/dports/net/hostapd/hostapd-2.9/src/eap_server/ |
H A D | eap_server_mschapv2.c | 102 size_t ms_len; in eap_mschapv2_build_challenge() local 112 ms_len = sizeof(*ms) + 1 + CHALLENGE_LEN + sm->server_id_len; in eap_mschapv2_build_challenge() 113 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_challenge() 125 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_challenge() 147 size_t ms_len; in eap_mschapv2_build_success_req() local 151 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_success_req() 163 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_success_req() 178 msg, ms_len - sizeof(*ms)); in eap_mschapv2_build_success_req() 191 size_t ms_len; in eap_mschapv2_build_failure_req() local 193 ms_len = sizeof(*ms) + os_strlen(message); in eap_mschapv2_build_failure_req() [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_mschapv2.c | 102 size_t ms_len; in eap_mschapv2_build_challenge() local 113 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_challenge() 125 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_challenge() 147 size_t ms_len; in eap_mschapv2_build_success_req() local 151 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_success_req() 163 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_success_req() 178 msg, ms_len - sizeof(*ms)); in eap_mschapv2_build_success_req() 191 size_t ms_len; in eap_mschapv2_build_failure_req() local 193 ms_len = sizeof(*ms) + os_strlen(message); in eap_mschapv2_build_failure_req() 194 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_failure_req() [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_mschapv2.c | 102 size_t ms_len; in eap_mschapv2_build_challenge() local 112 ms_len = sizeof(*ms) + 1 + CHALLENGE_LEN + sm->server_id_len; in eap_mschapv2_build_challenge() 113 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_challenge() 125 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_challenge() 147 size_t ms_len; in eap_mschapv2_build_success_req() local 151 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_success_req() 163 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_success_req() 178 msg, ms_len - sizeof(*ms)); in eap_mschapv2_build_success_req() 191 size_t ms_len; in eap_mschapv2_build_failure_req() local 193 ms_len = sizeof(*ms) + os_strlen(message); in eap_mschapv2_build_failure_req() [all …]
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_mschapv2.c | 102 size_t ms_len; in eap_mschapv2_build_challenge() local 112 ms_len = sizeof(*ms) + 1 + CHALLENGE_LEN + sm->server_id_len; in eap_mschapv2_build_challenge() 113 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_challenge() 125 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_challenge() 147 size_t ms_len; in eap_mschapv2_build_success_req() local 151 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_success_req() 163 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_success_req() 178 msg, ms_len - sizeof(*ms)); in eap_mschapv2_build_success_req() 191 size_t ms_len; in eap_mschapv2_build_failure_req() local 193 ms_len = sizeof(*ms) + os_strlen(message); in eap_mschapv2_build_failure_req() [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_mschapv2.c | 102 size_t ms_len; in eap_mschapv2_build_challenge() local 113 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_challenge() 125 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_challenge() 147 size_t ms_len; in eap_mschapv2_build_success_req() local 151 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_success_req() 163 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_build_success_req() 178 msg, ms_len - sizeof(*ms)); in eap_mschapv2_build_success_req() 191 size_t ms_len; in eap_mschapv2_build_failure_req() local 193 ms_len = sizeof(*ms) + os_strlen(message); in eap_mschapv2_build_failure_req() 194 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_failure_req() [all …]
