/external/tcpdump/ |
H A D | print-mobility.c | 175 int mhlen, hlen, type; local 207 hlen = IP6M_MINLEN; 213 hlen = IP6M_MINLEN; 215 TCHECK2(*mh, hlen + 8); 218 EXTRACT_32BITS(&bp[hlen]), 219 EXTRACT_32BITS(&bp[hlen + 4])); 221 hlen += 8; 229 hlen = IP6M_MINLEN; 231 TCHECK2(*mh, hlen + 8); 234 EXTRACT_32BITS(&bp[hlen]), [all...] |
H A D | print-sl.c | 117 u_int hlen; local 145 hlen = IP_HL(ip); 146 hlen += TH_OFF((struct tcphdr *)&((int *)ip)[hlen]); 147 lastlen[dir][lastconn] = length - (hlen << 2); 195 register u_int flags, hlen; local 231 * 'hlen' is the length of the uncompressed TCP/IP header (in words). 233 * 'length - hlen' is the amount of data in the packet. 235 hlen = IP_HL(ip); 236 hlen [all...] |
H A D | print-tcp.c | 197 register u_int hlen; local 225 hlen = TH_OFF(tp) * 4; 233 if (!qflag && hlen >= sizeof(*tp) && hlen <= length) { 236 nfsreq_print((u_char *)tp + hlen + 4, length - hlen, 242 nfsreply_print((u_char *)tp + hlen + 4, length - hlen, 274 if (hlen < sizeof(*tp)) { 276 length - hlen, hle [all...] |
H A D | print-ip.c | 562 u_int hlen; local 583 hlen = IP_HL(ipds->ip) * 4; 584 if (hlen < sizeof (struct ip)) { 585 (void)printf("bad-hlen %u", hlen); 593 if (ipds->len < hlen) { 616 ipds->len -= hlen; 654 if ((hlen - sizeof(struct ip)) > 0) { 656 ip_optprint((u_char *)(ipds->ip + 1), hlen - sizeof(struct ip)); 660 if ((u_char *)ipds->ip + hlen < [all...] |
H A D | print-icmp.c | 347 u_int hlen, dport, mtu, obj_tlen, obj_class_num, obj_ctype; local 383 hlen = IP_HL(oip) * 4; 384 ouh = (struct udphdr *)(((u_char *)oip) + hlen); 619 hlen = plen - ICMP_EXTD_MINLEN; 624 hlen); 626 hlen -= 4; /* subtract common header size */ 629 while (hlen > sizeof(struct icmp_mpls_ext_object_header_t)) { 644 hlen-=sizeof(struct icmp_mpls_ext_object_header_t); /* length field includes tlv header */ 678 if (hlen < obj_tlen) 680 hlen [all...] |
H A D | print-dccp.c | 225 u_int hlen; local 251 hlen = dh->dccph_doff * 4; 268 (void)printf(" %d", len - hlen); 269 if (hlen > len) { 271 hlen, len); 382 if (hlen > dccp_basic_hdr_len(dh) + extlen){ 388 hlen -= dccp_basic_hdr_len(dh) + extlen; 393 if (hlen <= optlen) break; 394 hlen -= optlen;
|
/external/qemu/ |
H A D | net-checksum.c | 58 int hlen, plen, proto, csum_offset; local 63 hlen = (data[14] & 0x0f) * 4; 64 plen = (data[16] << 8 | data[17]) - hlen; 81 data[14+hlen+csum_offset] = 0; 82 data[14+hlen+csum_offset+1] = 0; 83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen); 84 data[14+hlen+csum_offset] = csum >> 8; 85 data[14+hlen+csum_offset+1] = csum & 0xff;
|
/external/libppp/src/ |
H A D | tcpmss.c | 101 size_t hlen, olen, optlen; local 106 hlen = tc->th_off << 2; 109 if (hlen <= sizeof(struct tcphdr) || hlen > pktlen) 116 for (olen = hlen - sizeof(struct tcphdr), opt = (u_char *)(tc + 1); 147 size_t hlen, plen; local 155 hlen = pip->ip_hl << 2; 162 ntohs(pip->ip_len) == plen && hlen <= plen && 163 plen >= sizeof(struct tcphdr) + hlen) 164 MSSFixup((struct tcphdr *)(MBUF_CTOP(bp) + hlen), ple [all...] |
H A D | slcompress.c | 164 register u_int hlen = ip->ip_hl; local 183 th = (struct tcphdr *) & ((int *) ip)[hlen]; 235 hlen += th->th_off; 236 hlen <<= 2; 237 if (hlen > m->m_len) 265 oth = (struct tcphdr *) & ((int *) &cs->cs_ip)[hlen]; 266 deltaS = hlen; 267 hlen += th->th_off; 268 hlen <<= 2; 269 if (hlen > 434 register u_int hlen, changes; local [all...] |
