HomeSort by relevance Sort by last modified time
    Searched refs:hlen (Results 1 - 25 of 59) sorted by null

1 2 3

  /external/tcpdump/
print-mobility.c 192 unsigned mhlen, hlen; local
229 hlen = IP6M_MINLEN;
235 hlen = IP6M_MINLEN;
237 ND_TCHECK2(*mh, hlen + 8);
240 EXTRACT_32BITS(&bp[hlen]),
241 EXTRACT_32BITS(&bp[hlen + 4])));
243 hlen += 8;
251 hlen = IP6M_MINLEN;
253 ND_TCHECK2(*mh, hlen + 8);
256 EXTRACT_32BITS(&bp[hlen]),
    [all...]
print-sl.c 124 u_int hlen; local
151 hlen = IP_HL(ip);
152 hlen += TH_OFF((struct tcphdr *)&((int *)ip)[hlen]);
153 lastlen[dir][lastconn] = length - (hlen << 2);
204 register u_int flags, hlen; local
240 * 'hlen' is the length of the uncompressed TCP/IP header (in words).
242 * 'length - hlen' is the amount of data in the packet.
244 hlen = IP_HL(ip);
245 hlen += TH_OFF((struct tcphdr *)&((int32_t *)ip)[hlen])
    [all...]
print-dccp.c 280 u_int hlen; local
317 hlen = dh->dccph_doff * 4;
335 ND_PRINT((ndo, " %d", len - hlen));
336 if (hlen > len) {
338 hlen, len));
500 if (hlen > fixed_hdrlen){
506 hlen -= fixed_hdrlen;
508 optlen = dccp_print_option(ndo, cp, hlen);
511 if (hlen <= optlen)
513 hlen -= optlen
    [all...]
print-tcp.c 160 register u_int hlen; local
190 hlen = TH_OFF(tp) * 4;
219 if (hlen < sizeof(*tp)) {
221 length - hlen, hlen, (unsigned long)sizeof(*tp)));
233 ND_PRINT((ndo, "tcp %d", length - hlen));
234 if (hlen > length) {
236 hlen, length));
367 if (hlen > length) {
369 hlen, length))
    [all...]
print-icmp.c 343 u_int hlen, dport, mtu, obj_tlen, obj_class_num, obj_ctype; local
380 hlen = IP_HL(oip) * 4;
381 ouh = (struct udphdr *)(((u_char *)oip) + hlen);
621 hlen = plen - ICMP_EXTD_MINLEN;
623 vec[0].len = hlen;
627 hlen));
629 hlen -= 4; /* subtract common header size */
632 while (hlen > sizeof(struct icmp_mpls_ext_object_header_t)) {
647 hlen-=sizeof(struct icmp_mpls_ext_object_header_t); /* length field includes tlv header */
681 if (hlen < obj_tlen
    [all...]
print-ip.c 524 u_int hlen; local
545 hlen = IP_HL(ipds->ip) * 4;
546 if (hlen < sizeof (struct ip)) {
547 ND_PRINT((ndo, "bad-hlen %u", hlen));
555 if (ipds->len < hlen) {
578 ipds->len -= hlen;
616 if ((hlen - sizeof(struct ip)) > 0) {
618 ip_optprint(ndo, (u_char *)(ipds->ip + 1), hlen - sizeof(struct ip));
622 if (!ndo->ndo_Kflag && (u_char *)ipds->ip + hlen <= ndo->ndo_snapend)
    [all...]
  /external/toybox/toys/pending/
watch.c 29 int i = 0, hlen; local
42 hlen = strlen(header);
50 if (width > (hlen + len)) xprintf("%s", header);
52 xprintf("%*s\n",width + ((width > (hlen + len))?-hlen:0) + 1, ctime(&t));
  /external/libmicrohttpd/src/microhttpd/
basicauth.c 121 size_t hlen = strlen(realm) + strlen("Basic realm=\"\"") + 1; local
124 header = (char*)malloc(hlen);
134 hlen,
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
bcmip.h 181 uint16 len = 0, hlen; local
188 hlen = 8;
190 hlen = (eh->hdrlen + 2) << 2;
192 hlen = IPV6_EXTHDR_LEN(eh);
194 len += hlen;
  /external/wpa_supplicant_8/src/tls/
tlsv1_common.c 344 size_t hlen; local
351 hlen = SHA256_MAC_LEN;
355 hlen = 48;
359 hlen = 64;
370 if (crypto_hash_finish(ctx, hash, &hlen) < 0)
373 return hlen;
384 size_t hlen; local
395 hlen = MD5_MAC_LEN;
396 if (crypto_hash_finish(ctx, hash, &hlen) < 0)
398 hpos += hlen;
    [all...]
tlsv1_client_write.c 577 size_t rlen, hlen, clen; local
619 hlen = SHA256_MAC_LEN;
621 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
644 os_memmove(hash + 19, hash, hlen);
645 hlen += 19;
651 hlen = MD5_MAC_LEN;
653 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) {
664 hlen = SHA1_MAC_LEN;
666 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) {
674 hlen += MD5_MAC_LEN
782 size_t rlen, hlen; local
    [all...]
tlsv1_server_read.c 862 size_t hlen; local
958 hlen = SHA256_MAC_LEN;
