/external/tcpdump/ |
print-mobility.c | 192 unsigned mhlen, hlen; local 229 hlen = IP6M_MINLEN; 235 hlen = IP6M_MINLEN; 237 ND_TCHECK2(*mh, hlen + 8); 240 EXTRACT_32BITS(&bp[hlen]), 241 EXTRACT_32BITS(&bp[hlen + 4]))); 243 hlen += 8; 251 hlen = IP6M_MINLEN; 253 ND_TCHECK2(*mh, hlen + 8); 256 EXTRACT_32BITS(&bp[hlen]), [all...] |
print-sl.c | 124 u_int hlen; local 151 hlen = IP_HL(ip); 152 hlen += TH_OFF((struct tcphdr *)&((int *)ip)[hlen]); 153 lastlen[dir][lastconn] = length - (hlen << 2); 204 register u_int flags, hlen; local 240 * 'hlen' is the length of the uncompressed TCP/IP header (in words). 242 * 'length - hlen' is the amount of data in the packet. 244 hlen = IP_HL(ip); 245 hlen += TH_OFF((struct tcphdr *)&((int32_t *)ip)[hlen]) [all...] |
print-dccp.c | 280 u_int hlen; local 317 hlen = dh->dccph_doff * 4; 335 ND_PRINT((ndo, " %d", len - hlen)); 336 if (hlen > len) { 338 hlen, len)); 500 if (hlen > fixed_hdrlen){ 506 hlen -= fixed_hdrlen; 508 optlen = dccp_print_option(ndo, cp, hlen); 511 if (hlen <= optlen) 513 hlen -= optlen [all...] |
print-tcp.c | 160 register u_int hlen; local 190 hlen = TH_OFF(tp) * 4; 219 if (hlen < sizeof(*tp)) { 221 length - hlen, hlen, (unsigned long)sizeof(*tp))); 233 ND_PRINT((ndo, "tcp %d", length - hlen)); 234 if (hlen > length) { 236 hlen, length)); 367 if (hlen > length) { 369 hlen, length)) [all...] |
print-icmp.c | 343 u_int hlen, dport, mtu, obj_tlen, obj_class_num, obj_ctype; local 380 hlen = IP_HL(oip) * 4; 381 ouh = (struct udphdr *)(((u_char *)oip) + hlen); 621 hlen = plen - ICMP_EXTD_MINLEN; 623 vec[0].len = hlen; 627 hlen)); 629 hlen -= 4; /* subtract common header size */ 632 while (hlen > sizeof(struct icmp_mpls_ext_object_header_t)) { 647 hlen-=sizeof(struct icmp_mpls_ext_object_header_t); /* length field includes tlv header */ 681 if (hlen < obj_tlen [all...] |
print-ip.c | 524 u_int hlen; local 545 hlen = IP_HL(ipds->ip) * 4; 546 if (hlen < sizeof (struct ip)) { 547 ND_PRINT((ndo, "bad-hlen %u", hlen)); 555 if (ipds->len < hlen) { 578 ipds->len -= hlen; 616 if ((hlen - sizeof(struct ip)) > 0) { 618 ip_optprint(ndo, (u_char *)(ipds->ip + 1), hlen - sizeof(struct ip)); 622 if (!ndo->ndo_Kflag && (u_char *)ipds->ip + hlen <= ndo->ndo_snapend) [all...] |
/external/toybox/toys/pending/ |
watch.c | 29 int i = 0, hlen; local 42 hlen = strlen(header); 50 if (width > (hlen + len)) xprintf("%s", header); 52 xprintf("%*s\n",width + ((width > (hlen + len))?-hlen:0) + 1, ctime(&t));
|
/external/libmicrohttpd/src/microhttpd/ |
basicauth.c | 121 size_t hlen = strlen(realm) + strlen("Basic realm=\"\"") + 1; local 124 header = (char*)malloc(hlen); 134 hlen,
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
bcmip.h | 181 uint16 len = 0, hlen; local 188 hlen = 8; 190 hlen = (eh->hdrlen + 2) << 2; 192 hlen = IPV6_EXTHDR_LEN(eh); 194 len += hlen;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 344 size_t hlen; local 351 hlen = SHA256_MAC_LEN; 355 hlen = 48; 359 hlen = 64; 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 373 return hlen; 384 size_t hlen; local 395 hlen = MD5_MAC_LEN; 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 398 hpos += hlen; [all...] |
tlsv1_client_write.c | 577 size_t rlen, hlen, clen; local 619 hlen = SHA256_MAC_LEN; 621 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 644 os_memmove(hash + 19, hash, hlen); 645 hlen += 19; 651 hlen = MD5_MAC_LEN; 653 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 664 hlen = SHA1_MAC_LEN; 666 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 674 hlen += MD5_MAC_LEN 782 size_t rlen, hlen; local [all...] |