/external/qemu/slirp/ |
H A D | ip_icmp.c | 71 icmp_input(struct mbuf *m, int hlen) argument 95 m->m_len -= hlen; 96 m->m_data += hlen; 102 m->m_len += hlen; 103 m->m_data -= hlen; 112 ip->ip_len += hlen; /* since ip_input subtracts this */ 207 unsigned hlen, shlen, s_ip_len; local 252 hlen= sizeof(struct ip ); /* no options in reply */ 255 m->m_data += hlen; 256 m->m_len -= hlen; 323 int hlen = ip->ip_hl << 2; local [all...] |
H A D | ip_output.c | 60 register int hlen = sizeof(struct ip ); local 70 * hlen = len; 80 ip->ip_hl = hlen >> 2; 101 ip->ip_sum = cksum(m, hlen); 117 len = (IF_MTU - hlen) &~ 7; /* ip databytes per packet */ 133 for (off = hlen + len; off < (u_int16_t)ip->ip_len; off += len) { 146 /* if (hlen > sizeof (struct ip)) { 152 mhip->ip_off = ((off - hlen) >> 3) + (ip->ip_off & ~IP_MF); 178 m_adj(m, hlen + firstlen - (u_int16_t)ip->ip_len); 182 ip->ip_sum = cksum(m, hlen); [all...] |
H A D | ip_input.c | 79 int hlen; local 99 hlen = ip->ip_hl << 2; 100 if (hlen<sizeof(struct ip ) || hlen>m->m_len) {/* min header length */ 106 * ip->ip_sum = cksum(m, hlen); 109 if(cksum(m,hlen)) { 118 if (ip->ip_len < hlen) { 173 /* if (hlen > sizeof (struct ip) && ip_dooptions(m)) 208 ip->ip_len -= hlen; 233 ip->ip_len -= hlen; 272 int hlen = ip->ip_hl << 2; local [all...] |
/external/qemu/slirp-android/ |
H A D | ip_icmp.c | 72 icmp_input(struct mbuf *m, int hlen) argument 96 m->m_len -= hlen; 97 m->m_data += hlen; 103 m->m_len += hlen; 104 m->m_data -= hlen; 113 ip->ip_len += hlen; /* since ip_input subtracts this */ 209 unsigned hlen, shlen, s_ip_len; local 254 hlen= sizeof(struct ip ); /* no options in reply */ 257 m->m_data += hlen; 258 m->m_len -= hlen; 325 int hlen = ip->ip_hl << 2; local [all...] |
H A D | ip_output.c | 60 register int hlen = sizeof(struct ip ); local 70 * hlen = len; 80 ip->ip_hl = hlen >> 2; 101 ip->ip_sum = cksum(m, hlen); 117 len = (IF_MTU - hlen) &~ 7; /* ip databytes per packet */ 133 for (off = hlen + len; off < (u_int16_t)ip->ip_len; off += len) { 146 /* if (hlen > sizeof (struct ip)) { 152 mhip->ip_off = ((off - hlen) >> 3) + (ip->ip_off & ~IP_MF); 178 m_adj(m, hlen + firstlen - (u_int16_t)ip->ip_len); 182 ip->ip_sum = cksum(m, hlen); [all...] |
H A D | ip_input.c | 79 int hlen; local 99 hlen = ip->ip_hl << 2; 100 if (hlen<sizeof(struct ip ) || hlen>m->m_len) {/* min header length */ 106 * ip->ip_sum = cksum(m, hlen); 109 if(cksum(m,hlen)) { 118 if (ip->ip_len < hlen) { 173 /* if (hlen > sizeof (struct ip) && ip_dooptions(m)) 208 ip->ip_len -= hlen; 233 ip->ip_len -= hlen; 272 int hlen = ip->ip_hl << 2; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_write.c | 433 size_t rlen, hlen, clen; local 476 hlen = SHA256_MAC_LEN; 478 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 501 os_memmove(hash + 19, hash, hlen); 502 hlen += 19; 509 hlen = MD5_MAC_LEN; 511 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) 525 hlen = SHA1_MAC_LEN; 527 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 536 hlen 644 size_t rlen, hlen; local [all...] |
