Home
last modified time | relevance | path

Searched refs:msglen (Results 1 – 25 of 44) sorted by relevance

12

/external/dropbear/libtomcrypt/src/encauth/eax/
Deax_test.c33 msglen; in eax_test()
231 tests[x].plaintext, tests[x].msglen, outct, outtag, &len)) != CRYPT_OK) { in eax_test()
234 … if (XMEMCMP(outct, tests[x].ciphertext, tests[x].msglen) || XMEMCMP(outtag, tests[x].tag, len)) { in eax_test()
238 for (y = 0; y < (unsigned long)tests[x].msglen; ) { in eax_test()
240 if (y < (unsigned long)(tests[x].msglen-1)) printf(", "); in eax_test()
256 outct, tests[x].msglen, outct, outtag, len, &res)) != CRYPT_OK) { in eax_test()
259 if ((res != 1) || XMEMCMP(outct, tests[x].plaintext, tests[x].msglen)) { in eax_test()
263 for (y = 0; y < (unsigned long)tests[x].msglen; ) { in eax_test()
265 if (y < (unsigned long)(tests[x].msglen-1)) printf(", "); in eax_test()
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/channel/
DChannelManager.java783 public void msgChannelExtendedData(byte[] msg, int msglen) throws IOException in msgChannelExtendedData() argument
785 if (msglen <= 13) in msgChannelExtendedData()
786 throw new IOException("SSH_MSG_CHANNEL_EXTENDED_DATA message has wrong size (" + msglen + ")"); in msgChannelExtendedData()
800 if (len != (msglen - 13)) in msgChannelExtendedData()
801 … new IOException("SSH_MSG_CHANNEL_EXTENDED_DATA message has wrong len (calculated " + (msglen - 13) in msgChannelExtendedData()
1061 public void msgChannelData(byte[] msg, int msglen) throws IOException in msgChannelData() argument
1063 if (msglen <= 9) in msgChannelData()
1064 throw new IOException("SSH_MSG_CHANNEL_DATA message has wrong size (" + msglen + ")"); in msgChannelData()
1074 if (len != (msglen - 9)) in msgChannelData()
1075 …throw new IOException("SSH_MSG_CHANNEL_DATA message has wrong len (calculated " + (msglen - 9) + "… in msgChannelData()
[all …]
/external/ppp/pppd/
Dupap.c382 int msglen; local
442 msglen = strlen(msg);
443 if (msglen > 255)
444 msglen = 255;
445 upap_sresp(u, retcode, id, msg, msglen);
475 u_char msglen; local
487 GETCHAR(msglen, inp);
488 if (msglen > 0) {
490 if (len < msglen) {
495 PRINTMSG(msg, msglen);
[all …]
Deap.c1050 int msglen; local
1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr;
1060 PUTSHORT(msglen, outp);
1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen);
1081 int msglen; local
1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE +
1092 PUTSHORT(msglen, outp);
1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen);
1117 int msglen; local
1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr;
[all …]
/external/qemu/android/
Dadb-server.c151 _adb_host_append_message(AdbHost* adb_host, const void* msg, int msglen) in _adb_host_append_message() argument
153 printf("Append %d bytes to ADB host buffer.\n", msglen); in _adb_host_append_message()
157 adb_host->pending_send_buffer = (uint8_t*)malloc(msglen); in _adb_host_append_message()
158 adb_host->pending_send_buffer_size = msglen; in _adb_host_append_message()
159 } else if ((adb_host->pending_send_data_size + msglen) > in _adb_host_append_message()
163 adb_host->pending_send_data_size + msglen); in _adb_host_append_message()
165 adb_host->pending_send_data_size + msglen; in _adb_host_append_message()
170 adb_host->pending_send_data_size + msglen); in _adb_host_append_message()
177 msg, msglen); in _adb_host_append_message()
