/external/openssl/ssl/ |
s23_pkt.c | 98 if (s->packet_length < (unsigned int)n) 105 j=BIO_read(s->rbio,(char *)&(p[s->packet_length]), 106 n-s->packet_length); 110 s->packet_length+=j; 111 if (s->packet_length >= (unsigned int)n) 112 return(s->packet_length);
|
d1_pkt.c | 195 s->packet_length = rdata->packet_length; 228 rdata->packet_length = s->packet_length; 251 s->packet_length = 0; 359 s->packet_length = rdata->packet_length; 392 /* At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length, 476 s->packet_length = 0; 514 s->packet_length=0 [all...] |
s23_srvr.c | 462 ssl3_finish_mac(s, s->packet+2, s->packet_length-2); 464 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */ 472 if ((csl+sil+cl+11) != s->packet_length) /* We can't have TLS extensions in SSL 2.0 format 520 while (p < s->packet+s->packet_length) 575 s->packet_length=n; 600 s->packet_length=n; 612 s->packet_length=0;
|
s2_pkt.c | 222 if (n > (int)s->packet_length) 224 n-=s->packet_length; 329 s->packet_length+=n; 333 s->packet_length=n; 348 if ((s->s2->rbuf_left != 0) || ((s->packet_length != 0) && extend)) 353 off=s->packet_length; 411 s->packet_length+=n; 413 s->packet_length=n;
|
dtls1.h | 263 unsigned int packet_length; member in struct:dtls1_record_data_st
|
s3_pkt.c | 129 * by s->packet and s->packet_length. 131 * [plus s->packet_length bytes if extend == 1].) 176 s->packet_length = 0; 192 s->packet_length+=n; 200 len = s->packet_length; 270 s->packet_length += n; 323 (s->packet_length < SSL3_RT_HEADER_LENGTH)) 388 if (rr->length > s->packet_length-SSL3_RT_HEADER_LENGTH) 390 /* now s->packet_length == SSL3_RT_HEADER_LENGTH */ 395 * and s->packet_length == SSL3_RT_HEADER_LENGTH + rr->length * [all...] |
s2_lib.c | 382 s->packet_length=0;
|
s23_clnt.c | 660 s->packet_length=n; 753 s->packet_length=n;
|
ssl.h | 1168 unsigned int packet_length; member in struct:ssl_st [all...] |
s3_lib.c | [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
TransportConnection.java | 213 int packet_length = ((recv_packet_header_buffer[0] & 0xff) << 24) local 219 if (packet_length > 35000 || packet_length < 12) 220 throw new IOException("Illegal packet size! (" + packet_length + ")"); 222 int payload_length = packet_length - padding_length - 1; 239 int packet_length = ((recv_packet_header_buffer[0] & 0xff) << 24) local 245 if (packet_length > 35000 || packet_length < 12) 246 throw new IOException("Illegal packet size! (" + packet_length + ")"); 248 int payload_length = packet_length - padding_length - 1 [all...] |
/external/openssl/include/openssl/ |
dtls1.h | 263 unsigned int packet_length; member in struct:dtls1_record_data_st
|
ssl.h | 1168 unsigned int packet_length; member in struct:ssl_st [all...] |
/external/openssh/ |
packet.c | 276 packet_start_discard(Enc *enc, Mac *mac, u_int packet_length, u_int discard) 280 if (packet_length != PACKET_MAX_SIZE && mac && mac->enabled) 848 u_int packet_length = 0; local 921 /* packet_length includes payload, padding and padding length field */ 922 packet_length = buffer_len(&active_state->outgoing_packet) - 4; 924 put_u32(cp, packet_length); 926 DBG(debug("send: len %d (includes padlen %d)", packet_length+4, padlen)); 954 active_state->p_send.blocks += (packet_length + 4) / block_size; 955 active_state->p_send.bytes += packet_length + 4; [all...] |
/external/quake/quake/src/QW/qwfwd/ |
misc.c | 87 for ( ; msg_readcount < packet_length ; msg_readcount++)
|