H A D | tlsv1_server_read.c | 772 size_t hlen, buflen; local 871 hlen = SHA256_MAC_LEN; 873 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 885 hlen = MD5_MAC_LEN; 887 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) 901 hlen = SHA1_MAC_LEN; 903 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 912 hlen += MD5_MAC_LEN; 918 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 992 if (buflen != hlen || os_memcm 1066 size_t left, len, hlen; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_write.c | 433 size_t rlen, hlen, clen; local 476 hlen = SHA256_MAC_LEN; 478 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 501 os_memmove(hash + 19, hash, hlen); 502 hlen += 19; 509 hlen = MD5_MAC_LEN; 511 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) 525 hlen = SHA1_MAC_LEN; 527 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 536 hlen 644 size_t rlen, hlen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 433 size_t rlen, hlen, clen; local 476 hlen = SHA256_MAC_LEN; 478 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 501 os_memmove(hash + 19, hash, hlen); 502 hlen += 19; 509 hlen = MD5_MAC_LEN; 511 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) 525 hlen = SHA1_MAC_LEN; 527 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 536 hlen 644 size_t rlen, hlen; local [all...] |
/external/openssh/ |
H A D | ssh-rsa.c | 213 u_int ret, rsasize, oidlen = 0, hlen = 0; local 223 hlen = 20; 228 hlen = 16; 233 if (hashlen != hlen) { 249 if (len < 0 || (u_int)len != hlen + oidlen) { 250 error("bad decrypted len: %d != %d + %d", len, hlen, oidlen); 254 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 439 size_t rlen, hlen, clen; local 481 hlen = MD5_MAC_LEN; 483 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) 497 hlen = SHA1_MAC_LEN; 499 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 508 hlen += MD5_MAC_LEN; 510 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 527 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 595 size_t rlen, hlen; local 605 hlen [all...] |
H A D | tlsv1_record.c | 249 size_t i, rlen, hlen; local 383 hlen = sizeof(hash); 384 if (crypto_hash_finish(hmac, hash, &hlen) < 0) { 389 if (hlen != rl->hash_size || 390 os_memcmp(hash, out_data + *out_len, hlen) != 0) {
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | iapp.c | 317 int len, hlen; local 346 hlen = be_to_host16(hdr->length); 351 be_to_host16(hdr->identifier), hlen); 357 if (hlen > len) { 358 printf("Underflow IAPP frame (hlen=%d len=%d)\n", hlen, len); 361 if (hlen < len) { 363 len - hlen); 364 len = hlen; 369 iapp_process_add_notify(iapp, &from, hdr, hlen [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | iapp.c | 317 int len, hlen; local 346 hlen = be_to_host16(hdr->length); 351 be_to_host16(hdr->identifier), hlen); 357 if (hlen > len) { 358 printf("Underflow IAPP frame (hlen=%d len=%d)\n", hlen, len); 361 if (hlen < len) { 363 len - hlen); 364 len = hlen; 369 iapp_process_add_notify(iapp, &from, hdr, hlen [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | iapp.c | 317 int len, hlen; local 346 hlen = be_to_host16(hdr->length); 351 be_to_host16(hdr->identifier), hlen); 357 if (hlen > len) { 358 printf("Underflow IAPP frame (hlen=%d len=%d)\n", hlen, len); 361 if (hlen < len) { 363 len - hlen); 364 len = hlen; 369 iapp_process_add_notify(iapp, &from, hdr, hlen [all...] |