| /src/external/bsd/libfido2/dist/src/ |
| authkey.c | 65 int msglen; local 78 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 84 r = cbor_parse_reply(msg, (size_t)msglen, authkey, parse_authkey);
|
| io.c | 336 int msglen; local 344 if ((msglen = fido_rx(d, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0 || 345 (size_t)msglen < 1) {
|
| pin.c | 292 int msglen; local 305 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 311 if ((r = cbor_parse_reply(msg, (size_t)msglen, aes_token, 592 int msglen; local 602 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 608 if ((r = cbor_parse_reply(msg, (size_t)msglen, retries, 645 int msglen; local 655 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) { 661 if ((r = cbor_parse_reply(msg, (size_t)msglen, retries,
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| quic_newcid_test.c | 56 size_t msglen = strlen(msg); local 77 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) 90 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) 104 (unsigned char *)msg, msglen, 111 if (!TEST_size_t_eq(msglen, byteswritten)) 118 if (!TEST_int_eq(SSL_read(cssl, buf, sizeof(buf)), msglen)) 121 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) 124 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) [all...] |
| clienthellotest.c | 63 size_t msglen; local 161 msglen = PACKET_remaining(&pkt); 198 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN);
|
| quicfaultstest.c | 30 size_t msglen = strlen(msg); local 44 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) 56 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) 98 size_t msglen = strlen(msg); local 127 if (!TEST_true(ossl_quic_tserver_write(qtserv, sid, (unsigned char *)msg, msglen, 131 if (!TEST_size_t_eq(msglen, byteswritten)) 268 size_t msglen = strlen(msg); local 325 msglen - 5, &byteswritten))) 328 if (!TEST_size_t_eq(byteswritten, msglen - 5) [all...] |
| rsa_test.c | 374 size_t msglen = 64; local 482 && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen)));
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| clienthellotest.c | 71 size_t msglen; local 200 msglen = PACKET_remaining(&pkt); 239 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN);
|
| rsa_test.c | 398 size_t msglen = 64; local 502 && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen)));
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| clienthellotest.c | 71 size_t msglen; local 195 msglen = PACKET_remaining(&pkt); 234 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN);
|
| /src/external/bsd/libpcap/dist/ |
| fmtutils.c | 281 size_t msglen; local 286 msglen = strlen(errbuf); 292 if (msglen + 3 > errbuflen) { 296 p = errbuf + msglen; 297 errbuflen_remaining = errbuflen - msglen; 364 size_t msglen; local 372 msglen = strlen(errbuf); 378 if (msglen + 3 > errbuflen) { 382 p = errbuf + msglen; 383 errbuflen_remaining = errbuflen - msglen; [all...] |
| pcap-libdlpi.c | 408 size_t msglen; local 428 msglen = p->bufsize; 432 &msglen, -1, NULL); 447 len = msglen;
|
| /src/external/bsd/nsd/dist/dnstap/ |
| dnstap_collector.c | 49 /* msglen + is_response + addrlen + is_tcp + packetlen + packet + zonelen + zone + spare + local_addr + addr */ 171 size_t msglen; local 191 msglen = buffer_read_u32_at(buf, 0); 192 if(msglen != (size_t)(r - 4)) { 195 log_msg(LOG_ERR, "dnstap collector: out of sync (msglen: %u)", 196 (unsigned int) msglen); 222 buffer_skip(buf, 4); /* skip msglen */ 374 /* msglen + is_response + addrlen + is_tcp + packetlen + packet + zonelen + zone + spare + local_addr + addr */
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| preauth.c | 146 size_t msglen; local 155 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 159 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 161 ETH_P_RSN_PREAUTH, msg, msglen);
|
| /src/external/gpl3/gcc/dist/libgfortran/io/ |
