Searched refs:payloadlen (Results 1 – 7 of 7) sorted by relevance
/freebsd/contrib/tcpdump/ |
H A D | print-esp.c | 746 u_int payloadlen; in esp_print() local 859 payloadlen = ep - ct; in esp_print() 876 pt = do_decrypt(ndo, __func__, sa, iv, ct, payloadlen); in esp_print() 884 if (!nd_push_buffer(ndo, pt, pt, payloadlen)) { in esp_print() 899 padlen = GET_U_1(pt + payloadlen - 2); in esp_print() 900 if (padlen + 2 > payloadlen) { in esp_print() 906 nh = GET_U_1(pt + payloadlen - 1); in esp_print() 914 if (!nd_push_snaplen(ndo, pt, payloadlen - (padlen + 2))) { in esp_print() 920 ip_demux_print(ndo, pt, payloadlen - (padlen + 2), ver, fragmented, in esp_print()
|
/freebsd/tests/sys/netpfil/pf/ |
H A D | CVE-2019-5597.py | 51 pkt1_opts = sp.AH(nh=AH_PROTO, payloadlen=200) \ 53 / sp.AH(nh=FRAG_PROTO, payloadlen=1) \
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 290 const u8 *payload, size_t payloadlen) in eap_sake_process_identity() argument 304 const u8 *payload, size_t payloadlen) in eap_sake_process_challenge() argument 314 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) in eap_sake_process_challenge() 375 const u8 *payload, size_t payloadlen) in eap_sake_process_confirm() argument 385 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) in eap_sake_process_confirm() 413 const u8 *payload, size_t payloadlen) in eap_sake_process_auth_reject() argument
|
H A D | eap_server_eke.c | 423 const u8 *payload, size_t payloadlen) in eap_eke_process_identity() argument 436 end = payload + payloadlen; in eap_eke_process_identity() 518 const u8 *payload, size_t payloadlen) in eap_eke_process_commit() argument 531 end = payload + payloadlen; in eap_eke_process_commit() 591 const u8 *payload, size_t payloadlen) in eap_eke_process_confirm() argument 606 if (payloadlen < (size_t) data->sess.pnonce_len + data->sess.prf_len) { in eap_eke_process_confirm() 666 const u8 *payload, size_t payloadlen) in eap_eke_process_failure() argument 672 if (payloadlen < 4) { in eap_eke_process_failure()
|
H A D | eap_server_gpsk.c | 241 const u8 *payload, size_t payloadlen) in eap_gpsk_process_gpsk_2() argument 255 end = payload + payloadlen; in eap_gpsk_process_gpsk_2() 474 const u8 *payload, size_t payloadlen) in eap_gpsk_process_gpsk_4() argument 487 end = payload + payloadlen; in eap_gpsk_process_gpsk_4()
|
/freebsd/tests/sys/netinet/ |
H A D | ip_reass_test.c | 75 alloc_lopacket(in_addr_t dstaddr, size_t payloadlen) in alloc_lopacket() argument 81 pktlen = sizeof(*packet) + payloadlen; in alloc_lopacket() 92 ip->ip_len = htons(sizeof(*ip) + payloadlen); in alloc_lopacket()
|
/freebsd/sys/contrib/openzfs/module/zfs/ |
H A D | dmu_recv.c | 1296 uint32_t payloadlen = drc->drc_drr_begin->drr_payloadlen; in dmu_recv_begin() local 1304 if (payloadlen > (MIN((1U << 28), arc_all_memory() / 4))) in dmu_recv_begin() 1308 if (payloadlen != 0) { in dmu_recv_begin() 1309 void *payload = vmem_alloc(payloadlen, KM_SLEEP); in dmu_recv_begin() 1318 err = receive_read_payload_and_next_header(drc, payloadlen, in dmu_recv_begin() 1321 vmem_free(payload, payloadlen); in dmu_recv_begin() 1324 err = nvlist_unpack(payload, payloadlen, &drc->drc_begin_nvl, in dmu_recv_begin() 1326 vmem_free(payload, payloadlen); in dmu_recv_begin()
|