/reactos/drivers/network/tcpip/lwip/src/netif/ppp/ |
H A D | upap.c | 366 int msglen; in upap_rauthreq() local 431 if (msglen > 255) in upap_rauthreq() 432 msglen = 255; in upap_rauthreq() 459 u_char msglen; in upap_rauthack() local 472 GETCHAR(msglen, inp); in upap_rauthack() 473 if (msglen > 0) { in upap_rauthack() 475 if (len < msglen) { in upap_rauthack() 495 u_char msglen; in upap_rauthnak() local 508 GETCHAR(msglen, inp); in upap_rauthnak() 509 if (msglen > 0) { in upap_rauthnak() [all …]
|
H A D | eap.c | 1018 int msglen; in eap_send_response() local 1036 PUTSHORT(msglen, outp); in eap_send_response() 1051 int msglen; in eap_chap_response() local 1070 PUTSHORT(msglen, outp); in eap_chap_response() 1097 int msglen; local 1115 PUTSHORT(msglen, outp); 1138 int msglen; local 1157 PUTSHORT(msglen, outp); 1170 int msglen; in eap_send_nak() local 1172 msglen = EAP_HEADERLEN + 2 * sizeof (u_char); in eap_send_nak() [all …]
|
H A D | auth.c | 1006 …user, unsigned int userlen, char *apasswd, unsigned int passwdlen, const char **msg, int *msglen) { in auth_check_passwd() argument 1018 *msglen = sizeof("Login ok")-1; in auth_check_passwd() 1024 *msglen = sizeof("Login incorrect")-1; in auth_check_passwd()
|
/reactos/drivers/filesystems/btrfs/ |
H A D | crc32c.h | 10 uint32_t __stdcall calc_crc32c_hw(uint32_t seed, uint8_t* msg, uint32_t msglen); 13 uint32_t __stdcall calc_crc32c_sw(uint32_t seed, uint8_t* msg, uint32_t msglen); 15 typedef uint32_t (__stdcall *crc_func)(uint32_t seed, uint8_t* msg, uint32_t msglen);
|
H A D | crc32c.c | 62 …ll calc_crc32c_sw(_In_ uint32_t seed, _In_reads_bytes_(msglen) uint8_t* msg, _In_ uint32_t msglen)… in calc_crc32c_sw() argument 65 for (uint32_t i = 0; i < msglen; i++) { in calc_crc32c_sw()
|
/reactos/drivers/network/tcpip/lwip/src/netif/ppp/polarssl/ |
H A D | md4.c | 248 unsigned char msglen[8]; in md4_finish() local 254 PUT_ULONG_LE( low, msglen, 0 ); in md4_finish() 255 PUT_ULONG_LE( high, msglen, 4 ); in md4_finish() 261 md4_update( ctx, msglen, 8 ); in md4_finish()
|
H A D | md5.c | 267 unsigned char msglen[8]; in md5_finish() local 273 PUT_ULONG_LE( low, msglen, 0 ); in md5_finish() 274 PUT_ULONG_LE( high, msglen, 4 ); in md5_finish() 280 md5_update( ctx, msglen, 8 ); in md5_finish()
|
H A D | sha1.c | 301 unsigned char msglen[8]; in sha1_finish() local 307 PUT_ULONG_BE( high, msglen, 0 ); in sha1_finish() 308 PUT_ULONG_BE( low, msglen, 4 ); in sha1_finish() 314 sha1_update( ctx, msglen, 8 ); in sha1_finish()
|
/reactos/dll/3rdparty/mbedtls/ |
H A D | md4.c | 360 unsigned char msglen[8]; in mbedtls_md4_finish_ret() local 366 PUT_UINT32_LE( low, msglen, 0 ); in mbedtls_md4_finish_ret() 367 PUT_UINT32_LE( high, msglen, 4 ); in mbedtls_md4_finish_ret() 376 if( ( ret = mbedtls_md4_update_ret( ctx, msglen, 8 ) ) != 0 ) in mbedtls_md4_finish_ret()
|
H A D | ripemd160.c | 427 unsigned char msglen[8]; in mbedtls_ripemd160_finish_ret() local 433 PUT_UINT32_LE( low, msglen, 0 ); in mbedtls_ripemd160_finish_ret() 434 PUT_UINT32_LE( high, msglen, 4 ); in mbedtls_ripemd160_finish_ret() 443 ret = mbedtls_ripemd160_update_ret( ctx, msglen, 8 ); in mbedtls_ripemd160_finish_ret()
|
/reactos/modules/rostests/apitests/mspatcha/ |
H A D | mspatcha.c | 319 unsigned int crc32(unsigned int seed, unsigned char* msg, unsigned int msglen) in crc32() argument 324 for (i = 0; i < msglen; i++) in crc32()
|
/reactos/drivers/network/tcpip/lwip/src/include/netif/ppp/ |
H A D | ppp_impl.h | 564 …auser, unsigned int userlen, char *apasswd, unsigned int passwdlen, const char **msg, int *msglen);
|