/macosx-10.10.1/OpenSSL098-52/src/ssl/ |
H A D | s23_pkt.c | 98 if (s->packet_length < (unsigned int)n) 105 j=BIO_read(s->rbio,(char *)&(p[s->packet_length]), 106 n-s->packet_length); 110 s->packet_length+=j; 111 if (s->packet_length >= (unsigned int)n) 112 return(s->packet_length);
|
H A D | s23_srvr.c | 425 ssl3_finish_mac(s, s->packet+2, s->packet_length-2); 427 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */ 435 if ((csl+sil+cl+11) != s->packet_length) 527 s->packet_length=n; 552 s->packet_length=n; 560 s->packet_length=0;
|
H A D | d1_pkt.c | 155 s->packet_length = rdata->packet_length; 188 rdata->packet_length = s->packet_length; 203 s->packet_length = 0; 311 s->packet_length = rdata->packet_length; 340 /* At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length, 375 s->packet_length = 0; 445 s->packet_length [all...] |
H A D | s2_pkt.c | 222 if (n > (int)s->packet_length) 224 n-=s->packet_length; 326 s->packet_length+=n; 330 s->packet_length=n; 345 if ((s->s2->rbuf_left != 0) || ((s->packet_length != 0) && extend)) 350 off=s->packet_length; 408 s->packet_length+=n; 410 s->packet_length=n;
|
H A D | dtls1.h | 249 unsigned int packet_length; member in struct:dtls1_record_data_st
|
H A D | s3_pkt.c | 128 * by s->packet and s->packet_length. 130 * [plus s->packet_length bytes if extend == 1].) 140 s->packet_length = 0; 156 s->packet_length+=n; 168 int max_max = s->s3->rbuf.len - s->packet_length; 178 off = s->packet_length; 226 s->packet_length += n; 270 (s->packet_length < SSL3_RT_HEADER_LENGTH)) 317 if (rr->length > s->packet_length-SSL3_RT_HEADER_LENGTH) 319 /* now s->packet_length [all...] |
H A D | s23_clnt.c | 515 s->packet_length=n; 597 s->packet_length=n;
|
H A D | s2_lib.c | 291 s->packet_length=0;
|
H A D | s3_lib.c | 1745 s->packet_length=0;
|
H A D | ssl.h | 935 unsigned int packet_length; member in struct:ssl_st
|
/macosx-10.10.1/libpcap-48/libpcap/tests/ngdumptest/ |
H A D | ngdumptest.c | 62 size_t packet_length = 0; variable 280 packet_length = strtoul(optarg, NULL, 0); 281 packet_data = malloc(packet_length); 282 for (i = 0; i < packet_length; i++) { 287 make_data_block(block, packet_data, packet_length); 292 packet_length = strlen(optarg); 295 make_data_block(block, packet_data, packet_length);
|
/macosx-10.10.1/OpenSSL098-52/src/include/openssl/ |
H A D | dtls1.h | 249 unsigned int packet_length; member in struct:dtls1_record_data_st
|
H A D | ssl.h | 935 unsigned int packet_length; member in struct:ssl_st
|
/macosx-10.10.1/xnu-2782.1.97/iokit/bsddev/ |
H A D | IOKitBSDInit.cpp | 625 int * packet_length) 632 *packet_length = data->getLength(); 624 IOBSDRegistryEntryGetData(void * entry, char * property_name, int * packet_length) argument
|
/macosx-10.10.1/eap8021x-198/eapolclient.tproj/ |
H A D | Supplicant.c | 895 eapol_key_verify_signature(EAPOLPacketRef packet, int packet_length, argument 905 packet_copy = (EAPOLPacketRef)malloc(packet_length); 906 bcopy(packet, packet_copy, packet_length); 911 packet_copy, packet_length, 933 int packet_length; local 952 packet_length = sizeof(EAPOLPacket) + body_length; 956 is_valid = eapol_key_verify_signature(eapol_p, packet_length,
|
/macosx-10.10.1/Heimdal-398.1.2/lib/roken/ |
H A D | socket_wrapper.c | 674 unsigned short packet_length; member in struct:swrap_packet::__anon683::__anon684 836 packet->ip.hdr.packet_length = htons(wire_len - icmp_truncate_len); 856 packet->ip.hdr.packet_length = htons(wire_len - icmp_hdr_len);
|
/macosx-10.10.1/xnu-2782.1.97/bsd/kern/ |
H A D | netboot.c | 83 int * packet_length);
|
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | packet.c | 276 packet_start_discard(Enc *enc, Mac *mac, u_int packet_length, u_int discard) argument 280 if (packet_length != PACKET_MAX_SIZE && mac && mac->enabled) 929 /* packet_length includes payload, padding and padding length field */
|