Home
last modified time | relevance | path

Searched refs:secNameLen (Results 1 – 13 of 13) sorted by relevance

/dports/net-mgmt/net-snmp/net-snmp-5.9/snmplib/
H A Dsnmptsm.c283 strlen(prefix)+1 >= parms->secNameLen || in tsm_rgenerate_out_msg()
299 parms->secNameLen - strlen(prefix) - 1); in tsm_rgenerate_out_msg()
300 tmStateRef->securityNameLen = parms->secNameLen - strlen(prefix) -1; in tsm_rgenerate_out_msg()
306 parms->secNameLen); in tsm_rgenerate_out_msg()
307 tmStateRef->securityNameLen = parms->secNameLen; in tsm_rgenerate_out_msg()
527 snprintf(parms->secName, *parms->secNameLen, in tsm_process_in_msg()
531 strncpy(parms->secName, tmStateRef->securityName, *parms->secNameLen); in tsm_process_in_msg()
535 *parms->secNameLen = strlen(parms->secName); in tsm_process_in_msg()
536 DEBUGMSGTL(("tsm", "user: %s/%d\n", parms->secName, (int)*parms->secNameLen)); in tsm_process_in_msg()
H A Dsnmpksm.c149 size_t secNameLen; member
280 u_char * secName, size_t secNameLen) in ksm_insert_cache() argument
292 entry->secName = netsnmp_memdup(secName, secNameLen); in ksm_insert_cache()
298 entry->secNameLen = secNameLen; in ksm_insert_cache()
1166 parms->secNameLen)) !=
1833 if (strlen(cname) > *parms->secNameLen + 1) {
1836 (int)strlen(cname), (int)*parms->secNameLen));
1843 *parms->secNameLen = strlen(cname);
1874 memcpy(parms->secName, entry->secName, entry->secNameLen);
1875 *parms->secNameLen = entry->secNameLen;
H A Dsnmpusm.c983 NULL, secNameLen)) == -1) { in usm_calc_offsets()
1408 theNameLength = secNameLen; in usm_generate_out_msg()
1904 theNameLength = secNameLen; in usm_rgenerate_out_msg()
2311 size_t * secNameLen, in usm_parse_security_parameters() argument
2440 origNameLen = *secNameLen; in usm_parse_security_parameters()
2457 if (origNameLen < *secNameLen + 1) { in usm_parse_security_parameters()
2464 if (*secNameLen > 32) { in usm_parse_security_parameters()
2473 secName[*secNameLen] = '\0'; in usm_parse_security_parameters()
2843 secName, secNameLen, in usm_process_in_msg()
2887 (*secStateRef, secName, *secNameLen) == -1) { in usm_process_in_msg()
[all …]
H A Dsnmp_api.c2668 parms.secNameLen = pdu->securityNameLen; in snmpv3_packet_realloc_rbuild()
2787 parms.secNameLen = pdu->securityNameLen; in snmpv3_packet_build()
3944 parms.secNameLen = &pdu->securityNameLen; in snmpv3_parse()
/dports/net-mgmt/net-snmp/net-snmp-5.9/snmplib/transports/
H A DsnmpUDPIPv6Domain.c509 const size_t secNameLen, in create_com2Sec6Entry() argument
546 secNameLen + contextNameLen); in create_com2Sec6Entry()
559 memcpy(last, secName, secNameLen); in create_com2Sec6Entry()
561 last += secNameLen; in create_com2Sec6Entry()
590 size_t secNameLen; in netsnmp_udp6_parse_security() local
626 secNameLen = strlen(secName); in netsnmp_udp6_parse_security()
627 if (secNameLen == 0) { in netsnmp_udp6_parse_security()
630 } else if (secNameLen > VACM_MAX_STRING) { in netsnmp_udp6_parse_security()
634 ++secNameLen; /* null termination */ in netsnmp_udp6_parse_security()
773 secName, secNameLen, in netsnmp_udp6_parse_security()
H A DsnmpUDPDomain.c214 int communityLen, secNameLen, contextNameLen, len; in netsnmp_udp_com2SecEntry_create() local
242 secNameLen = strlen(secName); in netsnmp_udp_com2SecEntry_create()
243 if (secNameLen > VACM_MAX_STRING) in netsnmp_udp_com2SecEntry_create()
251 len = offsetof(com2SecEntry, community) + communityLen + secNameLen + in netsnmp_udp_com2SecEntry_create()
270 memcpy(last, secName, secNameLen); in netsnmp_udp_com2SecEntry_create()
272 last += secNameLen + 1; in netsnmp_udp_com2SecEntry_create()
H A DsnmpUnixDomain.c620 size_t secNameLen; in netsnmp_unix_parse_security() local
649 secNameLen = strlen(secName) + 1; in netsnmp_unix_parse_security()
650 if (secNameLen == 1) { in netsnmp_unix_parse_security()
653 } else if (secNameLen > VACMSTRINGLEN) { in netsnmp_unix_parse_security()
700 sockpathLen + secNameLen + contextNameLen); in netsnmp_unix_parse_security()
726 memcpy(last, secName, secNameLen); in netsnmp_unix_parse_security()
727 last += secNameLen; in netsnmp_unix_parse_security()
/dports/net-mgmt/net-snmp/net-snmp-5.9/include/net-snmp/library/
H A Dsnmp_secmod.h31 size_t secNameLen; member
63 size_t *secNameLen; /* IN/OUT - Len available; len returned. */ member
/dports/net-mgmt/net-snmp/net-snmp-5.9/agent/mibgroup/target/
H A DsnmpTargetParamsEntry_data.h39 size_t secNameLen; member
H A Dtarget.c281 param->secNameLen, in get_target_sessions()
289 param->secNameLen, in get_target_sessions()
H A DsnmpTargetParamsEntry.c197 entry->secNameLen = strlen(cptr); in snmpTargetParams_addSecName()
935 old_name_len = params->secNameLen; in write_snmpTargetParamsSecName()
937 &params->secNameLen); in write_snmpTargetParamsSecName()
972 params->secNameLen = old_name_len; in write_snmpTargetParamsSecName()
/dports/net-mgmt/net-snmp/net-snmp-5.9/agent/mibgroup/notification/
H A DsnmpNotifyTable_data.c387 &pptr->secNameLen); in notifyTable_register_notifications()
403 &pptr->secNameLen); in notifyTable_register_notifications()
/dports/net-mgmt/net-snmp/net-snmp-5.9/
H A DChangeLog204322 - (snmp_client.c): default to setting secNameLen and contextNameLen to -1.
204444 … context, normalize _enginetime arg order, include wes's patches for null engineid and secNameLen++