/external/tcpdump/ |
H A D | print-mobility.c | 175 int mhlen, hlen, type; local 207 hlen = IP6M_MINLEN; 213 hlen = IP6M_MINLEN; 215 TCHECK2(*mh, hlen + 8); 218 EXTRACT_32BITS(&bp[hlen]), 219 EXTRACT_32BITS(&bp[hlen + 4])); 221 hlen += 8; 229 hlen = IP6M_MINLEN; 231 TCHECK2(*mh, hlen + 8); 234 EXTRACT_32BITS(&bp[hlen]), [all...] |
H A D | print-sl.c | 117 u_int hlen; local 145 hlen = IP_HL(ip); 146 hlen += TH_OFF((struct tcphdr *)&((int *)ip)[hlen]); 147 lastlen[dir][lastconn] = length - (hlen << 2); 195 register u_int flags, hlen; local 231 * 'hlen' is the length of the uncompressed TCP/IP header (in words). 233 * 'length - hlen' is the amount of data in the packet. 235 hlen = IP_HL(ip); 236 hlen [all...] |
H A D | print-tcp.c | 158 register u_int hlen; local 188 hlen = TH_OFF(tp) * 4; 217 if (hlen < sizeof(*tp)) { 219 length - hlen, hlen, (unsigned long)sizeof(*tp)); 231 (void)printf("tcp %d", length - hlen); 232 if (hlen > length) { 234 hlen, length); 365 if (hlen > length) { 367 hlen, lengt [all...] |
H A D | print-dccp.c | 177 u_int hlen; local 203 hlen = dh->dccph_doff * 4; 220 (void)printf(" %d", len - hlen); 221 if (hlen > len) { 223 hlen, len); 323 if (hlen > dccp_basic_hdr_len(dh) + extlen){ 329 hlen -= dccp_basic_hdr_len(dh) + extlen; 334 if (hlen <= optlen) break; 335 hlen -= optlen;
|
H A D | print-icmp.c | 347 u_int hlen, dport, mtu, obj_tlen, obj_class_num, obj_ctype; local 384 hlen = IP_HL(oip) * 4; 385 ouh = (struct udphdr *)(((u_char *)oip) + hlen); 625 hlen = plen - ICMP_EXTD_MINLEN; 627 vec[0].len = hlen; 631 hlen); 633 hlen -= 4; /* subtract common header size */ 636 while (hlen > sizeof(struct icmp_mpls_ext_object_header_t)) { 651 hlen-=sizeof(struct icmp_mpls_ext_object_header_t); /* length field includes tlv header */ 685 if (hlen < obj_tle [all...] |
/external/toybox/toys/pending/ |
H A D | watch.c | 29 int i = 0, hlen; local 42 hlen = strlen(header); 50 if (width > (hlen + len)) xprintf("%s", header); 52 xprintf("%*s\n",width + ((width > (hlen + len))?-hlen:0) + 1, ctime(&t));
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_write.c | 433 size_t rlen, hlen, clen; local 475 hlen = SHA256_MAC_LEN; 477 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 500 os_memmove(hash + 19, hash, hlen); 501 hlen += 19; 507 hlen = MD5_MAC_LEN; 509 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 520 hlen = SHA1_MAC_LEN; 522 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 530 hlen 638 size_t rlen, hlen; local [all...] |
H A D | tlsv1_server_write.c | 441 int hlen; local 445 hlen = tlsv12_key_x_server_params_hash( 460 if (hlen < 0 || pos + 2 > end) { 482 hlen += 19; 493 hlen = tls_key_x_server_params_hash( 499 if (hlen < 0) { 506 hash, hlen); 510 hash[hlen - 1] ^= 0x80; 530 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 708 size_t rlen, hlen; local [all...] |
H A D | tlsv1_common.c | 344 size_t hlen; local 353 hlen = SHA256_MAC_LEN; 354 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 357 return hlen; 368 size_t hlen; local 379 hlen = MD5_MAC_LEN; 380 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 382 hpos += hlen; 390 hlen = hash + sizeof(hash) - hpos; 391 if (crypto_hash_finish(ctx, hpos, &hlen) < [all...] |
H A D | tlsv1_server_read.c | 776 size_t hlen; local 872 hlen = SHA256_MAC_LEN; 874 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 885 hlen = MD5_MAC_LEN; 887 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 898 hlen = SHA1_MAC_LEN; 900 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 908 hlen += MD5_MAC_LEN; 914 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 917 hash, hlen, po 985 size_t left, len, hlen; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_write.c | 433 size_t rlen, hlen, clen; local 475 hlen = SHA256_MAC_LEN; 477 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 500 os_memmove(hash + 19, hash, hlen); 501 hlen += 19; 507 hlen = MD5_MAC_LEN; 509 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 520 hlen = SHA1_MAC_LEN; 522 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 530 hlen 638 size_t rlen, hlen; local [all...] |