|
/dports/net/hostapd/hostapd-2.9/src/eap_peer/ |
H A D | eap_mschapv2.c | 152 int ms_len; in eap_mschapv2_challenge_reply() local 165 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; in eap_mschapv2_challenge_reply() 166 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_challenge_reply() 183 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_challenge_reply() 518 int ms_len; in eap_mschapv2_change_password() 539 ms_len = sizeof(*ms) + sizeof(*cp); in eap_mschapv2_change_password() 548 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_change_password() 731 size_t ms_len = WPA_GET_BE16(ms->ms_length); in eap_mschapv2_check_mslen() local 733 if (ms_len == len) in eap_mschapv2_check_mslen() 737 "ms_len=%lu", (unsigned long) len, (unsigned long) ms_len); in eap_mschapv2_check_mslen() [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | eap_mschapv2.c | 152 int ms_len; in eap_mschapv2_challenge_reply() local 165 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; in eap_mschapv2_challenge_reply() 166 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_challenge_reply() 183 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_challenge_reply() 518 int ms_len; in eap_mschapv2_change_password() 539 ms_len = sizeof(*ms) + sizeof(*cp); in eap_mschapv2_change_password() 548 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_change_password() 731 size_t ms_len = WPA_GET_BE16(ms->ms_length); in eap_mschapv2_check_mslen() local 733 if (ms_len == len) in eap_mschapv2_check_mslen() 737 "ms_len=%lu", (unsigned long) len, (unsigned long) ms_len); in eap_mschapv2_check_mslen() [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_peer/ |
H A D | eap_mschapv2.c | 152 int ms_len; in eap_mschapv2_challenge_reply() local 165 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; in eap_mschapv2_challenge_reply() 166 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_challenge_reply() 183 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_challenge_reply() 518 int ms_len; in eap_mschapv2_change_password() 539 ms_len = sizeof(*ms) + sizeof(*cp); in eap_mschapv2_change_password() 548 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_change_password() 731 size_t ms_len = WPA_GET_BE16(ms->ms_length); in eap_mschapv2_check_mslen() local 733 if (ms_len == len) in eap_mschapv2_check_mslen() 737 "ms_len=%lu", (unsigned long) len, (unsigned long) ms_len); in eap_mschapv2_check_mslen() [all …]
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_mschapv2.c | 152 int ms_len; in eap_mschapv2_challenge_reply() local 165 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; in eap_mschapv2_challenge_reply() 166 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_challenge_reply() 183 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_challenge_reply() 518 int ms_len; in eap_mschapv2_change_password() 539 ms_len = sizeof(*ms) + sizeof(*cp); in eap_mschapv2_change_password() 548 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_change_password() 731 size_t ms_len = WPA_GET_BE16(ms->ms_length); in eap_mschapv2_check_mslen() local 733 if (ms_len == len) in eap_mschapv2_check_mslen() 737 "ms_len=%lu", (unsigned long) len, (unsigned long) ms_len); in eap_mschapv2_check_mslen() [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_mschapv2.c | 152 int ms_len; in eap_mschapv2_challenge_reply() local 165 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; in eap_mschapv2_challenge_reply() 166 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_challenge_reply() 183 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_challenge_reply() 518 int ms_len; in eap_mschapv2_change_password() 539 ms_len = sizeof(*ms) + sizeof(*cp); in eap_mschapv2_change_password() 548 WPA_PUT_BE16(ms->ms_length, ms_len); in eap_mschapv2_change_password() 731 size_t ms_len = WPA_GET_BE16(ms->ms_length); in eap_mschapv2_check_mslen() local 733 if (ms_len == len) in eap_mschapv2_check_mslen() 737 "ms_len=%lu", (unsigned long) len, (unsigned long) ms_len); in eap_mschapv2_check_mslen() [all …]