513 adb_server_on_guest_message(void* opaque, const uint8_t* msg, int msglen) in adb_server_on_guest_message() argument
[all …]
Dhw-qemud.c223 typedef void (*QemudSerialReceive)( void* opaque, int channel, uint8_t* msg, int msglen);
522 int msglen ) in qemud_serial_send() argument
526 int avail, len = msglen; in qemud_serial_send()
528 if (msglen <= 0 || channel < 0) in qemud_serial_send()
532 __FUNCTION__, channel, msglen, in qemud_serial_send()
533 quote_bytes((const void*)msg, msglen)); in qemud_serial_send()
564 int2hex(frame, FRAME_HEADER_SIZE, msglen); in qemud_serial_send()
717 qemud_client_recv( void* opaque, uint8_t* msg, int msglen ) in qemud_client_recv() argument
724 c->clie_recv( c->clie_opaque, msg, msglen, c ); in qemud_client_recv()
735 if (msglen > FRAME_HEADER_SIZE && in qemud_client_recv()
[all …]
Dadb-qemud.c179 _adb_client_recv(void* opaque, uint8_t* msg, int msglen, QemudClient* client) in _adb_client_recv() argument
184 adb_client, adb_client->opaque, msglen, QB(msg, msglen)); in _adb_client_recv()
191 adb_server_on_guest_message(adb_client->opaque, msg, msglen); in _adb_client_recv()
196 if (msglen == 6 && !memcmp(msg, "accept", 6)) { in _adb_client_recv()
213 if (msglen == 5 && !memcmp(msg, "start", 5)) { in _adb_client_recv()
223 QB(msg, msglen), adb_client->state); in _adb_client_recv()
302 _adb_dbg_client_recv(void* opaque, uint8_t* msg, int msglen, QemudClient* client) in _adb_dbg_client_recv() argument
Dhw-qemud.h73 typedef void (*QemudClientRecv) ( void* opaque, uint8_t* msg, int msglen, QemudClient* client );
107 extern void qemud_client_send ( QemudClient* client, const uint8_t* msg, int msglen );
147 int msglen );
Dhw-sensors.c252 _hwSensorClient_recv( void* opaque, uint8_t* msg, int msglen, in _hwSensorClient_recv() argument
257 _hwSensorClient_receive(cl, msg, msglen); in _hwSensorClient_recv()
272 _hwSensorClient_send( HwSensorClient* cl, const uint8_t* msg, int msglen ) in _hwSensorClient_send() argument
274 D("%s: '%s'", __FUNCTION__, quote_bytes((const void*)msg, msglen)); in _hwSensorClient_send()
275 qemud_client_send(cl->client, msg, msglen); in _hwSensorClient_send()
360 _hwSensorClient_receive( HwSensorClient* cl, uint8_t* msg, int msglen ) in _hwSensorClient_receive() argument
364 D("%s: '%.*s'", __FUNCTION__, msglen, msg); in _hwSensorClient_receive()
370 if (msglen == 12 && !memcmp(msg, "list-sensors", 12)) { in _hwSensorClient_receive()
388 if (msglen == 4 && !memcmp(msg, "wake", 4)) { in _hwSensorClient_receive()
396 if (msglen > 10 && !memcmp(msg, "set-delay:", 10)) { in _hwSensorClient_receive()
[all …]
Dhw-control.c57 int msglen, in _hw_control_qemud_client_recv() argument
60 hw_control_do_query(opaque, msg, msglen); in _hw_control_qemud_client_recv()
Dboot-properties.c296 int msglen, in boot_property_client_recv() argument
302 if (msglen == 4 && !memcmp(msg, "list", 4)) { in boot_property_client_recv()
315 D("%s: ignoring unknown command: %.*s", __FUNCTION__, msglen, msg); in boot_property_client_recv()
/external/dropbear/libtomcrypt/src/pk/pkcs1/
Dpkcs_1_v1_5_decode.c33 unsigned long msglen, in pkcs_1_v1_5_decode() argument
50 if ((msglen > modulus_len) || (modulus_len < 11)) { in pkcs_1_v1_5_decode()
90 if (*outlen < (msglen - (2 + ps_len + 1))) { in pkcs_1_v1_5_decode()
91 *outlen = msglen - (2 + ps_len + 1); in pkcs_1_v1_5_decode()
96 *outlen = (msglen - (2 + ps_len + 1)); in pkcs_1_v1_5_decode()
Dpkcs_1_v1_5_encode.c34 unsigned long msglen, in pkcs_1_v1_5_encode() argument
