Searched refs:req_len (Results 1 - 9 of 9) sorted by relevance
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/tsiggss/ |
H A D | authsock.pl | 59 my ($version, $req_len) = unpack('N N', $buf); 61 if ($version != 1 || $req_len < 17) { 67 $client->recv(my $buf, $req_len - 8, 0); 76 if ($req_len != length($buf)+8) { 77 printf("Length mismatch %u %u\n", $req_len, length($buf)+8);
|
/macosx-10.10/postfix-255/postfix/src/global/ |
H A D | mail_trigger.c | 73 const char *req_buf, ssize_t req_len) 87 status = fifo_trigger(path, req_buf, req_len, var_trigger_timeout); 89 status = LOCAL_TRIGGER(path, req_buf, req_len, var_trigger_timeout); 91 status = LOCAL_TRIGGER(path, req_buf, req_len, var_trigger_timeout); 72 mail_trigger(const char *class, const char *service, const char *req_buf, ssize_t req_len) argument
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | ssu_external.c | 134 size_t req_len; local 184 req_len = sizeof(isc_uint32_t) + /* Format version */ 196 data = isc_mem_allocate(mctx, req_len); 202 isc_buffer_init(&buf, data, req_len); 204 isc_buffer_putuint32(&buf, req_len); 225 ret = write(fd, data, req_len); 227 if (ret != (ssize_t) req_len) {
|
/macosx-10.10/ppp-786.1.1/Authenticators/Radius/ |
H A D | radlib_private.h | 101 int req_len; /* Length of request */ member in struct:rad_handle
|
H A D | radlib.c | 167 MD5Update(&ctx, &h->request[POS_ATTRS], h->req_len - POS_ATTRS); 188 h->req_len - POS_ATTRS); 292 h->pass_pos = h->req_len - padded_len; 308 if (h->req_len + 2 + len > MSGSIZE) { 312 h->request[h->req_len++] = type; 313 h->request[h->req_len++] = len + 2; 314 memcpy(&h->request[h->req_len], value, len); 315 h->req_len += len; 587 n = sendto(h->fd, h->request, h->req_len, 0, 590 if (n != h->req_len) { [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/lib/ |
H A D | checkpw.c | 694 unsigned short max_len, req_len, u_len, p_len, s_len, r_len; local 712 req_len = 30; 713 if (max_len - req_len < u_len) goto toobig; 714 req_len += u_len; 715 if (max_len - req_len < p_len) goto toobig; 716 req_len += p_len; 717 if (max_len - req_len < s_len) goto toobig; 718 req_len += s_len; 719 if (max_len - req_len < r_len) goto toobig;
|
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | npnaf.c | 788 size_t req_len; 824 req_len = strlen((char *)endpoint); 828 req_len += strlen(pipe_dir) + 1; 831 if (req_len >= RPC_C_ENDPOINT_NP_MAX - 1) 840 strncpy(np_addr->sa.sun_path, (char *)endpoint, req_len); 781 size_t req_len; local
|
/macosx-10.10/ntp-92/ntpd/ |
H A D | ntp_intres.c | 784 size_t req_len; local 785 size_t total_len; /* req_len plus keyid & digest */ 850 req_len = pchEnd - (char *)&reqpkt; 864 req_len = REQ_LEN_NOMAC; 872 n = authencrypt(req_keyid, (void *)&reqpkt, req_len); 879 req_len += n; 886 n = send(sockfd, (char *)&reqpkt, req_len, 0); 904 ret = WriteFile((HANDLE)sockfd, (char *)&reqpkt, req_len,
|
/macosx-10.10/xnu-2782.1.97/bsd/kern/ |
H A D | uipc_mbuf.c | 4847 m_adj(struct mbuf *mp, int req_len) argument 4849 int len = req_len; 4872 m->m_pkthdr.len -= (req_len - len);
|
Completed in 260 milliseconds