/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | upap.c | 130 static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen); 366 int msglen; local 411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) { 430 msglen = strlen(msg); 431 if (msglen > 255) 432 msglen = 255; 435 upap_sresp(pcb, retcode, id, msg, msglen); 459 u_char msglen; local 472 GETCHAR(msglen, inp); 473 if (msglen > 494 u_char msglen; local 567 upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen) argument [all...] |
H A D | eap.c | 1018 int msglen; local 1020 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1021 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE); 1036 PUTSHORT(msglen, outp); 1051 int msglen; local 1053 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1055 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE); 1070 PUTSHORT(msglen, outp); 1097 int msglen; local 1099 msglen 1138 int msglen; local 1170 int msglen; local [all...] |
H A D | auth.c | 1004 * In either case, msg points to an appropriate message and msglen to the message len. 1006 int auth_check_passwd(ppp_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen) { argument 1018 *msglen = sizeof("Login ok")-1; 1024 *msglen = sizeof("Login incorrect")-1;
|
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | upap.c | 130 static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen); 366 int msglen; local 411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) { 430 msglen = strlen(msg); 431 if (msglen > 255) 432 msglen = 255; 435 upap_sresp(pcb, retcode, id, msg, msglen); 459 u_char msglen; local 472 GETCHAR(msglen, inp); 473 if (msglen > 494 u_char msglen; local 567 upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen) argument [all...] |
H A D | eap.c | 1018 int msglen; local 1020 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1021 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE); 1036 PUTSHORT(msglen, outp); 1051 int msglen; local 1053 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1055 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN + msglen), PPP_CTRL_PBUF_TYPE); 1070 PUTSHORT(msglen, outp); 1097 int msglen; local 1099 msglen 1138 int msglen; local 1170 int msglen; local [all...] |
H A D | ppp_impl.h | 561 int auth_check_passwd(ppp_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen);
|
H A D | auth.c | 1004 * In either case, msg points to an appropriate message and msglen to the message len. 1006 int auth_check_passwd(ppp_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen) { argument 1018 *msglen = sizeof("Login ok")-1; 1024 *msglen = sizeof("Login incorrect")-1;
|
/barrelfish-master/usr/monitor/ |
H A D | domain.c | 89 if(msg.buf.msglen == 1) { 97 } else if(msg.buf.msglen == sizeof(struct RAM) / sizeof(uintptr_t) + 1) { 124 disp_name(), msg.buf.msglen);
|
/barrelfish-master/lib/libc/nameser/ |
H A D | ns_print.c | 60 static int addname(const u_char *msg, size_t msglen, 109 ns_sprintrrf(const u_char *msg, size_t msglen, argument 175 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 202 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 206 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 277 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 295 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 299 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 384 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 403 T(addname(msg, msglen, 1171 addname(const u_char *msg, size_t msglen, const u_char **pp, const char *origin, char **buf, size_t *buflen) argument [all...] |
H A D | ns_parse.c | 106 ns_initparse(const u_char *msg, int msglen, ns_msg *handle) { argument 107 const u_char *eom = msg + msglen;
|
/barrelfish-master/include/barrelfish/ |
H A D | lmp_endpoints.h | 52 size_t msglen; ///< Length of message payload (in words) member in struct:lmp_recv_buf
|
H A D | multihop_chan.h | 184 struct event_closure _continuation, void *msg, size_t msglen);
|
/barrelfish-master/lib/lwip2/src/netif/ppp/polarssl/ |
H A D | md4.c | 248 unsigned char msglen[8]; local 254 PUT_ULONG_LE( low, msglen, 0 ); 255 PUT_ULONG_LE( high, msglen, 4 ); 261 md4_update( ctx, msglen, 8 );
|
H A D | md5.c | 267 unsigned char msglen[8]; local 273 PUT_ULONG_LE( low, msglen, 0 ); 274 PUT_ULONG_LE( high, msglen, 4 ); 280 md5_update( ctx, msglen, 8 );
|
H A D | sha1.c | 301 unsigned char msglen[8]; local 307 PUT_ULONG_BE( high, msglen, 0 ); 308 PUT_ULONG_BE( low, msglen, 4 ); 314 sha1_update( ctx, msglen, 8 );
|
/barrelfish-master/include/lwip2/netif/ppp/polarssl/ |
H A D | md4.c | 248 unsigned char msglen[8]; local 254 PUT_ULONG_LE( low, msglen, 0 ); 255 PUT_ULONG_LE( high, msglen, 4 ); 261 md4_update( ctx, msglen, 8 );
|
H A D | md5.c | 267 unsigned char msglen[8]; local 273 PUT_ULONG_LE( low, msglen, 0 ); 274 PUT_ULONG_LE( high, msglen, 4 ); 280 md5_update( ctx, msglen, 8 );
|
H A D | sha1.c | 301 unsigned char msglen[8]; local 307 PUT_ULONG_BE( high, msglen, 0 ); 308 PUT_ULONG_BE( low, msglen, 4 ); 314 sha1_update( ctx, msglen, 8 );
|
/barrelfish-master/lib/barrelfish/ |
H A D | multihop_chan.c | 439 * \param msglen length of the message payload (in bytes) 443 struct event_closure _continuation, void *msg, size_t msglen) 460 (uint8_t *) msg, msglen); 442 multihop_send_message(struct multihop_chan *mc, struct event_closure _continuation, void *msg, size_t msglen) argument
|
H A D | flounder_support.c | 327 if (msg->buf.msglen == 0) { 339 for (; msgpos < msg->buf.msglen && *pos < *len; msgpos++) {
|
H A D | inthandler.c | 76 if (buf.buf.msglen == 1 && buf.words[0] == 1) {
|
H A D | lmp_endpoints.c | 408 buf->msglen = header.x.length;
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | s3_clnt.c | 2469 size_t msglen; local 2523 msglen=255; 2524 if (EVP_PKEY_encrypt(pkey_ctx,tmp,&msglen,premaster_secret,32)<0) { 2529 if (msglen >= 0x80) 2532 *(p++)= msglen & 0xff; 2533 n=msglen+3; 2537 *(p++)= msglen & 0xff; 2538 n=msglen+2; 2540 memcpy(p, tmp, msglen);
|
/barrelfish-master/lib/libc/resolv/ |
H A D | res_debug.c | 369 p_fqnname(const u_char *cp, const u_char *msg, int msglen, char *name, argument 374 if ((n = dn_expand(msg, cp + msglen, cp, name, namelen)) < 0)
|