/external/ppp/pppd/ |
D | upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); [all …]
|
D | eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr; [all …]
|
/external/syslinux/core/lwip/src/netif/ppp/ |
D | pap.c | 396 int msglen; in upap_rauthreq() local 442 retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen); in upap_rauthreq() 446 upap_sresp(u, retcode, id, msg, msglen); in upap_rauthreq() 468 u_char msglen; in upap_rauthack() local 486 GETCHAR(msglen, inp); in upap_rauthack() 487 if (msglen > 0) { in upap_rauthack() 489 if (len < msglen) { in upap_rauthack() 494 PRINTMSG(msg, msglen); in upap_rauthack() 510 u_char msglen; in upap_rauthnak() local 527 GETCHAR(msglen, inp); in upap_rauthnak() [all …]
|
D | auth.c | 862 …_passwd( int unit, char *auser, int userlen, char *apasswd, int passwdlen, char **msg, int *msglen) in check_passwd() argument 870 LWIP_UNUSED_ARG(msglen); in check_passwd() 896 *msglen = strlen(*msg); in check_passwd() 920 *msglen = strlen(*msg); in check_passwd() 957 plogin(char *user, char *passwd, char **msg, int *msglen) 963 LWIP_UNUSED_ARG(msglen);
|
/external/ltp/utils/sctp/func_tests/ |
D | test_recvmsg.c | 69 int error, msglen, i; in main() local 138 for (i = 0, msglen = 30000; i < 15; i++, msglen-=2000) { in main() 142 test_check_msg_data(&inmessage, error, msglen, in main()
|
/external/ltp/testcases/network/stress/ns-tools/ |
D | ns-udpserver.c | 145 ssize_t msglen; /* the length of message */ in respond_to_client() local 168 if ((msglen = recvfrom(sock_fd, msgbuf, msgbuf_size, 0, in respond_to_client() 172 msgbuf[msglen] = '\0'; in respond_to_client() 178 if (sendto(sock_fd, msgbuf, msglen, 0, in respond_to_client() 180 sizeof(client_addr)) != msglen) in respond_to_client()
|
D | ns-mcast_receiver.c | 372 ssize_t msglen; /* the length of message */ in receive_mcast() local 408 msglen = recvfrom(sd, msgbuf, msgbuf_size, MSG_DONTWAIT, in receive_mcast() 410 if (msglen < 0) { in receive_mcast() 414 fprintf(stderr, "received %zd byte message\n", msglen); in receive_mcast()
|
/external/iproute2/testsuite/tools/ |
D | generate_nlmsg.c | 97 int msglen; in main() local 100 msglen = fill_vf_rate_test(buf, sizeof(buf)); in main() 101 if (msglen < 0) { in main() 110 if (fwrite(buf, msglen, 1, fp) != 1) { in main()
|
/external/pdfium/core/fdrm/crypto/ |
D | fx_crypt_sha.cpp | 484 uint8_t msglen[8]; in CRYPT_SHA256Finish() local 487 SHA_PUT_UINT32(high, msglen, 0); in CRYPT_SHA256Finish() 488 SHA_PUT_UINT32(low, msglen, 4); in CRYPT_SHA256Finish() 492 CRYPT_SHA256Update(ctx, msglen, 8); in CRYPT_SHA256Finish() 557 uint8_t msglen[16]; in CRYPT_SHA384Finish() local 558 memset(msglen, 0, 16); in CRYPT_SHA384Finish() 562 PUT_UINT64(high, msglen, 0); in CRYPT_SHA384Finish() 563 PUT_UINT64(low, msglen, 8); in CRYPT_SHA384Finish() 567 CRYPT_SHA384Update(ctx, msglen, 16); in CRYPT_SHA384Finish() 608 uint8_t msglen[16]; in CRYPT_SHA512Finish() local [all …]
|
D | fx_crypt.cpp | 215 uint8_t msglen[8]; in CRYPT_MD5Finish() local 216 PUT_UINT32(ctx->total[0], msglen, 0); in CRYPT_MD5Finish() 217 PUT_UINT32(ctx->total[1], msglen, 4); in CRYPT_MD5Finish() 221 CRYPT_MD5Update(ctx, msglen, 8); in CRYPT_MD5Finish()
|
/external/libpcap/ |
D | sockutils.c | 356 size_t msglen; in sock_open() local 373 msglen = strlen(errbufptr); in sock_open() 375 errbufptr[msglen] = ' '; in sock_open() 376 errbufptr[msglen + 1] = 0; in sock_open() 378 bufspaceleft = bufspaceleft - (msglen + 1); in sock_open() 379 errbufptr += (msglen + 1); in sock_open()
|
D | pcap-libdlpi.c | 336 size_t msglen; in pcap_read_libdlpi() local 356 msglen = p->bufsize; in pcap_read_libdlpi() 360 &msglen, -1, NULL); in pcap_read_libdlpi() 375 len = msglen; in pcap_read_libdlpi()
