Home
last modified time | relevance | path

Searched refs:msglen (Results 1 – 25 of 44) sorted by relevance

12

/external/ppp/pppd/
Dupap.c382 int msglen; local
442 msglen = strlen(msg);
443 if (msglen > 255)
444 msglen = 255;
445 upap_sresp(u, retcode, id, msg, msglen);
475 u_char msglen; local
487 GETCHAR(msglen, inp);
488 if (msglen > 0) {
490 if (len < msglen) {
495 PRINTMSG(msg, msglen);
[all …]
Deap.c1050 int msglen; local
1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr;
1060 PUTSHORT(msglen, outp);
1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen);
1081 int msglen; local
1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE +
1092 PUTSHORT(msglen, outp);
1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen);
1117 int msglen; local
1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr;
[all …]
/external/syslinux/core/lwip/src/netif/ppp/
Dpap.c396 int msglen; in upap_rauthreq() local
442 retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen); in upap_rauthreq()
446 upap_sresp(u, retcode, id, msg, msglen); in upap_rauthreq()
468 u_char msglen; in upap_rauthack() local
486 GETCHAR(msglen, inp); in upap_rauthack()
487 if (msglen > 0) { in upap_rauthack()
489 if (len < msglen) { in upap_rauthack()
494 PRINTMSG(msg, msglen); in upap_rauthack()
510 u_char msglen; in upap_rauthnak() local
527 GETCHAR(msglen, inp); in upap_rauthnak()
[all …]
Dauth.c862 …_passwd( int unit, char *auser, int userlen, char *apasswd, int passwdlen, char **msg, int *msglen) in check_passwd() argument
870 LWIP_UNUSED_ARG(msglen); in check_passwd()
896 *msglen = strlen(*msg); in check_passwd()
920 *msglen = strlen(*msg); in check_passwd()
957 plogin(char *user, char *passwd, char **msg, int *msglen)
963 LWIP_UNUSED_ARG(msglen);
/external/ltp/utils/sctp/func_tests/
Dtest_recvmsg.c69 int error, msglen, i; in main() local
138 for (i = 0, msglen = 30000; i < 15; i++, msglen-=2000) { in main()
142 test_check_msg_data(&inmessage, error, msglen, in main()
/external/ltp/testcases/network/stress/ns-tools/
Dns-udpserver.c145 ssize_t msglen; /* the length of message */ in respond_to_client() local
168 if ((msglen = recvfrom(sock_fd, msgbuf, msgbuf_size, 0, in respond_to_client()
172 msgbuf[msglen] = '\0'; in respond_to_client()
178 if (sendto(sock_fd, msgbuf, msglen, 0, in respond_to_client()
180 sizeof(client_addr)) != msglen) in respond_to_client()
Dns-mcast_receiver.c372 ssize_t msglen; /* the length of message */ in receive_mcast() local
408 msglen = recvfrom(sd, msgbuf, msgbuf_size, MSG_DONTWAIT, in receive_mcast()
410 if (msglen < 0) { in receive_mcast()
414 fprintf(stderr, "received %zd byte message\n", msglen); in receive_mcast()
/external/iproute2/testsuite/tools/
Dgenerate_nlmsg.c97 int msglen; in main() local
100 msglen = fill_vf_rate_test(buf, sizeof(buf)); in main()
101 if (msglen < 0) { in main()
110 if (fwrite(buf, msglen, 1, fp) != 1) { in main()
/external/pdfium/core/fdrm/crypto/
Dfx_crypt_sha.cpp484 uint8_t msglen[8]; in CRYPT_SHA256Finish() local
487 SHA_PUT_UINT32(high, msglen, 0); in CRYPT_SHA256Finish()
488 SHA_PUT_UINT32(low, msglen, 4); in CRYPT_SHA256Finish()
492 CRYPT_SHA256Update(ctx, msglen, 8); in CRYPT_SHA256Finish()
557 uint8_t msglen[16]; in CRYPT_SHA384Finish() local
558 memset(msglen, 0, 16); in CRYPT_SHA384Finish()
562 PUT_UINT64(high, msglen, 0); in CRYPT_SHA384Finish()
563 PUT_UINT64(low, msglen, 8); in CRYPT_SHA384Finish()
567 CRYPT_SHA384Update(ctx, msglen, 16); in CRYPT_SHA384Finish()
608 uint8_t msglen[16]; in CRYPT_SHA512Finish() local
[all …]
Dfx_crypt.cpp215 uint8_t msglen[8]; in CRYPT_MD5Finish() local
216 PUT_UINT32(ctx->total[0], msglen, 0); in CRYPT_MD5Finish()
217 PUT_UINT32(ctx->total[1], msglen, 4); in CRYPT_MD5Finish()
221 CRYPT_MD5Update(ctx, msglen, 8); in CRYPT_MD5Finish()
/external/libpcap/
Dsockutils.c356 size_t msglen; in sock_open() local
373 msglen = strlen(errbufptr); in sock_open()
