/external/tcpdump/ |
H A D | print-dhcp6.c | 342 size_t optlen; local 357 optlen = EXTRACT_16BITS(&dh6o->dh6opt_len); 358 if (ep < cp + sizeof(*dh6o) + optlen) 365 if (optlen < 2) { 373 if (optlen >= 2 + 6) { 377 for (i = 8; i < optlen; i++) 387 if (optlen >= 2 + 8) { 399 if (optlen >= 2 + 2) { 402 for (i = 4; i < optlen; i++) 417 if (optlen < 2 [all...] |
H A D | print-dccp.c | 325 u_int optlen; local 332 optlen = dccp_print_option(cp); 333 if (!optlen) goto trunc2; 334 if (hlen <= optlen) break; 335 hlen -= optlen; 336 cp += optlen; 350 u_int8_t optlen, i; local 356 optlen = *(option +1); 357 if (optlen < 2) { 358 printf("Option %d optlen to [all...] |
H A D | print-ip6opts.c | 77 int optlen; local 79 for (i = 0; i < len; i += optlen) { 81 optlen = 1; 84 optlen = bp[i + 1] + 2; 88 if (i + optlen > len) 142 int optlen = 0; local 146 for (i = 0; i < len; i += optlen) { 148 optlen = 1; 151 optlen = bp[i + 1] + 2; 155 if (i + optlen > le [all...] |
H A D | print-mobility.c | 95 int optlen; local 97 for (i = 0; i < len; i += optlen) { 99 optlen = 1; 102 optlen = bp[i + 1] + 2; 106 if (i + optlen > len)
|
H A D | print-decnet.c | 713 u_int segsize, optlen; local 724 optlen = EXTRACT_LE_8BITS(ccmp->cc_optlen); 754 if (optlen) { 755 (void)printf("optlen %d ", optlen); 757 if (optlen > nsplen - sizeof(struct ccmsg)) 760 TCHECK2(*dp, optlen); 761 pdata(dp, optlen); 771 u_int optlen; local 780 optlen [all...] |
H A D | print-udp.c | 177 u_int i2, optlen; local 180 optlen = (i2 >> 16) & 0xff; 181 if (optlen == 0 || optlen > len) { 185 ip += optlen; 186 len -= optlen;
|
/external/kernel-headers/original/uapi/linux/ |
H A D | isdn_ppp.h | 63 int optlen; member in struct:isdn_ppp_comp_data
|
/external/iputils/ |
H A D | ping.c | 90 int optlen = 0; variable 499 optlen = 40; 524 optlen = 40; 541 optlen = 40; 547 hold += ((hold+511)/512)*(optlen + 20 + 16 + 64 + 160); 580 if (datalen > 0xFFFF - 8 - optlen - 20) { 582 fprintf(stderr, "Error: packet size %d is too large. Maximum is %d\n", datalen, 0xFFFF-8-20-optlen); 586 fprintf(stderr, "WARNING: packet size %d is too large. Maximum is %d\n", datalen, 0xFFFF-8-20-optlen); 600 printf("%d(%d) bytes of data.\n", datalen, datalen+8+optlen+20); 794 int optlen; local 1136 int optlen, totlen; local [all...] |
/external/toybox/lib/ |
H A D | getmountlist.c | 72 int optlen = strlen(opt), len, no, got = 0; local 79 if (optlen == len-no && !strncmp(opt, s+no, optlen)) {
|
/external/valgrind/coregrind/ |
H A D | pub_core_libcfile.h | 76 void *optval, Int *optlen ); 78 void *optval, Int optlen );
|
H A D | m_libcfile.c | 1141 Int *optlen) 1152 args[4] = (UWord)optlen; 1162 (UWord)optval, (UWord)optlen ); 1169 (UWord)optval, (UWord)optlen ); 1179 Int optlen) 1190 args[4] = (UWord)optlen; 1200 (UWord)optval, (UWord)optlen ); 1207 (UWord)optval, (UWord)optlen ); 1140 getsockopt( Int sd, Int level, Int optname, void *optval, Int *optlen) argument 1178 setsockopt( Int sd, Int level, Int optname, void *optval, Int optlen) argument
|
/external/ppp/pppd/ |