|
/dports/science/mbdyn/mbdyn-1.7.3/utils/ |
H A D | s2s.cc | 341 this->addr.ms_len = sizeof(this->addr.ms_addr.ms_addr_local); in prepare() 368 addr.ms_len = sizeof(this->addr.ms_addr.ms_addr_inet); in prepare() 457 if (connect(this->sock, addrp, addr.ms_len) < 0) { in prepare() 461 silent_cerr("connect(" << this->sock << ",\"" << this->buf << "\"," << addr.ms_len << ") " in prepare() 499 &addr.ms_addr.ms_addr_generic, addr.ms_len); in send()
|
H A D | s2s.h | 45 socklen_t ms_len; member
|
/dports/mail/akpop3d/akpop3d-0.7.7/ |
H A D | main.c | 174 size_t ms_len = (size_t)strlen(optarg)+2; in main() local 175 mailspool = alloca(ms_len); in main() 177 snprintf(mailspool,ms_len,"%s/",optarg); in main()
|
/dports/net/ryu/ryu-4.26/ryu/tests/integrated/ |
H A D | test_request_reply_v12.py | 373 ms_len = 256 374 self._verify = ms_len 375 m = dp.ofproto_parser.OFPSetConfig(dp, flags, ms_len) 387 ms_len = dp.ofproto.OFPCML_MAX 388 self._verify = ms_len 389 m = dp.ofproto_parser.OFPSetConfig(dp, flags, ms_len) 401 ms_len = dp.ofproto.OFPCML_NO_BUFFER 402 self._verify = ms_len 403 m = dp.ofproto_parser.OFPSetConfig(dp, flags, ms_len)
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/scsi/ |
H A D | sr.c | 884 unsigned int ms_len = 128; in get_capabilities() local 911 rc = scsi_mode_sense(cd->device, 0, 0x2a, buffer, ms_len, in get_capabilities() 914 if (!scsi_status_is_good(rc) || data.length > ms_len || in get_capabilities()
|
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/scsi/ |
H A D | sr.c | 884 unsigned int ms_len = 128; in get_capabilities() local 911 rc = scsi_mode_sense(cd->device, 0, 0x2a, buffer, ms_len, in get_capabilities() 914 if (!scsi_status_is_good(rc) || data.length > ms_len || in get_capabilities()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/scsi/ |
H A D | sr.c | 884 unsigned int ms_len = 128; in get_capabilities() local 911 rc = scsi_mode_sense(cd->device, 0, 0x2a, buffer, ms_len, in get_capabilities() 914 if (!scsi_status_is_good(rc) || data.length > ms_len || in get_capabilities()
|
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/ |
H A D | ssl_mbedtls.c | 217 const size_t ms_len = sizeof(ks_ssl->ctx->session->master); in mbedtls_ssl_export_keys_cb() local 218 int ret = mbedtls_ssl_tls_prf(tls_prf_type, ms, ms_len, in mbedtls_ssl_export_keys_cb()
|
/dports/security/openvpn/openvpn-2.5.6/src/openvpn/ |
H A D | ssl_mbedtls.c | 217 const size_t ms_len = sizeof(ks_ssl->ctx->session->master); in mbedtls_ssl_export_keys_cb() local 218 int ret = mbedtls_ssl_tls_prf(tls_prf_type, ms, ms_len, in mbedtls_ssl_export_keys_cb()
|
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-eap.c | 710 gint ms_len; in dissect_eap_mschapv2() local 729 ms_len = tvb_get_ntohs(tvb, offset); in dissect_eap_mschapv2() 730 if (ms_len != size) in dissect_eap_mschapv2()
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-eap.c | 710 gint ms_len; in dissect_eap_mschapv2() local 729 ms_len = tvb_get_ntohs(tvb, offset); in dissect_eap_mschapv2() 730 if (ms_len != size) in dissect_eap_mschapv2()
|
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-eap.c | 710 gint ms_len; in dissect_eap_mschapv2() local 729 ms_len = tvb_get_ntohs(tvb, offset); in dissect_eap_mschapv2() 730 if (ms_len != size) in dissect_eap_mschapv2()
|
/dports/net/tshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-eap.c | 710 gint ms_len; 729 ms_len = tvb_get_ntohs(tvb, offset); 730 if (ms_len != size)
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/scsi/bfa/ |
H A D | bfa_fc.h | 1445 __be32 ms_len; /* Num of entries */ member
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/scsi/bfa/ |
H A D | bfa_fc.h | 1445 __be32 ms_len; /* Num of entries */ member
|