/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_common.h | 22 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len,
|
H A D | eap_common.c | 95 * @payload_len: Payload length in bytes (data after Type) 105 * payload_len bytes and has the EAP header and Type field already filled in. 107 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 115 payload_len;
|
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/ |
H A D | print-ip6.c | 88 register u_int payload_len; local 104 payload_len = EXTRACT_16BITS(&ip6->ip6_plen); 105 len = payload_len + sizeof(struct ip6_hdr); 131 payload_len);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/tls/ |
H A D | tlsv1_record.h | 69 size_t buf_size, size_t payload_len, size_t *out_len);
|
H A D | tlsv1_record.c | 145 * @payload_len: Length of the payload 153 size_t buf_size, size_t payload_len, size_t *out_len) 168 WPA_PUT_BE16(length, payload_len); 173 pos += payload_len; 152 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, size_t payload_len, size_t *out_len) argument
|
/netbsd-6-1-5-RELEASE/lib/libisns/ |
H A D | isns_thread.c | 263 uint16_t payload_len; local 317 pdu_p->hdr.payload_len = isns_ntohs(pdu_p->hdr. 318 payload_len); 335 payload_len = pdu_p->hdr.payload_len; 338 while (buf_len + curbuf_p->alloc_len < payload_len) { 378 unread_len = pdu_p->hdr.payload_len - cur_len;
|
H A D | isns_pdu.h | 176 uint16_t payload_len __packed;
|
H A D | isns_pdu.c | 896 pdu_p->hdr.payload_len = 0; 953 if (pdu_p->hdr.payload_len == ISNS_MAX_PDU_PAYLOAD) { 976 pdu_p->hdr.payload_len++; 986 pdu_p->hdr.payload_len += pad_bytes; 1282 pdu_p->hdr.payload_len, 1292 isns_ntohs(pdu_p->hdr.payload_len),
|
H A D | isns_task.c | 218 pdu_p->hdr.payload_len = isns_htons(pdu_p->hdr. 219 payload_len);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_sake.c | 151 size_t payload_len) 163 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 195 size_t payload_len) 213 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 295 size_t payload_len) 309 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 146 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 190 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 290 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_gpsk.c | 261 size_t payload_len) 274 end = payload + payload_len; 554 size_t payload_len) 566 end = payload + payload_len; 256 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 549 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | ikev2.c | 663 u8 *payload, size_t payload_len) 670 payload_len) < 0) { 661 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/ |
H A D | sign.c | 507 size_t payload_len, sd_len, fragment_len; local 519 payload_len = snprintf(payload, sizeof(payload), "%s %c %s", tstamp, 521 if (payload_len >= sizeof(payload)) { 526 while (payload_index < payload_len) { 527 if (payload_len - payload_index <= SIGN_MAX_FRAG_LENGTH) 528 fragment_len = payload_len - payload_index; 539 sg->spri, payload_len, payload_index+1,
|
/netbsd-6-1-5-RELEASE/usr.sbin/perfused/ |
H A D | msg.c | 169 size_t payload_len, const struct puffs_cred *cred) 181 len = payload_len + sizeof(*fih); 192 if (len != payload_len + sizeof(*fih)) 168 perfused_new_pb(struct puffs_usermount *pu, puffs_cookie_t opc, int opcode, size_t payload_len, const struct puffs_cred *cred) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | socket_wrapper.c | 776 size_t payload_len, 800 wire_len = wire_hdr_len + payload_len; 806 wire_len = wire_hdr_len + payload_len; 889 packet->ip.p.udp.length = htons(8 + payload_len); 895 if (payload && payload_len > 0) { 899 memcpy(p, payload, payload_len); 771 swrap_packet_init(struct timeval *tval, const struct sockaddr_in *src_addr, const struct sockaddr_in *dest_addr, int socket_type, const unsigned char *payload, size_t payload_len, unsigned long tcp_seq, unsigned long tcp_ack, unsigned char tcp_ctl, int unreachable, size_t *_packet_len) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | ikev2.c | 695 u8 *payload, size_t payload_len) 702 payload_len) < 0) { 693 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/netbsd-6-1-5-RELEASE/lib/libperfuse/ |
H A D | ops.c | 3070 size_t payload_len; local 3138 payload_len = data_len + sizeof(*fwi); 3145 pm = ps->ps_new_msg(pu, opc, FUSE_WRITE, payload_len, pcr);
|