960 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) <
971 hlen = MD5_MAC_LEN;
973 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) {
984 hlen = SHA1_MAC_LEN;
986 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) {
994 hlen += MD5_MAC_LEN;
1000 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
1003 hash, hlen, pos, end - pos, &alert) < 0)
1071 size_t left, len, hlen; local
    [all...]
tlsv1_server_write.c 564 int hlen; local
568 hlen = tlsv12_key_x_server_params_hash(
584 if (hlen < 0 || end - pos < 2) {
606 hlen += 19;
617 hlen = tls_key_x_server_params_hash(
623 if (hlen < 0) {
630 hash, hlen);
634 hash[hlen - 1] ^= 0x80;
654 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen,
832 size_t rlen, hlen; local
    [all...]
tlsv1_record.c 282 size_t i, rlen, hlen; local
451 hlen = sizeof(hash);
452 if (crypto_hash_finish(hmac, hash, &hlen) < 0) {
458 if (hlen != rl->hash_size ||
459 os_memcmp_const(hash, out_data + plen, hlen) != 0 ||
tlsv1_client_read.c 731 int hlen; local
756 hlen = tlsv12_key_x_server_params_hash(
766 hlen = tls_key_x_server_params_hash(
772 if (hlen < 0)
775 hash, hlen);
779 hash, hlen, pos, end - pos,
1318 size_t left, len, hlen; local
    [all...]
  /external/curl/lib/
content_encoding.c 335 ssize_t hlen;
337 switch (check_gzip_header((unsigned char *)k->str, nread, &hlen)) {
339 z->next_in = (Bytef *)k->str + hlen;
340 z->avail_in = (uInt)(nread - hlen);
373 ssize_t hlen;
385 switch (check_gzip_header(z->next_in, z->avail_in, &hlen)) {
390 z->next_in = (Bytef *)k->str + hlen + nread - z->avail_in;
391 z->avail_in = (uInt)(z->avail_in - hlen);
  /external/iptables/extensions/
libip6t_DNPT.c 41 npt->src_pfx_len = cb->val.hlen;
45 npt->dst_pfx_len = cb->val.hlen;
libip6t_SNPT.c 41 npt->src_pfx_len = cb->val.hlen;
45 npt->dst_pfx_len = cb->val.hlen;
  /external/wpa_supplicant_8/src/ap/
iapp.c 306 int len, hlen; local
336 hlen = be_to_host16(hdr->length);
341 be_to_host16(hdr->identifier), hlen);
347 if (hlen > len) {
348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)",
349 hlen, len);
352 if (hlen < len) {
354 len - hlen);
355 len = hlen;
  /system/core/libnetutils/
dhcpclient.c 271 ALOGD("op = %s (%d), htype = %d, hlen = %d, hops = %d",
272 name, msg->op, msg->htype, msg->hlen, msg->hops);
280 c = msg->hlen > 16 ? 16 : msg->hlen;
372 if (reply->hlen != msg->hlen) {
373 if (verbose) ALOGD("Wrong Hlen %d != %d\n", reply->hlen, msg->hlen);
376 if (memcmp(msg->chaddr, reply->chaddr, msg->hlen)) {
    [all...]
dhcpmsg.h 39 uint8_t hlen; /* hw addr len */ member in struct:dhcp_msg
dhcpmsg.c 32 msg->hlen = 6;
  /external/iputils/
ping.c 99 static void pr_options(unsigned char * cp, int hlen);
789 int hlen; local
799 hlen = ip->ihl*4;
800 if (cc < hlen + 8 || ip->ihl < 5) {
808 optlen = hlen - sizeof(struct iphdr);
810 hlen = 0;
829 cc -= hlen;
830 icp = (struct icmphdr *)(buf + hlen);
1133 void pr_options(unsigned char * cp, int hlen)
1141 totlen = hlen-sizeof(struct iphdr)
1288 int hlen; local
    [all...]
  /external/dnsmasq/contrib/wrt/
dhcp_lease_time.c 62 u8 op, htype, hlen, hops; member in struct:dhcp_packet
159 packet.hlen = 0;
  /external/iptables/libxtables/
xtoptions.c 512 * @cb->val.hlen are set for completeness to the appropriate values.
527 cb->val.hlen = (afinfo->family == NFPROTO_IPV4) ? 32 : 128;
686 cb->val.hlen = xtables_ipmask_to_cidr(&cb->val.hmask.in);
689 cb->val.hlen = xtables_ip6mask_to_cidr(&cb->val.hmask.in6);
699 * limits. The result is stored in @cb->val.hlen.
706 cb->val.hlen = (afinfo->family == NFPROTO_IPV4) ? 32 : 128;
707 if (!xtables_strtoui(cb->arg, NULL, &prefix_len, 0, cb->val.hlen)) {
716 cb->ext_name, entry->name, 0, cb->val.hlen);
718 cb->val.hlen = prefix_len;
723 * a bitmask, and make it available through @cb->val.hmask (hlen remain
    [all...]

Completed in 622 milliseconds

1 2 3