|
/external/scapy/scapy/layers/tls/ |
D | basefields.py | 230 msglen = struct.unpack('!H', s[:2])[0] 231 pkt.with_padding = (msglen & 0x8000) == 0 233 msglen_clean = msglen & 0x3fff 235 msglen_clean = msglen & 0x7fff
|
D | handshake.py | 68 length_from=lambda pkt: pkt.msglen) ] 72 if self.msglen is None: 247 length_from=lambda pkt: (pkt.msglen - 328 length_from=lambda pkt: (pkt.msglen - 404 length_from=lambda pkt: (pkt.msglen - 457 length_from=lambda pkt: pkt.msglen - 4) ] 470 length_from=lambda pkt: pkt.msglen - 2) ] 671 length_from=lambda pkt: pkt.msglen), 673 length_from=lambda pkt: pkt.msglen - len(pkt.params)) ] 848 length_from=lambda pkt: pkt.msglen) ] [all …]
|
D | record_sslv2.py | 105 msglen = struct.unpack("!H", s[:2])[0] 106 if msglen & 0x8000: 108 msglen_clean = msglen & 0x7fff 111 msglen_clean = msglen & 0x3fff
|
D | record_tls13.py | 135 msglen = struct.unpack('!H', s[3:5])[0] 136 hdr, efrag, r = s[:5], s[5:5+msglen], s[msglen+5:]
|
/external/kernel-headers/original/uapi/scsi/ |
D | scsi_netlink.h | 48 uint16_t msglen; member 120 (hdr)->msglen = mlen; \
|
/external/ipsec-tools/src/libipsec/ |
D | policy_parse.y | 586 policy_parse(msg, msglen) in policy_parse() argument 588 int msglen; 619 ipsec_set_policy(msg, msglen) in ipsec_set_policy() argument 621 int msglen; 625 policy = policy_parse(msg, msglen);
|
/external/ltp/testcases/kernel/syscalls/recvmsg/ |
D | recvmsg02.c | 39 static const unsigned msglen = ARRAY_SIZE(msg) - 1; variable 78 R = sendto(sdw, msg, msglen, 0, (struct sockaddr*)&addr_r, addrlen_r); in verify_recvmsg()
|
/external/syslinux/gpxe/src/crypto/ |
D | arc4.c | 115 const void *src, void *dst, size_t msglen ) in arc4_skip() argument 120 arc4_xor ( &ctx, src, dst, msglen ); in arc4_skip()
|
/external/toybox/toys/pending/ |
D | ip.c | 1468 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local 1473 if (msglen < 0) return 1; in display_route_info() 1501 tvar = msglen; in display_route_info() 1599 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local 1602 tvar = msglen; in display_route_info() 1622 int msglen = recv(sockfd, toybuf, sizeof(toybuf), 0); in display_route_info() local 1624 if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue; in display_route_info() 1625 else if (msglen < 0) { in display_route_info() 1629 } else if (!msglen) { in display_route_info() 1635 for (mhdr = (struct nlmsghdr*)toybuf; NLMSG_OK(mhdr, msglen); in display_route_info() [all …]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | preauth.c | 135 size_t msglen; in rsn_preauth_eapol_send() local 144 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send() 148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send() 150 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()
|
/external/syslinux/gpxe/src/include/gpxe/ |
D | arc4.h | 20 const void *src, void *dst, size_t msglen );
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_write.c | 873 size_t msglen; in tls_send_client_key_exchange() local 877 msglen = 2000; in tls_send_client_key_exchange() 879 msglen += tls_client_cert_chain_der_len(conn); in tls_send_client_key_exchange() 881 msg = os_malloc(msglen); in tls_send_client_key_exchange() 886 end = msg + msglen; in tls_send_client_key_exchange()
|
/external/iproute2/lib/ |
D | libnetlink.c | 426 int msglen = 0; in rtnl_dump_filter_l() local 450 msglen = status; in rtnl_dump_filter_l() 452 while (NLMSG_OK(h, msglen)) { in rtnl_dump_filter_l() 486 h = NLMSG_NEXT(h, msglen); in rtnl_dump_filter_l() 501 if (msglen) { in rtnl_dump_filter_l() 502 fprintf(stderr, "!!!Remnant of size %d\n", msglen); in rtnl_dump_filter_l()
|