/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | proto.c | 52 if (BLEN (buf) < (int) sizeof (struct openvpn_iphdr)) 59 if (BLEN (buf) < (int)(sizeof (struct openvpn_ethhdr) 113 if (BLEN (&buf) < (int) sizeof (struct openvpn_iphdr)) 122 if (BLEN (&buf) != totlen) 133 BLEN (&buf),
|
H A D | mss.c | 52 if (BLEN (buf) < (int) sizeof (struct openvpn_iphdr)) 61 && ntohs (pip->tot_len) == BLEN (buf) 63 && hlen <= BLEN (buf) 64 && BLEN (buf) - hlen 88 if (BLEN (buf) < (int) sizeof (struct openvpn_ipv6hdr)) 97 if (BLEN (buf) != (int) ntohs(pip6->payload_len)+40 ) 136 ASSERT (BLEN (buf) >= (int) sizeof (struct openvpn_tcphdr)); 144 || hlen > BLEN (buf))
|
H A D | forward.h | 39 #define TUN_OUT(c) (BLEN(&(c)->c2.to_tun) > 0) 40 #define LINK_OUT(c) (BLEN(&(c)->c2.to_link) > 0)
|
H A D | push.c | 74 if (buf_string_compare_advance (&buf, "AUTH_FAILED,") && BLEN (&buf)) 82 if (buf_string_match_head_str (&buf, "AUTH_FAILED,CRV1:") && BLEN (&buf)) 102 if (buf_advance (&buf, adv) && buf_read_u8 (&buf) == ',' && BLEN (&buf)) 259 if (BLEN (&buf) >= safe_cap) 271 if (BLEN (&buf) + l >= safe_cap) 284 if (BLEN (&buf) + l >= safe_cap) 308 if (BLEN (&buf) > sizeof(cmd)-1) 472 md5_state_update (&c->c2.pulled_options_state, BPTR(&buf_orig), BLEN(&buf_orig)); 478 md5_state_update (&c->c2.pulled_options_state, BPTR(&buf_orig), BLEN(&buf_orig));
|
H A D | mroute.c | 132 if (BLEN (buf) >= (int) sizeof (struct openvpn_arp)) 161 if (BLEN (buf) >= 1) 166 if (BLEN (buf) >= (int) sizeof (struct openvpn_iphdr)) 185 if (BLEN (buf) >= (int) sizeof (struct openvpn_ipv6hdr)) 221 if (BLEN (buf) >= (int) sizeof (struct openvpn_ethhdr))
|
H A D | forward.c | 953 BLEN (&c->c2.buf), 1029 BLEN (&c->c2.buf), 1111 BLEN (&c->c2.buf), 1153 dmsg (D_TUN_RW, "TUN READ [%d]", BLEN (&c->c2.buf)); 1166 BLEN (&c->c2.buf), 1276 shaper_wrote_bytes (&c->c2.shaper, BLEN (&c->c2.to_link) 1297 BLEN (&c->c2.to_link), 1350 if (size != BLEN (&c->c2.to_link)) 1354 BLEN (&c->c2.to_link), 1412 dmsg (D_TUN_RW, "TUN WRITE [%d]", BLEN ( [all...] |
H A D | crypto.c | 148 format_hex (BPTR (buf), BLEN (buf), 80, &gc)); 168 ASSERT (cipher_ctx_update (ctx->cipher, BPTR (&work), &outlen, BPTR (buf), BLEN (buf))); 185 format_hex (BPTR (&work), BLEN (&work), 80, &gc)); 204 hmac_ctx_update (ctx->hmac, BPTR(&work), BLEN(&work)); 261 hmac_ctx_update (ctx->hmac, BPTR (buf) + hmac_len, BLEN (buf) - hmac_len); 309 if (!cipher_ctx_update (ctx->cipher, BPTR (&work), &outlen, BPTR (buf), BLEN (buf))) 319 format_hex (BPTR (&work), BLEN (&work), 80, &gc)); 712 ASSERT (rand_bytes (BPTR (&src), BLEN (&src))); 716 memcpy (buf_write_alloc (&buf, BLEN (&src)), BPTR (&src), BLEN ( [all...] |
H A D | ps.c | 195 head ? BLEN(head) : -1); 208 iov[1].iov_len = BLEN (head); 590 const int status = send (sd, BPTR(&pc->buf), BLEN(&pc->buf), MSG_NOSIGNAL); 634 if (!BLEN (&pc->buf)) 641 if (BLEN (&pc->buf)) 945 const int len = BLEN (buf);