375 errbufptr[msglen] = ' '; in sock_open()
376 errbufptr[msglen + 1] = 0; in sock_open()
378 bufspaceleft = bufspaceleft - (msglen + 1); in sock_open()
379 errbufptr += (msglen + 1); in sock_open()
Dpcap-libdlpi.c336 size_t msglen; in pcap_read_libdlpi() local
356 msglen = p->bufsize; in pcap_read_libdlpi()
360 &msglen, -1, NULL); in pcap_read_libdlpi()
375 len = msglen; in pcap_read_libdlpi()
/external/scapy/scapy/layers/tls/
Dbasefields.py230 msglen = struct.unpack('!H', s[:2])[0]
231 pkt.with_padding = (msglen & 0x8000) == 0
233 msglen_clean = msglen & 0x3fff
235 msglen_clean = msglen & 0x7fff
Dhandshake.py68 length_from=lambda pkt: pkt.msglen) ]
72 if self.msglen is None:
247 length_from=lambda pkt: (pkt.msglen -
328 length_from=lambda pkt: (pkt.msglen -
404 length_from=lambda pkt: (pkt.msglen -
457 length_from=lambda pkt: pkt.msglen - 4) ]
470 length_from=lambda pkt: pkt.msglen - 2) ]
671 length_from=lambda pkt: pkt.msglen),
673 length_from=lambda pkt: pkt.msglen - len(pkt.params)) ]
848 length_from=lambda pkt: pkt.msglen) ]
[all …]
Drecord_sslv2.py105 msglen = struct.unpack("!H", s[:2])[0]
106 if msglen & 0x8000:
108 msglen_clean = msglen & 0x7fff
111 msglen_clean = msglen & 0x3fff
Drecord_tls13.py135 msglen = struct.unpack('!H', s[3:5])[0]
136 hdr, efrag, r = s[:5], s[5:5+msglen], s[msglen+5:]
/external/kernel-headers/original/uapi/scsi/
Dscsi_netlink.h48 uint16_t msglen; member
120 (hdr)->msglen = mlen; \
/external/ipsec-tools/src/libipsec/
Dpolicy_parse.y586 policy_parse(msg, msglen) in policy_parse() argument
588 int msglen;
619 ipsec_set_policy(msg, msglen) in ipsec_set_policy() argument
621 int msglen;
625 policy = policy_parse(msg, msglen);
/external/ltp/testcases/kernel/syscalls/recvmsg/
Drecvmsg02.c39 static const unsigned msglen = ARRAY_SIZE(msg) - 1; variable
78 R = sendto(sdw, msg, msglen, 0, (struct sockaddr*)&addr_r, addrlen_r); in verify_recvmsg()
/external/syslinux/gpxe/src/crypto/
Darc4.c115 const void *src, void *dst, size_t msglen ) in arc4_skip() argument
120 arc4_xor ( &ctx, src, dst, msglen ); in arc4_skip()
/external/toybox/toys/pending/
Dip.c1468 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local
1473 if (msglen < 0) return 1; in display_route_info()
1501 tvar = msglen; in display_route_info()
1599 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local
1602 tvar = msglen; in display_route_info()
1622 int msglen = recv(sockfd, toybuf, sizeof(toybuf), 0); in display_route_info() local
1624 if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue; in display_route_info()
1625 else if (msglen < 0) { in display_route_info()
1629 } else if (!msglen) { in display_route_info()
1635 for (mhdr = (struct nlmsghdr*)toybuf; NLMSG_OK(mhdr, msglen); in display_route_info()
[all …]
/external/wpa_supplicant_8/src/rsn_supp/
Dpreauth.c135 size_t msglen; in rsn_preauth_eapol_send() local
144 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send()
148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send()
150 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()
/external/syslinux/gpxe/src/include/gpxe/
Darc4.h20 const void *src, void *dst, size_t msglen );
/external/wpa_supplicant_8/src/tls/
Dtlsv1_client_write.c873 size_t msglen; in tls_send_client_key_exchange() local
877 msglen = 2000; in tls_send_client_key_exchange()
879 msglen += tls_client_cert_chain_der_len(conn); in tls_send_client_key_exchange()
881 msg = os_malloc(msglen); in tls_send_client_key_exchange()
886 end = msg + msglen; in tls_send_client_key_exchange()
/external/iproute2/lib/
Dlibnetlink.c426 int msglen = 0; in rtnl_dump_filter_l() local
450 msglen = status; in rtnl_dump_filter_l()
452 while (NLMSG_OK(h, msglen)) { in rtnl_dump_filter_l()
486 h = NLMSG_NEXT(h, msglen); in rtnl_dump_filter_l()
501 if (msglen) { in rtnl_dump_filter_l()
502 fprintf(stderr, "!!!Remnant of size %d\n", msglen); in rtnl_dump_filter_l()

12