tlsv1_server_read.c | 862 size_t hlen; local 958 hlen = SHA256_MAC_LEN; 960 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 971 hlen = MD5_MAC_LEN; 973 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 984 hlen = SHA1_MAC_LEN; 986 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 994 hlen += MD5_MAC_LEN; 1000 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 1003 hash, hlen, pos, end - pos, &alert) < 0) 1071 size_t left, len, hlen; local [all...] |
tlsv1_server_write.c | 564 int hlen; local 568 hlen = tlsv12_key_x_server_params_hash( 584 if (hlen < 0 || end - pos < 2) { 606 hlen += 19; 617 hlen = tls_key_x_server_params_hash( 623 if (hlen < 0) { 630 hash, hlen); 634 hash[hlen - 1] ^= 0x80; 654 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 832 size_t rlen, hlen; local [all...] |
tlsv1_record.c | 282 size_t i, rlen, hlen; local 451 hlen = sizeof(hash); 452 if (crypto_hash_finish(hmac, hash, &hlen) < 0) { 458 if (hlen != rl->hash_size || 459 os_memcmp_const(hash, out_data + plen, hlen) != 0 ||
|
tlsv1_client_read.c | 731 int hlen; local 756 hlen = tlsv12_key_x_server_params_hash( 766 hlen = tls_key_x_server_params_hash( 772 if (hlen < 0) 775 hash, hlen); 779 hash, hlen, pos, end - pos, 1318 size_t left, len, hlen; local [all...] |
/external/curl/lib/ |
content_encoding.c | 335 ssize_t hlen; 337 switch (check_gzip_header((unsigned char *)k->str, nread, &hlen)) { 339 z->next_in = (Bytef *)k->str + hlen; 340 z->avail_in = (uInt)(nread - hlen); 373 ssize_t hlen; 385 switch (check_gzip_header(z->next_in, z->avail_in, &hlen)) { 390 z->next_in = (Bytef *)k->str + hlen + nread - z->avail_in; 391 z->avail_in = (uInt)(z->avail_in - hlen);
|
/external/iptables/extensions/ |
libip6t_DNPT.c | 41 npt->src_pfx_len = cb->val.hlen; 45 npt->dst_pfx_len = cb->val.hlen;
|
libip6t_SNPT.c | 41 npt->src_pfx_len = cb->val.hlen; 45 npt->dst_pfx_len = cb->val.hlen;
|
/external/wpa_supplicant_8/src/ap/ |
iapp.c | 306 int len, hlen; local 336 hlen = be_to_host16(hdr->length); 341 be_to_host16(hdr->identifier), hlen); 347 if (hlen > len) { 348 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", 349 hlen, len); 352 if (hlen < len) { 354 len - hlen); 355 len = hlen;
|
/system/core/libnetutils/ |
dhcpclient.c | 271 ALOGD("op = %s (%d), htype = %d, hlen = %d, hops = %d", 272 name, msg->op, msg->htype, msg->hlen, msg->hops); 280 c = msg->hlen > 16 ? 16 : msg->hlen; 372 if (reply->hlen != msg->hlen) { 373 if (verbose) ALOGD("Wrong Hlen %d != %d\n", reply->hlen, msg->hlen); 376 if (memcmp(msg->chaddr, reply->chaddr, msg->hlen)) { [all...] |
dhcpmsg.h | 39 uint8_t hlen; /* hw addr len */ member in struct:dhcp_msg
|
dhcpmsg.c | 32 msg->hlen = 6;
|
/external/iputils/ |
ping.c | 99 static void pr_options(unsigned char * cp, int hlen); 789 int hlen; local 799 hlen = ip->ihl*4; 800 if (cc < hlen + 8 || ip->ihl < 5) { 808 optlen = hlen - sizeof(struct iphdr); 810 hlen = 0; 829 cc -= hlen; 830 icp = (struct icmphdr *)(buf + hlen); 1133 void pr_options(unsigned char * cp, int hlen) 1141 totlen = hlen-sizeof(struct iphdr) 1288 int hlen; local [all...] |
/external/dnsmasq/contrib/wrt/ |
dhcp_lease_time.c | 62 u8 op, htype, hlen, hops; member in struct:dhcp_packet 159 packet.hlen = 0;
|
/external/iptables/libxtables/ |
xtoptions.c | 512 * @cb->val.hlen are set for completeness to the appropriate values. 527 cb->val.hlen = (afinfo->family == NFPROTO_IPV4) ? 32 : 128; 686 cb->val.hlen = xtables_ipmask_to_cidr(&cb->val.hmask.in); 689 cb->val.hlen = xtables_ip6mask_to_cidr(&cb->val.hmask.in6); 699 * limits. The result is stored in @cb->val.hlen. 706 cb->val.hlen = (afinfo->family == NFPROTO_IPV4) ? 32 : 128; 707 if (!xtables_strtoui(cb->arg, NULL, &prefix_len, 0, cb->val.hlen)) { 716 cb->ext_name, entry->name, 0, cb->val.hlen); 718 cb->val.hlen = prefix_len; 723 * a bitmask, and make it available through @cb->val.hmask (hlen remain [all...] |