/external/openssl/ssl/ |
d1_both.c | 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 141 OPENSSL_assert((msg_len) > 0); \ 143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \ 150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \ 274 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH) 415 unsigned long msg_len; local 494 size_t frag_off,frag_len,msg_len; local [all...] |
d1_srvr.c | 708 unsigned int msg_len; local 730 msg_len = p - msg; 733 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len); 1315 unsigned int msg_len; local 1395 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local 1448 unsigned int hlen, msg_len; local 1542 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local [all...] |
/external/dropbear/ |
svr-authpam.c | 57 unsigned int msg_len = 0; local 84 msg_len = strlen(compare_message); 85 for (i = 0; i < msg_len; i++) { 91 if (msg_len > 2 92 && compare_message[msg_len-2] == ':' 93 && compare_message[msg_len-1] == ' ') { 94 compare_message[msg_len-1] = '\0';
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gtc.c | 61 size_t msg_len; local 65 msg_len = os_strlen(msg); 66 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 75 wpabuf_put_data(req, msg, msg_len);
|
/external/wpa_supplicant/ |
preauth_test.c | 61 size_t *msg_len, void **data_pos) 65 *msg_len = sizeof(*hdr) + data_len; 66 hdr = os_malloc(*msg_len); 88 size_t *msg_len, void **data_pos) 90 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
|
wpa_i.h | 196 size_t *msg_len, void **data_pos) 199 msg_len, data_pos);
|
radius.c | 458 size_t msg_len; local 466 msg_len = ntohs(hdr->length); 467 if (msg_len < sizeof(*hdr) || msg_len > len) { 472 if (msg_len < len) { 474 (unsigned long) len - msg_len); 481 if (radius_msg_initialize(msg, msg_len)) { 486 os_memcpy(msg->buf, data, msg_len); 487 msg->buf_size = msg->buf_used = msg_len;
|
eap_sim_common.h | 87 void eap_sim_add_mac(const u8 *k_aut, u8 *msg, size_t msg_len, u8 *mac,
|
eap.c | 1013 size_t i, msg_len; local 1018 msg_len = be_to_host16(hdr->length); 1019 if (msg_len < 5) 1021 msg_len -= 5; 1023 pos, msg_len); 1025 msg = os_malloc(msg_len + 1); 1028 for (i = 0; i < msg_len; i++) 1030 msg[msg_len] = '\0'; [all...] |
wpa.h | 76 size_t *msg_len, void **data_pos);
|
/external/wpa_supplicant_6/wpa_supplicant/ |
preauth_test.c | 60 size_t *msg_len, void **data_pos) 64 *msg_len = sizeof(*hdr) + data_len; 65 hdr = os_malloc(*msg_len); 87 size_t *msg_len, void **data_pos) 89 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
|
wpas_glue.c | 63 size_t *msg_len, void **data_pos) 67 *msg_len = sizeof(*hdr) + data_len; 68 hdr = os_malloc(*msg_len); 359 size_t *msg_len, void **data_pos) 361 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
|
/external/tcpdump/ |
print-olsr.c | 94 u_int8_t msg_len[2]; member in struct:olsr_msg 217 u_int msg_type, msg_len, msg_tlen, hello_len, prefix; local 255 msg_len = EXTRACT_16BITS(ptr.msg->msg_len); 258 if (msg_type == 0 || msg_len == 0) { 270 msg_len); 272 msg_tlen = msg_len - sizeof(struct olsr_msg); 383 tptr += msg_len;
|
print-ldp.c | 503 u_short pdu_len,msg_len,msg_type,msg_tlen; local 544 msg_len=EXTRACT_16BITS(ldp_msg_header->length); 553 msg_len, 557 if (msg_len == 0) /* infinite loop protection */ 561 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */ 564 if (!TTEST2(*tptr, msg_len)) 604 msg_len); 606 tptr += msg_len+4; 607 tlen -= msg_len+4;
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_i.h | 179 size_t *msg_len, void **data_pos) 183 msg_len, data_pos); 229 u8 *msg, size_t msg_len, u8 *key_mic);
|
wpa.h | 52 size_t *msg_len, void **data_pos);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 109 u16 data_len, size_t *msg_len, void **data_pos) 116 *msg_len = sizeof(*hdr) + data_len; 117 hdr = os_malloc(*msg_len);
|
test_aes.c | 178 int msg_len; member in struct:omac1_test_vector 275 omac1_aes_128(tv->k, tv->msg, tv->msg_len, result); 281 if (tv->msg_len > 1) { 288 len[1] = tv->msg_len - 1;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.h | 94 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 107 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
|
eap_sim_common.c | 210 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 218 len[0] = msg_len; 224 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 405 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 413 len[0] = msg_len; 419 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 461 size_t msg_len; local 469 msg_len = ntohs(hdr->length); 470 if (msg_len < sizeof(*hdr) || msg_len > len) { 475 if (msg_len < len) { 477 (unsigned long) len - msg_len); 484 if (radius_msg_initialize(msg, msg_len)) { 489 os_memcpy(msg->buf, data, msg_len); 490 msg->buf_size = msg->buf_used = msg_len;
|
/external/wpa_supplicant/tests/ |
test_aes.c | 176 int msg_len; member in struct:omac1_test_vector 274 omac1_aes_128(tv->k, tv->msg, tv->msg_len, result); 280 if (tv->msg_len > 1) { 287 len[1] = tv->msg_len - 1;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.c | 435 size_t msg_len; local 441 &msg_len, &need_more_input); 455 msg, msg_len, 860 size_t msg_len, buf_len; local 864 wpabuf_len(in_data), &msg_len, 888 res = tls_connection_decrypt(sm->ssl_ctx, data->conn, msg, msg_len,
|
eap.c | 1025 size_t i, msg_len; local 1028 &msg_len); 1032 pos, msg_len); 1034 msg = os_malloc(msg_len + 1); 1037 for (i = 0; i < msg_len; i++) 1039 msg[msg_len] = '\0'; [all...] |
/external/openssl/include/openssl/ |
dtls1.h | 134 unsigned long msg_len; member in struct:hm_header_st
|