H A D | ccp.c | 1497 int optlen; local 1525 optlen = p[1]; 1526 if (optlen < 2 || optlen > len) 1529 len -= optlen; 1530 optend = p + optlen; 1534 if (optlen >= CILEN_MPPE) { 1555 if (optlen >= CILEN_DEFLATE) { 1567 if (optlen >= CILEN_BSD_COMPRESS) { 1574 if (optlen > [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211_monitor.c | 346 socklen_t optlen; local 414 optlen = sizeof(optval); 417 (drv->monitor_sock, SOL_SOCKET, SO_PRIORITY, &optval, optlen)) {
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211_monitor.c | 346 socklen_t optlen; local 414 optlen = sizeof(optval); 417 (drv->monitor_sock, SOL_SOCKET, SO_PRIORITY, &optval, optlen)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211_monitor.c | 346 socklen_t optlen; local 414 optlen = sizeof(optval); 417 (drv->monitor_sock, SOL_SOCKET, SO_PRIORITY, &optval, optlen)) {
|
/external/kernel-headers/original/uapi/rdma/ |
H A D | rdma_user_cm.h | 290 __u32 optlen; member in struct:rdma_ucm_set_option
|
/external/toybox/toys/pending/ |
H A D | modprobe.c | 87 int optlen = 0; local 89 if (opts) optlen = strlen(opts); 90 opts = xrealloc(opts, optlen + strlen(toadd) + 2); 91 sprintf(opts + optlen, " %s", toadd);
|
H A D | dhcp.c | 1061 int count, optlen, size = ARRAY_LEN(options_list); local 1137 optlen = optptr[1]; 1139 while (optlen) { 1143 optlen -= 4; 1156 optlen = optptr[1]; 1158 while (optlen >= 1 + 4) { 1165 optlen--; 1170 optlen--; 1172 if (optlen < 4) break; 1179 optlen [all...] |
/external/netcat/ |
H A D | netcat.c | 655 socklen_t optlen; local 669 optlen = sizeof(optval); 671 &optval, &optlen)) == 0) {
|
/external/openssh/ |
H A D | misc.c | 142 socklen_t optlen; local 144 optlen = sizeof opt; 145 if (getsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &opt, &optlen) == -1) {
|
H A D | sshconnect.c | 337 socklen_t optlen; local 382 optlen = sizeof(optval); 384 &optlen) == -1) {
|
/external/mdnsresponder/mDNSCore/ |
H A D | DNSCommon.c | 232 if (opt->optlen >= DNSOpt_OwnerData_ID_Wake_Space-4) 235 if (opt->optlen > DNSOpt_OwnerData_ID_Wake_Space-4) 2296 opt->optlen = (mDNSu16)((mDNSu16)ptr[2] << 8 | ptr[3]); 2298 if (ptr + opt->optlen > end) { LogInfo("GetLargeResourceRecord: ptr + opt->optlen > end"); goto fail; } 2302 if (opt->optlen == DNSOpt_LLQData_Space - 4) 2315 if (opt->optlen == DNSOpt_LeaseData_Space - 4) 2324 if (ValidOwnerLength(opt->optlen)) 2331 if (opt->optlen >= DNSOpt_OwnerData_ID_Wake_Space-4) 2334 // This mDNSPlatformMemCopy is safe because the ValidOwnerLength(opt->optlen) chec [all...] |
/external/compiler-rt/include/sanitizer/ |
H A D | linux_syscall_hooks.h | 1061 #define __sanitizer_syscall_pre_setsockopt(fd, level, optname, optval, optlen) \ 1064 (long)(optlen)) 1066 optlen) \ 1069 (long)(optlen)) 1070 #define __sanitizer_syscall_pre_getsockopt(fd, level, optname, optval, optlen) \ 1073 (long)(optlen)) 1075 optlen) \ 1078 (long)(optlen)) 2595 long optval, long optlen); 2598 long optlen); [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_interceptors.inc | 2010 int *optlen) { 2013 optlen); 2014 if (optlen) COMMON_INTERCEPTOR_READ_RANGE(ctx, optlen, sizeof(*optlen)); 2018 int res = REAL(getsockopt)(sockfd, level, optname, optval, optlen); 2020 if (optval && optlen) COMMON_INTERCEPTOR_WRITE_RANGE(ctx, optval, *optlen);
|
/external/valgrind/coregrind/m_syswrap/ |
H A D | syswrap-tilegx-linux.c | 740 const void *, optval, int, optlen); 749 void *, optval, int, *optlen);
|