Searched refs:msg_len (Results 1 - 25 of 73) sorted by relevance

123

/external/openssh/
H A Dmsg.c68 u_int msg_len; local
77 msg_len = get_u32(buf);
78 if (msg_len > 256 * 1024) {
79 error("ssh_msg_recv: read: bad msg_len %u", msg_len);
83 buffer_append_space(m, msg_len);
84 if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
H A Dssh-pkcs11-helper.c209 u_int msg_len; local
219 msg_len = get_u32(cp);
220 if (msg_len > MAX_MSG_LENGTH) {
221 error("bad message len %d", msg_len);
224 if (buf_len < msg_len + 4)
252 if (msg_len < consumed) {
253 error("msg_len %d < consumed %d", msg_len, consumed);
256 if (msg_len > consumed)
257 buffer_consume(&iqueue, msg_len
[all...]
/external/dropbear/
H A Dsvr-authpam.c57 unsigned int msg_len = 0; local
84 msg_len = strlen(compare_message);
85 for (i = 0; i < msg_len; i++) {
91 if (msg_len > 2
92 && compare_message[msg_len-2] == ':'
93 && compare_message[msg_len-1] == ' ') {
94 compare_message[msg_len-1] = '\0';
/external/openssl/ssl/
H A Dd1_both.c126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
272 (int)s->d1->w_msg_hdr.msg_len
413 unsigned long msg_len; local
481 size_t frag_off,frag_len,msg_len; local
[all...]
H A Ddtls1.h139 unsigned long msg_len; member in struct:hm_header_st
H A Dd1_srvr.c872 unsigned int msg_len; local
894 msg_len = p - msg;
897 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len);
1475 unsigned int msg_len; local
1553 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH;
1555 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local
1608 unsigned int hlen, msg_len; local
1700 msg_len
1702 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local
[all...]
/external/tcpdump/
H A Dprint-olsr.c94 u_int8_t msg_len[2]; member in struct:olsr_msg
217 u_int msg_type, msg_len, msg_tlen, hello_len, prefix; local
255 msg_len = EXTRACT_16BITS(ptr.msg->msg_len);
258 if (msg_type == 0 || msg_len == 0) {
270 msg_len);
272 msg_tlen = msg_len - sizeof(struct olsr_msg);
383 tptr += msg_len;
H A Dprint-ldp.c503 u_short pdu_len,msg_len,msg_type,msg_tlen; local
544 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
553 msg_len,
557 if (msg_len == 0) /* infinite loop protection */
561 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */
564 if (!TTEST2(*tptr, msg_len))
604 msg_len);
606 tptr += msg_len+4;
607 tlen -= msg_len+4;
/external/wpa_supplicant_6/wpa_supplicant/
H A Dpreauth_test.c60 size_t *msg_len, void **data_pos)
64 *msg_len = sizeof(*hdr) + data_len;
65 hdr = os_malloc(*msg_len);
87 size_t *msg_len, void **data_pos)
89 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
58 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
85 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dpreauth_test.c55 size_t *msg_len, void **data_pos)
59 *msg_len = sizeof(*hdr) + data_len;
60 hdr = os_malloc(*msg_len);
82 size_t *msg_len, void **data_pos)
84 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
53 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
80 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/srtp/crypto/test/
H A Dauth_driver.c74 auth_bits_per_second(auth_t *h, int msg_len);
171 int msg_len = (msg_len_octets + 1)/2; local
178 for (i=0; i < msg_len; i++)
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_gtc.c61 size_t msg_len; local
65 msg_len = os_strlen(msg);
66 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
75 wpabuf_put_data(req, msg, msg_len);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/openssl/include/openssl/
H A Ddtls1.h139 unsigned long msg_len; member in struct:hm_header_st
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dwpa_i.h179 size_t *msg_len, void **data_pos)
183 msg_len, data_pos);
229 u8 *msg, size_t msg_len, u8 *key_mic);
177 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/wpa_supplicant_6/wpa_supplicant/tests/
H A Dtest_wpa.c109 u16 data_len, size_t *msg_len, void **data_pos)
116 *msg_len = sizeof(*hdr) + data_len;
117 hdr = os_malloc(*msg_len);
108 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
H A Dtest_aes.c178 int msg_len; member in struct:omac1_test_vector
275 omac1_aes_128(tv->k, tv->msg, tv->msg_len, result);
281 if (tv->msg_len > 1) {
288 len[1] = tv->msg_len - 1;
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa_i.h195 size_t *msg_len, void **data_pos)
199 msg_len, data_pos);
304 u8 *msg, size_t msg_len, u8 *key_mic);
193 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_i.h195 size_t *msg_len, void **data_pos)
199 msg_len, data_pos);
304 u8 *msg, size_t msg_len, u8 *key_mic);
193 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa_i.h195 size_t *msg_len, void **data_pos)
199 msg_len, data_pos);
304 u8 *msg, size_t msg_len, u8 *key_mic);
193 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/wpa_supplicant_8/wpa_supplicant/tests/
H A Dtest_wpa.c95 u16 data_len, size_t *msg_len, void **data_pos)
102 *msg_len = sizeof(*hdr) + data_len;
103 hdr = os_malloc(*msg_len);
94 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap.h269 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len);
/external/wpa_supplicant_6/wpa_supplicant/src/radius/
H A Dradius.c461 size_t msg_len; local
469 msg_len = ntohs(hdr->length);
470 if (msg_len < sizeof(*hdr) || msg_len > len) {
475 if (msg_len < len) {
477 (unsigned long) len - msg_len);
484 if (radius_msg_initialize(msg, msg_len)) {
489 os_memcpy(msg->buf, data, msg_len);
490 msg->buf_size = msg->buf_used = msg_len;

Completed in 279 milliseconds

123