HomeSort by relevance Sort by last modified time
    Searched defs:msg_len (Results 1 - 22 of 22) sorted by null

  /external/dropbear/
svr-authpam.c 57 unsigned int msg_len = 0; local
84 msg_len = strlen(compare_message);
85 for (i = 0; i < msg_len; i++) {
91 if (msg_len > 2
92 && compare_message[msg_len-2] == ':'
93 && compare_message[msg_len-1] == ' ') {
94 compare_message[msg_len-1] = '\0';
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_gtc.c 61 size_t msg_len; local
65 msg_len = os_strlen(msg);
66 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
75 wpabuf_put_data(req, msg, msg_len);
  /external/wpa_supplicant/
eap_tls_common.c 371 size_t msg_len; local
377 &msg_len, &need_more_input);
391 msg, msg_len,
eap_peap.c 403 size_t msg_len; local
426 &msg_len, &need_more_input);
457 msg, msg_len, in_decrypted, buf_len);
eap.c 1013 size_t i, msg_len; local
1018 msg_len = be_to_host16(hdr->length);
1019 if (msg_len < 5)
1021 msg_len -= 5;
1023 pos, msg_len);
1025 msg = os_malloc(msg_len + 1);
1028 for (i = 0; i < msg_len; i++)
1030 msg[msg_len] = '\0';
    [all...]
radius.c 458 size_t msg_len; local
466 msg_len = ntohs(hdr->length);
467 if (msg_len < sizeof(*hdr) || msg_len > len) {
472 if (msg_len < len) {
474 (unsigned long) len - msg_len);
481 if (radius_msg_initialize(msg, msg_len)) {
486 os_memcpy(msg->buf, data, msg_len);
487 msg->buf_size = msg->buf_used = msg_len;
eap_ttls.c 1089 size_t msg_len; local
1155 &msg_len, &need_more_input);
    [all...]
eap_fast.c 1539 size_t msg_len; local
    [all...]
  /external/wpa_supplicant/tests/
test_aes.c 176 int msg_len; member in struct:omac1_test_vector
274 omac1_aes_128(tv->k, tv->msg, tv->msg_len, result);
280 if (tv->msg_len > 1) {
287 len[1] = tv->msg_len - 1;
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_aes.c 178 int msg_len; member in struct:omac1_test_vector
275 omac1_aes_128(tv->k, tv->msg, tv->msg_len, result);
281 if (tv->msg_len > 1) {
288 len[1] = tv->msg_len - 1;
  /external/openssl/ssl/
d1_srvr.c 708 unsigned int msg_len; local
730 msg_len = p - msg;
733 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len);
1315 unsigned int msg_len; local
1395 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local
1448 unsigned int hlen, msg_len; local
1542 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local
    [all...]
d1_both.c 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
274 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)
415 unsigned long msg_len; local
494 size_t frag_off,frag_len,msg_len; local
    [all...]
dtls1.h 134 unsigned long msg_len; member in struct:hm_header_st
  /external/tcpdump/
print-olsr.c 94 u_int8_t msg_len[2]; member in struct:olsr_msg
217 u_int msg_type, msg_len, msg_tlen, hello_len, prefix; local
255 msg_len = EXTRACT_16BITS(ptr.msg->msg_len);
258 if (msg_type == 0 || msg_len == 0) {
270 msg_len);
272 msg_tlen = msg_len - sizeof(struct olsr_msg);
383 tptr += msg_len;
print-ldp.c 503 u_short pdu_len,msg_len,msg_type,msg_tlen; local
544 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
553 msg_len,
557 if (msg_len == 0) /* infinite loop protection */
561 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */
564 if (!TTEST2(*tptr, msg_len))
604 msg_len);
606 tptr += msg_len+4;
607 tlen -= msg_len+4;
print-ppp.c 880 int peerid_len, passwd_len, msg_len; local
952 msg_len = *p; /* Msg-Length */
954 if (length - (p - p0) < msg_len)
957 for (i = 0; i< msg_len; i++) {
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_tls_common.c 435 size_t msg_len; local
441 &msg_len, &need_more_input);
455 msg, msg_len,
860 size_t msg_len, buf_len; local
864 wpabuf_len(in_data), &msg_len,
888 res = tls_connection_decrypt(sm->ssl_ctx, data->conn, msg, msg_len,
eap.c 1025 size_t i, msg_len; local
1028 &msg_len);
1032 pos, msg_len);
1034 msg = os_malloc(msg_len + 1);
1037 for (i = 0; i < msg_len; i++)
1039 msg[msg_len] = '\0';
    [all...]
  /external/openssl/include/openssl/
dtls1.h 134 unsigned long msg_len; member in struct:hm_header_st
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_test.c 841 size_t msg_len; local
856 msg_len = 6 + sizeof(eth) + data_len;
857 msg = os_malloc(msg_len);
898 if (sendto(drv->test_socket, msg, msg_len, 0, addr, alen) < 0) {
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius.c 461 size_t msg_len; local
469 msg_len = ntohs(hdr->length);
470 if (msg_len < sizeof(*hdr) || msg_len > len) {
475 if (msg_len < len) {
477 (unsigned long) len - msg_len);
484 if (radius_msg_initialize(msg, msg_len)) {
489 os_memcpy(msg->buf, data, msg_len);
490 msg->buf_size = msg->buf_used = msg_len;
  /external/chromium/net/third_party/nss/ssl/
sslimpl.h 767 unsigned long msg_len; member in struct:SSL3HandshakeStateStr
    [all...]

Completed in 2395 milliseconds