Searched refs:payload_len (Results 1 - 17 of 17) sorted by relevance

/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/
H A Deap_common.h22 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len,
H A Deap_common.c95 * @payload_len: Payload length in bytes (data after Type)
105 * payload_len bytes and has the EAP header and Type field already filled in.
107 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument
115 payload_len;
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/
H A Dprint-ip6.c88 register u_int payload_len; local
104 payload_len = EXTRACT_16BITS(&ip6->ip6_plen);
105 len = payload_len + sizeof(struct ip6_hdr);
131 payload_len);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/tls/
H A Dtlsv1_record.h69 size_t buf_size, size_t payload_len, size_t *out_len);
H A Dtlsv1_record.c145 * @payload_len: Length of the payload
153 size_t buf_size, size_t payload_len, size_t *out_len)
168 WPA_PUT_BE16(length, payload_len);
173 pos += payload_len;
152 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, size_t payload_len, size_t *out_len) argument
/netbsd-6-1-5-RELEASE/lib/libisns/
H A Disns_thread.c263 uint16_t payload_len; local
317 pdu_p->hdr.payload_len = isns_ntohs(pdu_p->hdr.
318 payload_len);
335 payload_len = pdu_p->hdr.payload_len;
338 while (buf_len + curbuf_p->alloc_len < payload_len) {
378 unread_len = pdu_p->hdr.payload_len - cur_len;
H A Disns_pdu.h176 uint16_t payload_len __packed;
H A Disns_pdu.c896 pdu_p->hdr.payload_len = 0;
953 if (pdu_p->hdr.payload_len == ISNS_MAX_PDU_PAYLOAD) {
976 pdu_p->hdr.payload_len++;
986 pdu_p->hdr.payload_len += pad_bytes;
1282 pdu_p->hdr.payload_len,
1292 isns_ntohs(pdu_p->hdr.payload_len),
H A Disns_task.c218 pdu_p->hdr.payload_len = isns_htons(pdu_p->hdr.
219 payload_len);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Deap_sake.c151 size_t payload_len)
163 if (eap_sake_parse_attributes(payload, payload_len, &attr))
195 size_t payload_len)
213 if (eap_sake_parse_attributes(payload, payload_len, &attr))
295 size_t payload_len)
309 if (eap_sake_parse_attributes(payload, payload_len, &attr))
146 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
190 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
290 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_gpsk.c261 size_t payload_len)
274 end = payload + payload_len;
554 size_t payload_len)
566 end = payload + payload_len;
256 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
549 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Dikev2.c663 u8 *payload, size_t payload_len)
670 payload_len) < 0) {
661 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/
H A Dsign.c507 size_t payload_len, sd_len, fragment_len; local
519 payload_len = snprintf(payload, sizeof(payload), "%s %c %s", tstamp,
521 if (payload_len >= sizeof(payload)) {
526 while (payload_index < payload_len) {
527 if (payload_len - payload_index <= SIGN_MAX_FRAG_LENGTH)
528 fragment_len = payload_len - payload_index;
539 sg->spri, payload_len, payload_index+1,
/netbsd-6-1-5-RELEASE/usr.sbin/perfused/
H A Dmsg.c169 size_t payload_len, const struct puffs_cred *cred)
181 len = payload_len + sizeof(*fih);
192 if (len != payload_len + sizeof(*fih))
168 perfused_new_pb(struct puffs_usermount *pu, puffs_cookie_t opc, int opcode, size_t payload_len, const struct puffs_cred *cred) argument
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/
H A Dsocket_wrapper.c776 size_t payload_len,
800 wire_len = wire_hdr_len + payload_len;
806 wire_len = wire_hdr_len + payload_len;
889 packet->ip.p.udp.length = htons(8 + payload_len);
895 if (payload && payload_len > 0) {
899 memcpy(p, payload, payload_len);
771 swrap_packet_init(struct timeval *tval, const struct sockaddr_in *src_addr, const struct sockaddr_in *dest_addr, int socket_type, const unsigned char *payload, size_t payload_len, unsigned long tcp_seq, unsigned long tcp_ack, unsigned char tcp_ctl, int unreachable, size_t *_packet_len) argument
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/
H A Dikev2.c695 u8 *payload, size_t payload_len)
702 payload_len) < 0) {
693 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/netbsd-6-1-5-RELEASE/lib/libperfuse/
H A Dops.c3070 size_t payload_len; local
3138 payload_len = data_len + sizeof(*fwi);
3145 pm = ps->ps_new_msg(pu, opc, FUSE_WRITE, payload_len, pcr);

Completed in 215 milliseconds