/dports/net-mgmt/net-snmp/net-snmp-5.9/snmplib/ |
H A D | snmptsm.c | 283 strlen(prefix)+1 >= parms->secNameLen || in tsm_rgenerate_out_msg() 299 parms->secNameLen - strlen(prefix) - 1); in tsm_rgenerate_out_msg() 300 tmStateRef->securityNameLen = parms->secNameLen - strlen(prefix) -1; in tsm_rgenerate_out_msg() 306 parms->secNameLen); in tsm_rgenerate_out_msg() 307 tmStateRef->securityNameLen = parms->secNameLen; in tsm_rgenerate_out_msg() 527 snprintf(parms->secName, *parms->secNameLen, in tsm_process_in_msg() 531 strncpy(parms->secName, tmStateRef->securityName, *parms->secNameLen); in tsm_process_in_msg() 535 *parms->secNameLen = strlen(parms->secName); in tsm_process_in_msg() 536 DEBUGMSGTL(("tsm", "user: %s/%d\n", parms->secName, (int)*parms->secNameLen)); in tsm_process_in_msg()
|
H A D | snmpksm.c | 149 size_t secNameLen; member 280 u_char * secName, size_t secNameLen) in ksm_insert_cache() argument 292 entry->secName = netsnmp_memdup(secName, secNameLen); in ksm_insert_cache() 298 entry->secNameLen = secNameLen; in ksm_insert_cache() 1166 parms->secNameLen)) != 1833 if (strlen(cname) > *parms->secNameLen + 1) { 1836 (int)strlen(cname), (int)*parms->secNameLen)); 1843 *parms->secNameLen = strlen(cname); 1874 memcpy(parms->secName, entry->secName, entry->secNameLen); 1875 *parms->secNameLen = entry->secNameLen;
|
H A D | snmpusm.c | 983 NULL, secNameLen)) == -1) { in usm_calc_offsets() 1408 theNameLength = secNameLen; in usm_generate_out_msg() 1904 theNameLength = secNameLen; in usm_rgenerate_out_msg() 2311 size_t * secNameLen, in usm_parse_security_parameters() argument 2440 origNameLen = *secNameLen; in usm_parse_security_parameters() 2457 if (origNameLen < *secNameLen + 1) { in usm_parse_security_parameters() 2464 if (*secNameLen > 32) { in usm_parse_security_parameters() 2473 secName[*secNameLen] = '\0'; in usm_parse_security_parameters() 2843 secName, secNameLen, in usm_process_in_msg() 2887 (*secStateRef, secName, *secNameLen) == -1) { in usm_process_in_msg() [all …]
|
H A D | snmp_api.c | 2668 parms.secNameLen = pdu->securityNameLen; in snmpv3_packet_realloc_rbuild() 2787 parms.secNameLen = pdu->securityNameLen; in snmpv3_packet_build() 3944 parms.secNameLen = &pdu->securityNameLen; in snmpv3_parse()
|
/dports/net-mgmt/net-snmp/net-snmp-5.9/snmplib/transports/ |
H A D | snmpUDPIPv6Domain.c | 509 const size_t secNameLen, in create_com2Sec6Entry() argument 546 secNameLen + contextNameLen); in create_com2Sec6Entry() 559 memcpy(last, secName, secNameLen); in create_com2Sec6Entry() 561 last += secNameLen; in create_com2Sec6Entry() 590 size_t secNameLen; in netsnmp_udp6_parse_security() local 626 secNameLen = strlen(secName); in netsnmp_udp6_parse_security() 627 if (secNameLen == 0) { in netsnmp_udp6_parse_security() 630 } else if (secNameLen > VACM_MAX_STRING) { in netsnmp_udp6_parse_security() 634 ++secNameLen; /* null termination */ in netsnmp_udp6_parse_security() 773 secName, secNameLen, in netsnmp_udp6_parse_security()
|
H A D | snmpUDPDomain.c | 214 int communityLen, secNameLen, contextNameLen, len; in netsnmp_udp_com2SecEntry_create() local 242 secNameLen = strlen(secName); in netsnmp_udp_com2SecEntry_create() 243 if (secNameLen > VACM_MAX_STRING) in netsnmp_udp_com2SecEntry_create() 251 len = offsetof(com2SecEntry, community) + communityLen + secNameLen + in netsnmp_udp_com2SecEntry_create() 270 memcpy(last, secName, secNameLen); in netsnmp_udp_com2SecEntry_create() 272 last += secNameLen + 1; in netsnmp_udp_com2SecEntry_create()
|
H A D | snmpUnixDomain.c | 620 size_t secNameLen; in netsnmp_unix_parse_security() local 649 secNameLen = strlen(secName) + 1; in netsnmp_unix_parse_security() 650 if (secNameLen == 1) { in netsnmp_unix_parse_security() 653 } else if (secNameLen > VACMSTRINGLEN) { in netsnmp_unix_parse_security() 700 sockpathLen + secNameLen + contextNameLen); in netsnmp_unix_parse_security() 726 memcpy(last, secName, secNameLen); in netsnmp_unix_parse_security() 727 last += secNameLen; in netsnmp_unix_parse_security()
|
/dports/net-mgmt/net-snmp/net-snmp-5.9/include/net-snmp/library/ |
H A D | snmp_secmod.h | 31 size_t secNameLen; member 63 size_t *secNameLen; /* IN/OUT - Len available; len returned. */ member
|
/dports/net-mgmt/net-snmp/net-snmp-5.9/agent/mibgroup/target/ |
H A D | snmpTargetParamsEntry_data.h | 39 size_t secNameLen; member
|
H A D | target.c | 281 param->secNameLen, in get_target_sessions() 289 param->secNameLen, in get_target_sessions()
|
H A D | snmpTargetParamsEntry.c | 197 entry->secNameLen = strlen(cptr); in snmpTargetParams_addSecName() 935 old_name_len = params->secNameLen; in write_snmpTargetParamsSecName() 937 ¶ms->secNameLen); in write_snmpTargetParamsSecName() 972 params->secNameLen = old_name_len; in write_snmpTargetParamsSecName()
|
/dports/net-mgmt/net-snmp/net-snmp-5.9/agent/mibgroup/notification/ |
H A D | snmpNotifyTable_data.c | 387 &pptr->secNameLen); in notifyTable_register_notifications() 403 &pptr->secNameLen); in notifyTable_register_notifications()
|
/dports/net-mgmt/net-snmp/net-snmp-5.9/ |
H A D | ChangeLog | 204322 - (snmp_client.c): default to setting secNameLen and contextNameLen to -1. 204444 … context, normalize _enginetime arg order, include wes's patches for null engineid and secNameLen++
|