| open.c | 571 size_t msglen = opp->file_len + 22 + sizeof (errbuf); local 572 char *msg = xmalloc (msglen); 573 snprintf (msg, msglen, "Cannot open file '%s': %s", path,
|
| /src/external/gpl3/gcc.old/dist/libgfortran/io/ |
| open.c | 571 size_t msglen = opp->file_len + 22 + sizeof (errbuf); local 572 char *msg = xmalloc (msglen); 573 snprintf (msg, msglen, "Cannot open file '%s': %s", path,
|
| /src/external/gpl3/gdb/dist/readline/readline/ |
| isearch.c | 153 int msglen, searchlen; local 158 msglen = 0; 164 msglen = strlen (message); 168 message[msglen++] = '('; 172 strcpy (message + msglen, "failed "); 173 msglen += 7; 178 strcpy (message + msglen, "reverse-"); 179 msglen += 8; 182 strcpy (message + msglen, "i-search)`"); 183 msglen += 10 [all...] |
| /src/external/gpl3/gdb.old/dist/readline/readline/ |
| isearch.c | 156 int msglen, searchlen; local 161 msglen = 0; 167 msglen = strlen (message); 171 message[msglen++] = '('; 175 strcpy (message + msglen, "failed "); 176 msglen += 7; 181 strcpy (message + msglen, "reverse-"); 182 msglen += 8; 185 strcpy (message + msglen, "i-search)`"); 186 msglen += 10 [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-sk-helper.c | 117 size_t msglen, siglen = 0; local 122 (r = sshbuf_get_string_direct(req, &message, &msglen)) != 0 || 139 provider, msglen, (u_long)compat); 144 message, msglen, compat, pin)) != 0) {
|
| /src/external/bsd/cron/dist/ |
| misc.c | 465 int msglen; local 482 msglen = asprintf(&msg, 486 if (msglen == -1) 489 if (LogFD < OK || write(LogFD, msg, (size_t)msglen) < OK) { 491 write(STDERR, msg, (size_t)msglen);
|
| /src/external/bsd/nsd/dist/ |
| xfr-inspect.c | 231 uint32_t pkttype, msglen, msglen2; local 251 if(!xi_diff_read_32(in, &msglen)) { 252 printf("bad part %d: not msglen, file too short\n", partnum); 256 if(msglen < QHEADERSZ || msglen > QIOBUFSZ) { 257 printf("bad part %d: msglen %u (too short or too long)\n", 258 partnum, (unsigned)msglen); 262 if(fread(buffer_begin(packet), msglen, 1, in) != 1) { 281 printf("msglen : %u\n", (unsigned)msglen); 416 uint32_t pkttype, msglen, msglen2; local [all...] |
| xfrd-tcp.h | 69 uint16_t msglen; member in struct:xfrd_tcp 212 * On first call, make sure total_bytes = 0, msglen=0, buffer_clear(). 220 * On first call, make sure total_bytes=0, msglen=buffer_limit(),
|
| /src/external/bsd/ppp/dist/pppd/ |
| upap.c | 373 int msglen; local 433 msglen = strlen(msg); 434 if (msglen > 255) 435 msglen = 255; 436 upap_sresp(u, retcode, id, msg, msglen); 462 u_char msglen; local 474 GETCHAR(msglen, inp); 475 if (msglen > 0) { 477 if (len < msglen) { 482 PRINTMSG(msg, msglen); 498 u_char msglen; local [all...] |
| /src/external/bsd/tmux/dist/ |
| file.c | 296 size_t msglen; local 341 msglen = strlen(cf->path) + 1 + sizeof *msg; 342 if (msglen > MAX_IMSGSIZE - IMSG_HEADER_SIZE) { 346 msg = xmalloc(msglen); 350 memcpy(msg + 1, cf->path, msglen - sizeof *msg); 351 if (proc_send(cf->peer, MSG_WRITE_OPEN, -1, msg, msglen) != 0) { 369 size_t msglen; local 416 msglen = strlen(cf->path) + 1 + sizeof *msg; 417 if (msglen > MAX_IMSGSIZE - IMSG_HEADER_SIZE) { 421 msg = xmalloc(msglen); 472 size_t msglen, sent, left; local 569 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local 631 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local 651 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local 699 size_t msglen; local 730 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local 792 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local 810 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local 830 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local 856 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_client_write.c | 864 size_t msglen; local 868 msglen = 2000; 870 msglen += tls_client_cert_chain_der_len(conn); 872 msg = os_malloc(msglen); 877 end = msg + msglen;
|