| /src/crypto/dist/ipsec-tools/src/racoon/ |
| isakmp_frag.c | 90 size_t fraglen; local 121 fraglen = sizeof(*hdr) 125 if ((frag = vmalloc(fraglen)) == NULL) { 137 fraghdr->len = htons(fraglen - sizeof(*hdr));
|
| /src/sys/net/ |
| if_ieee1394subr.c | 254 int totlen, fraglen, off; local 270 fraglen = maxsize - sizeof(struct ieee1394_fraghdr); 280 off = fraglen; 283 if (off + fraglen > totlen) 284 fraglen = totlen - off; 297 m->m_next = m_copym(m0, sizeof(*ifh) + off, fraglen, M_DONTWAIT); 302 m->m_pkthdr.len = sizeof(*ifh) + fraglen; 303 off += fraglen;
|
| /src/external/bsd/tcpdump/dist/ |
| print-tcp.c | 800 uint32_t fraglen; local 804 fraglen = GET_BE_U_4(bp) & 0x7FFFFFFF; 805 if (fraglen > (length) - 4) 806 fraglen = (length) - 4; 813 nfsreq_noaddr_print(ndo, (const u_char *)rp, fraglen, (const u_char *)ip); 819 nfsreply_noaddr_print(ndo, (const u_char *)rp, fraglen, (const u_char *)ip);
|
| /src/lib/libc/rpc/ |
| xdr_rec.c | 539 int fraglen; local 560 fraglen = (int)(rstrm->in_header & ~LAST_FRAG); 561 if (fraglen == 0 || fraglen > rstrm->in_maxrec || 562 (rstrm->in_reclen + fraglen) > rstrm->in_maxrec) { 566 rstrm->in_reclen += fraglen;
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| d1_lib.c | 424 size_t fragoff, fraglen, msglen; local 560 || !PACKET_get_net_3_len(&msgpkt, &fraglen) 561 || !PACKET_get_sub_packet(&msgpkt, &msgpayload, fraglen) 585 if (fragoff != 0 || fraglen > msglen) { 593 fraglen + DTLS1_HM_HEADER_LENGTH, ssl,
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| d1_lib.c | 464 size_t fragoff, fraglen, msglen, reclen, align = 0; local 607 || !PACKET_get_net_3_len(&msgpkt, &fraglen) 608 || !PACKET_get_sub_packet(&msgpkt, &msgpayload, fraglen) 632 if (fragoff != 0 || fraglen > msglen) { 640 fraglen + DTLS1_HM_HEADER_LENGTH, s,
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| d1_lib.c | 453 size_t fragoff, fraglen, msglen, reclen, align = 0; local 596 || !PACKET_get_net_3_len(&msgpkt, &fraglen) 597 || !PACKET_get_sub_packet(&msgpkt, &msgpayload, fraglen) 621 if (fragoff != 0 || fraglen > msglen) { 629 fraglen + DTLS1_HM_HEADER_LENGTH, s,
|
| /src/crypto/external/bsd/openssl/dist/test/helpers/ |
| ssltestlib.c | 129 int rem, i, content, reclen, msglen, fragoff, fraglen, epoch; local 178 fraglen = (rec[MSG_FRAG_LEN_HI] << 16) 181 printf("*** Message Fragment len: %d\n", fraglen); 182 if (fragoff + fraglen > msglen) 184 else if (reclen < fraglen)
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| ssltestlib.c | 144 int rem, i, content, reclen, msglen, fragoff, fraglen, epoch; local 193 fraglen = (rec[MSG_FRAG_LEN_HI] << 16) 196 printf("*** Message Fragment len: %d\n", fraglen); 197 if (fragoff + fraglen > msglen) 199 else if (reclen < fraglen)
|
| /src/crypto/external/apache2/openssl/dist/test/helpers/ |
| ssltestlib.c | 125 int rem, i, content, reclen, msglen, fragoff, fraglen, epoch; local 174 fraglen = (rec[MSG_FRAG_LEN_HI] << 16) 177 printf("*** Message Fragment len: %d\n", fraglen); 178 if (fragoff + fraglen > msglen) 180 else if (reclen < fraglen)
|
| /src/external/bsd/unbound/dist/util/ |
| netevent.c | 5003 size_t fraglen; local 5014 fraglen = sldns_buffer_position(c->buffer); 5016 sldns_buffer_set_limit(c->buffer, fraglen);
|