/freebsd-11-stable/crypto/openssh/ |
H A D | msg.c | 69 u_int msg_len; local 79 msg_len = get_u32(buf); 80 if (msg_len > 256 * 1024) { 81 error("ssh_msg_recv: read: bad msg_len %u", msg_len); 85 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { 89 if (atomicio(read, fd, p, msg_len) != msg_len) {
|
H A D | ssh-pkcs11-helper.c | 213 u_int msg_len; local 223 msg_len = get_u32(cp); 224 if (msg_len > MAX_MSG_LENGTH) { 225 error("bad message len %d", msg_len); 228 if (buf_len < msg_len + 4) 256 if (msg_len < consumed) { 257 error("msg_len %d < consumed %d", msg_len, consumed); 260 if (msg_len > consumed) 261 buffer_consume(&iqueue, msg_len [all...] |
H A D | umac.c | 777 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx 933 pc->msg_len = 0; 1050 if (ctx->msg_len + len <= L1_KEY_LEN) { 1052 ctx->msg_len += len; 1055 bytes_hashed = ctx->msg_len % L1_KEY_LEN; 1056 if (ctx->msg_len == L1_KEY_LEN) 1068 ctx->msg_len += bytes_remaining; 1078 ctx->msg_len += L1_KEY_LEN; 1088 ctx->msg_len += len; 1103 if (ctx->msg_len > L1_KEY_LE [all...] |
H A D | monitor_wrap.c | 150 u_int msg_len; local 159 msg_len = get_u32(buf); 160 if (msg_len > 256 * 1024) 161 fatal("%s: read: bad msg_len %d", __func__, msg_len); 163 buffer_append_space(m, msg_len); 164 if (atomicio(read, sock, buffer_ptr(m), msg_len) != msg_len)
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-olsr.c | 94 uint8_t msg_len[2]; member in struct:olsr_msg4 104 uint8_t msg_len[2]; member in struct:olsr_msg6 323 u_int msg_type, msg_len, msg_tlen, hello_len; local 367 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len); 368 if ((msg_len >= sizeof (struct olsr_msg6)) 369 && (msg_len <= length)) 373 if (msg_type == 0 || msg_len == 0) { 385 msg_len, (msg_len_valid == 0) ? " (invalid)" : "")); 390 msg_tlen = msg_len [all...] |
H A D | print-ldp.c | 581 u_short pdu_len,msg_len,msg_type,msg_tlen; local 627 msg_len=EXTRACT_16BITS(ldp_msg_header->length); 630 if (msg_len < sizeof(struct ldp_msg_header)-4) { 638 msg_len, 649 msg_len, 654 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ 657 ND_TCHECK2(*tptr, msg_len); 696 msg_len); 698 tptr += msg_len+4; 699 tlen -= msg_len [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | d1_both.c | 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 141 OPENSSL_assert((msg_len) > 0); \ 143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 148 # define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \ 150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \ 279 (int)s->d1->w_msg_hdr.msg_len 489 unsigned long msg_len; local 570 size_t frag_off, frag_len, msg_len; local [all...] |
H A D | dtls1.h | 149 unsigned long msg_len; member in struct:hm_header_st
|
/freebsd-11-stable/lib/libc/gen/ |
H A D | sendmmsg.c | 60 msgvec[i].msg_len = ret;
|
H A D | recvmmsg.c | 72 msgvec[0].msg_len = ret; 93 msgvec[i].msg_len = ret;
|
/freebsd-11-stable/lib/libtacplus/ |
H A D | taclib_private.h | 103 u_int16_t msg_len; member in struct:tac_authen_reply 130 u_int16_t msg_len; member in struct:tac_author_response 149 u_int16_t msg_len; member in struct:tac_acct_reply
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | preauth_test.c | 46 size_t *msg_len, void **data_pos) 50 *msg_len = sizeof(*hdr) + data_len; 51 hdr = os_malloc(*msg_len); 73 size_t *msg_len, void **data_pos) 75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); 44 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 71 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|
/freebsd-11-stable/sys/dev/ixl/ |
H A D | i40e_adminq.h | 89 u16 msg_len; member in struct:i40e_arq_event_info
|
H A D | ixlvc.c | 370 memcpy(sc->vf_res, event.msg_buf, min(event.msg_len, len)); 842 int msg_len, key_length; local 854 msg_len = sizeof(struct virtchnl_rss_key) + (sizeof(u8) * key_length) - 1; 855 rss_key_msg = malloc(msg_len, M_DEVBUF, M_NOWAIT | M_ZERO); 869 (u8 *)rss_key_msg, msg_len); 889 int msg_len; local 895 msg_len = sizeof(struct virtchnl_rss_lut) + (lut_length * sizeof(u8)) - 1; 896 rss_lut_msg = malloc(msg_len, M_DEVBUF, M_NOWAIT | M_ZERO); 924 (u8 *)rss_lut_msg, msg_len);
|
/freebsd-11-stable/lib/libpam/modules/pam_tacplus/ |
H A D | pam_tacplus.c | 157 size_t msg_len; local 249 srvr_msg = (char *)tac_get_data(tach, &msg_len); 250 if (srvr_msg != NULL && msg_len != 0) {
|
/freebsd-11-stable/usr.bin/gencat/ |
H A D | gencat.c | 556 int msg_len = strlen(msg->str) + 1; local 559 msg_hdr->__msglen = htonl(msg_len); 562 memcpy(strings, msg->str, msg_len); 563 strings += msg_len; 564 msg_offset += msg_len;
|
/freebsd-11-stable/contrib/unbound/libunbound/ |
H A D | context.h | 168 size_t msg_len; member in struct:ctx_query
|
H A D | context.c | 357 q->msg_len = 0; 364 q->msg_len = len - size_of_uint32s - wlen; 366 q->msg_len); 369 q->msg_len = 0;
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
|
/freebsd-11-stable/contrib/libpcap/ |
H A D | pcap-netfilter-linux.c | 141 uint32_t msg_len; local 260 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); 266 if (msg_len > ep - bp) 267 msg_len = ep - bp; 269 bp += msg_len;
|
/freebsd-11-stable/sys/netinet/libalias/ |
H A D | alias_smedia.c | 437 u_short msg_id, msg_len; local 447 memcpy(&msg_len, work, 2); 475 work += ntohs(msg_len);
|
/freebsd-11-stable/sys/dev/aic/ |
H A D | aic.c | 398 aic->msg_len = 1; 468 aic->msg_len = 1; 537 aic->msg_len = 0; 554 aic->msg_buf[aic->msg_len++] = aic_inb(aic, SCSIBUS); 556 if (aic->msg_len < 2) { 584 if (aic->msg_len == msglen) { 586 aic->msg_len = 0; 792 if (msgidx > 0 && msgidx == aic->msg_len) { 810 aic->msg_len = 1; 817 aic->msg_len [all...] |
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa_i.h | 240 size_t *msg_len, void **data_pos) 244 msg_len, data_pos); 415 u8 *msg, size_t msg_len, u8 *key_mic); 238 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libc/sys/ |
H A D | t_recvmmsg.c | 121 ATF_CHECK_EQ_MSG(mmsghdr[i].msg_len,
|