HomeSort by: relevance | last modified time | path
    Searched defs:msglen (Results 1 - 25 of 91) sorted by relevancy

1 2 3 4

  /src/external/bsd/libfido2/dist/src/
authkey.c 65 int msglen; local
78 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) {
84 r = cbor_parse_reply(msg, (size_t)msglen, authkey, parse_authkey);
io.c 336 int msglen; local
344 if ((msglen = fido_rx(d, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0 ||
345 (size_t)msglen < 1) {
pin.c 292 int msglen; local
305 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) {
311 if ((r = cbor_parse_reply(msg, (size_t)msglen, aes_token,
592 int msglen; local
602 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) {
608 if ((r = cbor_parse_reply(msg, (size_t)msglen, retries,
645 int msglen; local
655 if ((msglen = fido_rx(dev, CTAP_CMD_CBOR, msg, FIDO_MAXMSG, ms)) < 0) {
661 if ((r = cbor_parse_reply(msg, (size_t)msglen, retries,
  /src/crypto/external/apache2/openssl/dist/test/
quic_newcid_test.c 56 size_t msglen = strlen(msg); local
77 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen))
90 if (!TEST_mem_eq(msg, msglen, buf, bytesread))
104 (unsigned char *)msg, msglen,
111 if (!TEST_size_t_eq(msglen, byteswritten))
118 if (!TEST_int_eq(SSL_read(cssl, buf, sizeof(buf)), msglen))
121 if (!TEST_mem_eq(msg, msglen, buf, bytesread))
124 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen))
    [all...]
clienthellotest.c 63 size_t msglen; local
161 msglen = PACKET_remaining(&pkt);
198 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN);
quicfaultstest.c 30 size_t msglen = strlen(msg); local
44 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen))
56 if (!TEST_mem_eq(msg, msglen, buf, bytesread))
98 size_t msglen = strlen(msg); local
127 if (!TEST_true(ossl_quic_tserver_write(qtserv, sid, (unsigned char *)msg, msglen,
131 if (!TEST_size_t_eq(msglen, byteswritten))
268 size_t msglen = strlen(msg); local
325 msglen - 5, &byteswritten)))
328 if (!TEST_size_t_eq(byteswritten, msglen - 5)
    [all...]
rsa_test.c 374 size_t msglen = 64; local
482 && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen)));
  /src/crypto/external/bsd/openssl/dist/test/
clienthellotest.c 71 size_t msglen; local
200 msglen = PACKET_remaining(&pkt);
239 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN);
rsa_test.c 398 size_t msglen = 64; local
502 && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen)));
  /src/crypto/external/bsd/openssl.old/dist/test/
clienthellotest.c 71 size_t msglen; local
195 msglen = PACKET_remaining(&pkt);
234 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN);
  /src/external/bsd/libpcap/dist/
fmtutils.c 281 size_t msglen; local
286 msglen = strlen(errbuf);
292 if (msglen + 3 > errbuflen) {
296 p = errbuf + msglen;
297 errbuflen_remaining = errbuflen - msglen;
364 size_t msglen; local
372 msglen = strlen(errbuf);
378 if (msglen + 3 > errbuflen) {
382 p = errbuf + msglen;
383 errbuflen_remaining = errbuflen - msglen;
    [all...]
pcap-libdlpi.c 408 size_t msglen; local
428 msglen = p->bufsize;
432 &msglen, -1, NULL);
447 len = msglen;
  /src/external/bsd/nsd/dist/dnstap/
dnstap_collector.c 49 /* msglen + is_response + addrlen + is_tcp + packetlen + packet + zonelen + zone + spare + local_addr + addr */
171 size_t msglen; local
191 msglen = buffer_read_u32_at(buf, 0);
192 if(msglen != (size_t)(r - 4)) {
195 log_msg(LOG_ERR, "dnstap collector: out of sync (msglen: %u)",
196 (unsigned int) msglen);
222 buffer_skip(buf, 4); /* skip msglen */
374 /* msglen + is_response + addrlen + is_tcp + packetlen + packet + zonelen + zone + spare + local_addr + addr */
  /src/external/bsd/wpa/dist/src/rsn_supp/
preauth.c 146 size_t msglen; local
155 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL);
159 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
161 ETH_P_RSN_PREAUTH, msg, msglen);
  /src/external/gpl3/gcc/dist/libgfortran/io/
