/external/tcpdump/ |
print-ospf.c | 198 u_int tlv_type, tlv_length; local 208 tlv_length = EXTRACT_16BITS(tptr+2); 215 tlv_length); 217 if (tlv_length > ls_length) { 218 printf("\n\t Bogus length %u > %u", tlv_length, 224 if (tlv_type == 0 || tlv_length ==0) { 228 TCHECK2(*tptr, tlv_length); 232 if (tlv_length != 4) { 233 printf("\n\t Bogus length %u != 4", tlv_length); 240 if (tlv_length != 1) 280 u_int tlv_type, tlv_length, subtlv_type, subtlv_length; local 567 register int j, tlv_type, tlv_length, topology; local [all...] |
print-nflog.c | 106 size = tlv->tlv_length;
|
/external/libpcap/pcap/ |
nflog.h | 49 u_int16_t tlv_length; /* tlv length */ member in struct:nflog_tlv
|
/external/libpcap/ |
pcap-common.c | [all...] |
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_asconf.c | 106 uint16_t tlv_length) 114 tlv_length + 128 error->length = tlv_length + sizeof(struct sctp_error_cause); 134 "asconf_error_response: tlv_length (%xh) too big\n", 135 tlv_length); 141 memcpy(tlv, error_tlv, tlv_length); [all...] |
/external/libnfc-nci/src/nfc/int/ |
rw_int.h | 543 UINT16 tlv_length; \/* currently detected length *\/ member in struct:__anon28996 [all...] |