H A D | tlsv1_server_write.c | 441 int hlen; local 445 hlen = tlsv12_key_x_server_params_hash( 460 if (hlen < 0 || pos + 2 > end) { 482 hlen += 19; 493 hlen = tls_key_x_server_params_hash( 499 if (hlen < 0) { 506 hash, hlen); 510 hash[hlen - 1] ^= 0x80; 530 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 708 size_t rlen, hlen; local [all...] |
H A D | tlsv1_common.c | 344 size_t hlen; local 353 hlen = SHA256_MAC_LEN; 354 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 357 return hlen; 368 size_t hlen; local 379 hlen = MD5_MAC_LEN; 380 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 382 hpos += hlen; 390 hlen = hash + sizeof(hash) - hpos; 391 if (crypto_hash_finish(ctx, hpos, &hlen) < [all...] |
H A D | tlsv1_server_read.c | 776 size_t hlen; local 872 hlen = SHA256_MAC_LEN; 874 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 885 hlen = MD5_MAC_LEN; 887 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 898 hlen = SHA1_MAC_LEN; 900 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 908 hlen += MD5_MAC_LEN; 914 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 917 hash, hlen, po 985 size_t left, len, hlen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 433 size_t rlen, hlen, clen; local 475 hlen = SHA256_MAC_LEN; 477 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 500 os_memmove(hash + 19, hash, hlen); 501 hlen += 19; 507 hlen = MD5_MAC_LEN; 509 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 520 hlen = SHA1_MAC_LEN; 522 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 530 hlen 638 size_t rlen, hlen; local [all...] |
H A D | tlsv1_server_write.c | 441 int hlen; local 445 hlen = tlsv12_key_x_server_params_hash( 460 if (hlen < 0 || pos + 2 > end) { 482 hlen += 19; 493 hlen = tls_key_x_server_params_hash( 499 if (hlen < 0) { 506 hash, hlen); 510 hash[hlen - 1] ^= 0x80; 530 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 708 size_t rlen, hlen; local [all...] |
H A D | tlsv1_common.c | 344 size_t hlen; local 353 hlen = SHA256_MAC_LEN; 354 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 357 return hlen; 368 size_t hlen; local 379 hlen = MD5_MAC_LEN; 380 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 382 hpos += hlen; 390 hlen = hash + sizeof(hash) - hpos; 391 if (crypto_hash_finish(ctx, hpos, &hlen) < [all...] |
H A D | tlsv1_server_read.c | 776 size_t hlen; local 872 hlen = SHA256_MAC_LEN; 874 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 885 hlen = MD5_MAC_LEN; 887 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 898 hlen = SHA1_MAC_LEN; 900 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 908 hlen += MD5_MAC_LEN; 914 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 917 hash, hlen, po 985 size_t left, len, hlen; local [all...] |
/external/iptables/extensions/ |
H A D | libip6t_DNPT.c | 41 npt->src_pfx_len = cb->val.hlen; 45 npt->dst_pfx_len = cb->val.hlen;
|
H A D | libip6t_SNPT.c | 41 npt->src_pfx_len = cb->val.hlen; 45 npt->dst_pfx_len = cb->val.hlen;
|
/external/openssh/ |
H A D | ssh-rsa.c | 216 size_t ret, rsasize = 0, oidlen = 0, hlen = 0; local 226 hlen = 20; 231 if (hashlen != hlen) { 250 if (len < 0 || (size_t)len != hlen + oidlen) { 255 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
|
/external/boringssl/src/crypto/evp/ |
H A D | p_hmac.c | 161 unsigned int hlen; local 173 if (!HMAC_Final(&hctx->ctx, sig, &hlen)) { 176 *siglen = (size_t)hlen;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | iapp.c | 310 int len, hlen; local 340 hlen = be_to_host16(hdr->length); 345 be_to_host16(hdr->identifier), hlen); 351 if (hlen > len) { 352 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", 353 hlen, len); 356 if (hlen < len) { 358 len - hlen); 359 len = hlen;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | iapp.c | 310 int len, hlen; local 340 hlen = be_to_host16(hdr->length); 345 be_to_host16(hdr->identifier), hlen); 351 if (hlen > len) { 352 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", 353 hlen, len); 356 if (hlen < len) { 358 len - hlen); 359 len = hlen;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | iapp.c | 310 int len, hlen; local 340 hlen = be_to_host16(hdr->length); 345 be_to_host16(hdr->identifier), hlen); 351 if (hlen > len) { 352 wpa_printf(MSG_INFO, "Underflow IAPP frame (hlen=%d len=%d)", 353 hlen, len); 356 if (hlen < len) { 358 len - hlen); 359 len = hlen;
|