61 if ((msglen + 11) > modulus_len) { in pkcs_1_v1_5_encode()
73 ps_len = modulus_len - msglen - 3; in pkcs_1_v1_5_encode()
99 XMEMCPY(&out[2 + ps_len + 1], msg, msglen); in pkcs_1_v1_5_encode()
Dpkcs_1_oaep_encode.c34 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, in pkcs_1_oaep_encode() argument
62 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { in pkcs_1_oaep_encode()
99 y = modulus_len - msglen - 2*hLen - 2; in pkcs_1_oaep_encode()
107 XMEMCPY(DB+x, msg, msglen); in pkcs_1_oaep_encode()
108 x += msglen; in pkcs_1_oaep_encode()
Dpkcs_1_oaep_decode.c33 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen, in pkcs_1_oaep_decode() argument
59 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) { in pkcs_1_oaep_decode()
/external/dropbear/libtomcrypt/src/headers/
Dtomcrypt_pkcs.h28 unsigned long msglen,
37 unsigned long msglen,
45 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen,
51 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen,
/external/dropbear/libtomcrypt/src/modes/ctr/
Dctr_test.c26 int keylen, msglen; in ctr_test()
66 if ((err = ctr_encrypt(tests[x].pt, buf, tests[x].msglen, &ctr)) != CRYPT_OK) { in ctr_test()
70 if (XMEMCMP(buf, tests[x].ct, tests[x].msglen)) { in ctr_test()
/external/dropbear/libtomcrypt/src/mac/f9/
Df9_test.c29 int msglen; in f9_test()
61 … if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { in f9_test()
/external/dropbear/libtomcrypt/src/mac/xcbc/
Dxcbc_test.c29 int msglen; in xcbc_test()
111 …if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK)… in xcbc_test()
/external/dropbear/libtomcrypt/src/mac/omac/
Domac_test.c30 int keylen, msglen; in omac_test()
89 …if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &le… in omac_test()
/external/dropbear/libtomcrypt/src/mac/pmac/
Dpmac_test.c31 int msglen; in pmac_test()
137 …if ((err = pmac_memory(idx, tests[x].key, 16, tests[x].msg, tests[x].msglen, outtag, &len)) != CRY… in pmac_test()
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
DSFTPv3Client.java204 int msglen = len + 1; in sendMessage() local
208 msglen += 4; in sendMessage()
211 os.write(msglen >> 24); in sendMessage()
212 os.write(msglen >> 16); in sendMessage()
213 os.write(msglen >> 8); in sendMessage()
214 os.write(msglen); in sendMessage()
265 byte[] msglen = new byte[4]; in receiveMessage()
267 readBytes(msglen, 0, 4); in receiveMessage()
269 …int len = (((msglen[0] & 0xff) << 24) | ((msglen[1] & 0xff) << 16) | ((msglen[2] & 0xff) << 8) | ( in receiveMessage()
/external/ipsec-tools/src/libipsec/
Dpolicy_parse.y586 policy_parse(msg, msglen) in policy_parse() argument
588 int msglen;
619 ipsec_set_policy(msg, msglen) in ipsec_set_policy() argument
621 int msglen;
625 policy = policy_parse(msg, msglen);
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
DTransportManager.java717 int msglen; in receiveLoop() local
720 msglen = tc.receiveMessage(msg, 0, msg.length); in receiveLoop()
745 TypesReader tr = new TypesReader(msg, 0, msglen); in receiveLoop()
774 TypesReader tr = new TypesReader(msg, 0, msglen); in receiveLoop()
822 km.handleMessage(msg, msglen); in receiveLoop()
843 mh.handleMessage(msg, msglen); in receiveLoop()
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
Dpreauth.c142 size_t msglen; in rsn_preauth_eapol_send() local
151 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send()
155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send()
157 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()

12