open.c 571 size_t msglen = opp->file_len + 22 + sizeof (errbuf); local
572 char *msg = xmalloc (msglen);
573 snprintf (msg, msglen, "Cannot open file '%s': %s", path,
  /src/external/gpl3/gcc.old/dist/libgfortran/io/
open.c 571 size_t msglen = opp->file_len + 22 + sizeof (errbuf); local
572 char *msg = xmalloc (msglen);
573 snprintf (msg, msglen, "Cannot open file '%s': %s", path,
  /src/external/gpl3/gdb/dist/readline/readline/
isearch.c 153 int msglen, searchlen; local
158 msglen = 0;
164 msglen = strlen (message);
168 message[msglen++] = '(';
172 strcpy (message + msglen, "failed ");
173 msglen += 7;
178 strcpy (message + msglen, "reverse-");
179 msglen += 8;
182 strcpy (message + msglen, "i-search)`");
183 msglen += 10
    [all...]
  /src/external/gpl3/gdb.old/dist/readline/readline/
isearch.c 156 int msglen, searchlen; local
161 msglen = 0;
167 msglen = strlen (message);
171 message[msglen++] = '(';
175 strcpy (message + msglen, "failed ");
176 msglen += 7;
181 strcpy (message + msglen, "reverse-");
182 msglen += 8;
185 strcpy (message + msglen, "i-search)`");
186 msglen += 10
    [all...]
  /src/crypto/external/bsd/openssh/dist/
ssh-sk-helper.c 117 size_t msglen, siglen = 0; local
122 (r = sshbuf_get_string_direct(req, &message, &msglen)) != 0 ||
139 provider, msglen, (u_long)compat);
144 message, msglen, compat, pin)) != 0) {
  /src/external/bsd/cron/dist/
misc.c 465 int msglen; local
482 msglen = asprintf(&msg,
486 if (msglen == -1)
489 if (LogFD < OK || write(LogFD, msg, (size_t)msglen) < OK) {
491 write(STDERR, msg, (size_t)msglen);
  /src/external/bsd/nsd/dist/
xfr-inspect.c 231 uint32_t pkttype, msglen, msglen2; local
251 if(!xi_diff_read_32(in, &msglen)) {
252 printf("bad part %d: not msglen, file too short\n", partnum);
256 if(msglen < QHEADERSZ || msglen > QIOBUFSZ) {
257 printf("bad part %d: msglen %u (too short or too long)\n",
258 partnum, (unsigned)msglen);
262 if(fread(buffer_begin(packet), msglen, 1, in) != 1) {
281 printf("msglen : %u\n", (unsigned)msglen);
416 uint32_t pkttype, msglen, msglen2; local
    [all...]
xfrd-tcp.h 69 uint16_t msglen; member in struct:xfrd_tcp
212 * On first call, make sure total_bytes = 0, msglen=0, buffer_clear().
220 * On first call, make sure total_bytes=0, msglen=buffer_limit(),
  /src/external/bsd/ppp/dist/pppd/
upap.c 373 int msglen; local
433 msglen = strlen(msg);
434 if (msglen > 255)
435 msglen = 255;
436 upap_sresp(u, retcode, id, msg, msglen);
462 u_char msglen; local
474 GETCHAR(msglen, inp);
475 if (msglen > 0) {
477 if (len < msglen) {
482 PRINTMSG(msg, msglen);
498 u_char msglen; local
    [all...]
  /src/external/bsd/tmux/dist/
file.c 296 size_t msglen; local
341 msglen = strlen(cf->path) + 1 + sizeof *msg;
342 if (msglen > MAX_IMSGSIZE - IMSG_HEADER_SIZE) {
346 msg = xmalloc(msglen);
350 memcpy(msg + 1, cf->path, msglen - sizeof *msg);
351 if (proc_send(cf->peer, MSG_WRITE_OPEN, -1, msg, msglen) != 0) {
369 size_t msglen; local
416 msglen = strlen(cf->path) + 1 + sizeof *msg;
417 if (msglen > MAX_IMSGSIZE - IMSG_HEADER_SIZE) {
421 msg = xmalloc(msglen);
472 size_t msglen, sent, left; local
569 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local
631 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local
651 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local
699 size_t msglen; local
730 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local
792 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local
810 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local
830 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local
856 size_t msglen = imsg->hdr.len - IMSG_HEADER_SIZE; local
    [all...]
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_client_write.c 864 size_t msglen; local
868 msglen = 2000;
870 msglen += tls_client_cert_chain_der_len(conn);
872 msg = os_malloc(msglen);
877 end = msg + msglen;

Completed in 43 milliseconds

1 2 3 4