Searched refs:msg_len (Results 1 - 25 of 59) sorted by relevance

123

/freebsd-10.1-release/crypto/openssh/
H A Dmsg.c68 u_int msg_len; local
77 msg_len = get_u32(buf);
78 if (msg_len > 256 * 1024) {
79 error("ssh_msg_recv: read: bad msg_len %u", msg_len);
83 buffer_append_space(m, msg_len);
84 if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
H A Dssh-pkcs11-helper.c209 u_int msg_len; local
219 msg_len = get_u32(cp);
220 if (msg_len > MAX_MSG_LENGTH) {
221 error("bad message len %d", msg_len);
224 if (buf_len < msg_len + 4)
252 if (msg_len < consumed) {
253 error("msg_len %d < consumed %d", msg_len, consumed);
256 if (msg_len > consumed)
257 buffer_consume(&iqueue, msg_len
[all...]
H A Dumac.c788 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx
944 pc->msg_len = 0;
1061 if (ctx->msg_len + len <= L1_KEY_LEN) {
1063 ctx->msg_len += len;
1066 bytes_hashed = ctx->msg_len % L1_KEY_LEN;
1067 if (ctx->msg_len == L1_KEY_LEN)
1079 ctx->msg_len += bytes_remaining;
1089 ctx->msg_len += L1_KEY_LEN;
1099 ctx->msg_len += len;
1114 if (ctx->msg_len > L1_KEY_LE
[all...]
/freebsd-10.1-release/contrib/tcpdump/
H A Dprint-olsr.c96 u_int8_t msg_len[2]; member in struct:olsr_msg4
106 u_int8_t msg_len[2]; member in struct:olsr_msg6
263 u_int msg_type, msg_len, msg_tlen, hello_len; local
312 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len);
313 if ((msg_len >= sizeof (struct olsr_msg6))
314 && (msg_len <= length))
318 if (msg_type == 0 || msg_len == 0) {
330 msg_len, (msg_len_valid == 0) ? " (invalid)" : "");
332 msg_tlen = msg_len
[all...]
H A Dprint-ldp.c567 u_short pdu_len,msg_len,msg_type,msg_tlen; local
607 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
616 msg_len,
620 if (msg_len == 0) /* infinite loop protection */
624 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */
627 TCHECK2(*tptr, msg_len);
666 msg_len);
668 tptr += msg_len+4;
669 tlen -= msg_len+4;
/freebsd-10.1-release/crypto/openssl/ssl/
H A Dd1_both.c126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 # define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
279 (int)s->d1->w_msg_hdr.msg_len
457 unsigned long msg_len; local
531 size_t frag_off, frag_len, msg_len; local
[all...]
H A Ddtls1.h145 unsigned long msg_len; member in struct:hm_header_st
H A Dd1_srvr.c918 unsigned int msg_len; local
940 msg_len = p - msg;
943 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0,
944 msg_len);
1505 unsigned int msg_len; local
1581 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH;
1583 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, local
1584 msg_len); local
1638 unsigned int hlen, msg_len; local
1727 msg_len
1729 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, local
1730 msg_len); local
[all...]
/freebsd-10.1-release/lib/libtacplus/
H A Dtaclib_private.h103 u_int16_t msg_len; member in struct:tac_authen_reply
130 u_int16_t msg_len; member in struct:tac_author_response
149 u_int16_t msg_len; member in struct:tac_acct_reply
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/
H A Dpreauth_test.c49 size_t *msg_len, void **data_pos)
53 *msg_len = sizeof(*hdr) + data_len;
54 hdr = os_malloc(*msg_len);
76 size_t *msg_len, void **data_pos)
78 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
47 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
74 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
H A Dwpas_glue.c61 size_t *msg_len, void **data_pos)
65 *msg_len = sizeof(*hdr) + data_len;
66 hdr = os_malloc(*msg_len);
367 size_t *msg_len, void **data_pos)
369 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
59 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
365 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/freebsd-10.1-release/contrib/wpa/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/freebsd-10.1-release/sys/dev/ixl/
H A Di40e_adminq.h87 u16 msg_len; member in struct:i40e_arq_event_info
/freebsd-10.1-release/sys/dev/hyperv/netvsc/
H A Dhv_rndis_filter.c128 rndis_mesg->msg_len = message_length;
181 packet->tot_data_buf_len = request->request_msg.msg_len;
186 packet->page_buffers[0].length = request->request_msg.msg_len;
233 if (response->msg_len <= sizeof(rndis_msg)) {
235 response->msg_len);
348 * its msg_len is 16 bytes but the byte_count field in the
352 if (pkt->tot_data_buf_len != rndis_hdr->msg_len) {
355 rndis_hdr->msg_len, pkt->tot_data_buf_len);
363 (rndis_hdr->msg_len > sizeof(rndis_msg)) ?
364 sizeof(rndis_msg) : rndis_hdr->msg_len);
[all...]
/freebsd-10.1-release/lib/libpam/modules/pam_tacplus/
H A Dpam_tacplus.c157 size_t msg_len; local
249 srvr_msg = (char *)tac_get_data(tach, &msg_len);
250 if (srvr_msg != NULL && msg_len != 0) {
/freebsd-10.1-release/usr.bin/gencat/
H A Dgencat.c554 int msg_len = strlen(msg->str) + 1; local
557 msg_hdr->__msglen = htonl(msg_len);
560 memcpy(strings, msg->str, msg_len);
561 strings += msg_len;
562 msg_offset += msg_len;
/freebsd-10.1-release/contrib/libpcap/
H A Dpcap-netfilter-linux.c103 u_int32_t msg_len; local
194 msg_len = NLMSG_ALIGN(nlh->nlmsg_len);
195 if (msg_len > len)
196 msg_len = len;
198 len -= msg_len;
199 buf += msg_len;
/freebsd-10.1-release/contrib/wpa/src/rsn_supp/
H A Dwpa_i.h189 size_t *msg_len, void **data_pos)
193 msg_len, data_pos);
298 u8 *msg, size_t msg_len, u8 *key_mic);
187 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/tests/
H A Dtest_wpa.c95 u16 data_len, size_t *msg_len, void **data_pos)
102 *msg_len = sizeof(*hdr) + data_len;
103 hdr = os_malloc(*msg_len);
94 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/freebsd-10.1-release/contrib/unbound/libunbound/
H A Dcontext.c337 q->msg_len = 0;
344 q->msg_len = len - 5*sizeof(uint32_t) - wlen;
346 q->msg_len);
349 q->msg_len = 0;
H A Dcontext.h159 size_t msg_len; member in struct:ctx_query
/freebsd-10.1-release/contrib/wpa/src/eap_peer/
H A Deap.h297 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len);
/freebsd-10.1-release/contrib/wpa/src/eap_common/
H A Deap_sim_common.h88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
/freebsd-10.1-release/sys/dev/aic/
H A Daic.c398 aic->msg_len = 1;
468 aic->msg_len = 1;
537 aic->msg_len = 0;
554 aic->msg_buf[aic->msg_len++] = aic_inb(aic, SCSIBUS);
556 if (aic->msg_len < 2) {
584 if (aic->msg_len == msglen) {
586 aic->msg_len = 0;
792 if (msgidx > 0 && msgidx == aic->msg_len) {
810 aic->msg_len = 1;
817 aic->msg_len
[all...]
/freebsd-10.1-release/sys/netinet/libalias/
H A Dalias_smedia.c437 u_short msg_id, msg_len; local
447 memcpy(&msg_len, work, 2);
475 work += ntohs(msg_len);

Completed in 501 milliseconds

123