10.10/OpenSSL098-52/src/ssl/
H A Dd1_both.c126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
272 (int)s->d1->w_msg_hdr.msg_len
414 unsigned long msg_len; local
482 size_t frag_off,frag_len,msg_len; local
[all...]
H A Ddtls1.h132 unsigned long msg_len; member in struct:hm_header_st
H A Dd1_srvr.c697 unsigned int msg_len; local
723 msg_len = p - msg;
726 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len);
1107 unsigned int msg_len; local
1185 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH;
1187 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local
1239 unsigned int hlen, msg_len; local
1331 msg_len
1333 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local
[all...]
/macosx-10.10/OpenSSL098-52/src/include/openssl/
H A Ddtls1.h132 unsigned long msg_len; member in struct:hm_header_st
/macosx-10.10/libpcap-48/libpcap/
H A Dpcap-netfilter-linux.c111 u_int32_t msg_len; local
202 msg_len = NLMSG_ALIGN(nlh->nlmsg_len);
203 if (msg_len > len)
204 msg_len = len;
206 len -= msg_len;
207 buf += msg_len;
/macosx-10.10/network_cmds-457/alias/
H A Dalias_smedia.c396 u_short msg_id, msg_len; local
406 memcpy(&msg_len, work, 2);
430 work += ntohs(msg_len);

Completed in 307 milliseconds