|
H A D | ssl.h | 470 return BLEN (&ks->plaintext_read_buf);
|
H A D | clinat.c | 254 if (BLEN(ipbuf) >= sizeof(struct openvpn_iphdr) + sizeof(struct openvpn_tcphdr)) 261 if (BLEN(ipbuf) >= sizeof(struct openvpn_iphdr) + sizeof(struct openvpn_udphdr))
|
H A D | lzo.c | 194 err = LZO_COMPRESS (BPTR (buf), BLEN (buf), BPTR (&work), &zlen, lzowork->wmem); 255 err = LZO_DECOMPRESS (BPTR (buf), BLEN (buf), BPTR (&work), &zlen,
|
H A D | dhcp.c | 176 const int optlen = BLEN (ipbuf) - (sizeof (struct openvpn_iphdr) + sizeof (struct openvpn_udphdr) + sizeof (struct dhcp));
|
H A D | buffer.c | 121 memcpy (BPTR (&ret), BPTR (buf), BLEN (buf)); 168 return buf_write (dest, BPTR (src), BLEN (src)); 299 int len = BLEN(buf); 1034 size += BLEN(&more->buf); 1085 if (!BLEN (buf))
|
H A D | buffer.h | 115 #define BLEN(buf) (buf_len(buf)) macro 570 return buf_write (dest, BPTR (src), BLEN (src)); 637 if (BLEN (buf) < 1)
|
H A D | socket.h | 934 return BLEN (buf); 954 return sendto (sock->sd, BPTR (buf), BLEN (buf), 0, 964 return send (sock->sd, BPTR (buf), BLEN (buf), MSG_NOSIGNAL);
|
H A D | openvpn.h | 580 #define PROTO_DUMP(buf, gc) format_hex (BPTR (buf), BLEN (buf), 80, gc)
|
H A D | ssl_openssl.c | 949 memset (BPTR (buf), 0, BLEN (buf)); /* erase data just written */ 1008 VALGRIND_MAKE_READABLE ((void *) BPTR (buf), BLEN (buf)); 1070 ret = bio_write (ks_ssl->ssl_bio, BPTR(buf), BLEN(buf), 1116 ret = bio_write (ks_ssl->ct_in, BPTR(buf), BLEN(buf), "tls_write_ciphertext");
|
H A D | tun.h | 392 return BLEN (buf);
|
H A D | multi.c | 1918 if (BLEN (buf) > 0) 1941 if (BLEN (buf) > 0) 1945 printf ("BCAST len=%d\n", BLEN (buf)); 2131 printf ("TCP/UDP -> TUN [%d]\n", BLEN (&m->top.c2.buf)); 2154 if (BLEN (&c->c2.buf) > 0) 2213 register_activity (c, BLEN(&c->c2.to_tun)); 2274 register_activity (c, BLEN(&c->c2.to_tun)); 2323 if (BLEN (&m->top.c2.buf) > 0) 2344 printf ("TUN -> TCP/UDP [%d]\n", BLEN (&m->top.c2.buf));
|
H A D | proxy.c | 888 if (lookahead && BLEN (lookahead)) 889 msg (M_INFO, "HTTP PROXY: lookahead: %s", format_hex (BPTR (lookahead), BLEN (lookahead), 0));
|
H A D | socket.c | 2120 BLEN (&sb->buf), 2121 BLEN (&sb->residual)); 2624 len = recv (sock->sd, BPTR (&frag), BLEN (&frag), MSG_NOSIGNAL); 2767 packet_size_type len = BLEN (buf); 2791 iov.iov_len = BLEN (buf); 2880 wsabuf[0].len = maxsize ? maxsize : BLEN (&sock->reads.buf); 2883 ASSERT (wsabuf[0].len <= BLEN (&sock->reads.buf)); 2981 wsabuf[0].len = BLEN (&sock->writes.buf);
|
H A D | ssl_polarssl.c | 609 memset (BPTR (buf), 0, BLEN (buf)); /* erase data just written */ 752 memset (BPTR (buf), 0, BLEN (buf)); /* erase data just written */
|
H A D | crypto_polarssl.c | 237 if (0 != ctr_drbg_init(&cd_ctx, entropy_func, &ec, BPTR(&pers_string), BLEN(&pers_string)))
|
H A D | occ.c | 300 BLEN (&c->c2.buf));
|
H A D | socks.c | 492 if (BLEN (buf) < 10)
|