| /src/external/bsd/libpcap/dist/ |
| pcap-septel.c | 70 unsigned short packet_len = 0; local 121 packet_len = m->len; 125 if (caplen > packet_len) { 127 caplen = packet_len; 130 if ((p->fcode.bf_insns == NULL) || pcapint_filter(p->fcode.bf_insns, dp, packet_len, caplen)) { 150 pcap_header.len = packet_len;
|
| pcap-dag.c | 405 unsigned short packet_len = 0; local 475 packet_len = ntohs(header->wlen) + dag_record_size; 485 packet_len += 4; /* MC header */ 492 packet_len += 2; /* ETH header */ 497 packet_len += (8 * num_ext_hdr); 499 if (caplen > packet_len) { 500 caplen = packet_len; 514 packet_len = ntohs(header->wlen); 519 caplen = packet_len = ATM_CELL_SIZE; 524 packet_len = ntohs(header->wlen) [all...] |
| pcap-npf.c | 796 int packet_len = 0, caplen = 0; local 873 packet_len = ATM_SNAPLEN; 881 packet_len = swt - (pw->dag_fcs_bits); 883 if (caplen > packet_len) 885 caplen = packet_len; 893 packet_len = swt - (pw->dag_fcs_bits); 895 if (caplen > packet_len) 897 caplen = packet_len; 947 if (pcapint_filter(p->fcode.bf_insns, dp, packet_len, caplen) == 0) 957 pcap_header.len = packet_len; [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| eth_p_oui.c | 166 size_t packet_len; local 170 packet_len = sizeof(*ethhdr) + sizeof(global_oui) + 1 + len; 171 packet = os_zalloc(packet_len); 188 ret = l2_packet_send(iface->l2, NULL, 0, packet, packet_len);
|
| wpa_auth_ft.c | 520 * @packet_len: Pointer to return the length of the allocated buffer in octets 529 u8 **packet, size_t *packet_len) 543 *packet_len = sizeof(u16) + auth_len + plain_len; 545 *packet_len += AES_BLOCK_SIZE; 547 if (*packet_len < RRB_MIN_MSG_LEN) { 548 pad_len = RRB_MIN_MSG_LEN - *packet_len; 553 (int) *packet_len, (int) (*packet_len + pad_len)); 554 *packet_len += pad_len; 568 *packet = os_zalloc(*packet_len); 973 size_t packet_len; local 1971 size_t packet_len, key_len; local 3993 size_t plain_len = 0, packet_len = 0; local 4575 size_t packet_len = 0, key_len = 0; local 4918 size_t packet_len; local [all...] |
| /src/external/gpl3/gdb/dist/gdb/python/ |
| py-connection.c | 395 Py_ssize_t packet_len = 0; local 398 &packet_len) < 0) 403 if (packet_len == 0) 414 gdb::array_view<const char> view (packet_str, packet_len);
|
| /src/external/gpl3/gdb.old/dist/gdb/python/ |
| py-connection.c | 403 Py_ssize_t packet_len = 0; local 406 &packet_len) < 0) 411 if (packet_len == 0) 422 gdb::array_view<const char> view (packet_str, packet_len);
|
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| packet.h | 634 size_t packet_len; member in struct:wpacket_sub 636 /* Number of bytes in the packet_len or 0 if we don't write the length */
|
| /src/crypto/external/bsd/openssl/dist/include/internal/ |
| packet.h | 641 size_t packet_len; member in struct:wpacket_sub 643 /* Number of bytes in the packet_len or 0 if we don't write the length */
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| packet_local.h | 640 size_t packet_len; member in struct:wpacket_sub 642 /* Number of bytes in the packet_len or 0 if we don't write the length */
|
| /src/external/bsd/tcpdump/dist/ |
| print-olsr.c | 69 nd_uint16_t packet_len; member in struct:olsr_common 344 length = ND_MIN(length, GET_BE_U_2(ptr.common->packet_len));
|
| print-isoclns.c | 2494 u_int packet_len; local 2502 packet_len=length; 2646 if (packet_len>pdu_len) { 2647 packet_len=pdu_len; /* do TLV decoding as long as it makes sense */ 2668 INVALID_OR_DECREMENT(packet_len,ISIS_COMMON_HEADER_SIZE+ISIS_IIH_LAN_HEADER_SIZE); 2687 if (packet_len>pdu_len) { 2688 packet_len=pdu_len; /* do TLV decoding as long as it makes sense */ 2707 INVALID_OR_DECREMENT(packet_len,ISIS_COMMON_HEADER_SIZE+ISIS_IIH_PTP_HEADER_SIZE); 2730 if (packet_len>pdu_len) { 2731 packet_len=pdu_len; /* do TLV decoding as long as it makes sense * [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| socket_wrapper.c | 785 size_t packet_len; local 821 packet_len = nonwire_len + wire_len; 822 alloc_len = packet_len; 902 *_packet_len = packet_len - icmp_truncate_len; 945 size_t packet_len = 0; local 1199 &packet_len); 1206 write(fd, packet, packet_len);
|
| /src/external/gpl3/gdb/dist/gdbserver/ |
| server.cc | 1250 handle_search_memory (char *own_buf, int packet_len) 1260 pattern = (gdb_byte *) malloc (packet_len); 1265 packet_len - cmd_name_len, 2342 handle_qxfer (char *own_buf, int packet_len, int *new_packet_len_p) 2420 data = (unsigned char *) malloc (packet_len - (offset - own_buf)); 2426 if (decode_xfer_write (offset, packet_len - (offset - own_buf), 2522 handle_query (char *own_buf, int packet_len, int *new_packet_len_p) 3031 handle_search_memory (own_buf, packet_len); 3088 if (handle_qxfer (own_buf, packet_len, new_packet_len_p)) 3551 handle_v_requests (char *own_buf, int packet_len, int *new_packet_len 4650 int packet_len; local [all...] |
| /src/external/gpl3/gdb.old/dist/gdbserver/ |
| server.cc | 1235 handle_search_memory (char *own_buf, int packet_len) 1245 pattern = (gdb_byte *) malloc (packet_len); 1250 packet_len - cmd_name_len, 2337 handle_qxfer (char *own_buf, int packet_len, int *new_packet_len_p) 2415 data = (unsigned char *) malloc (packet_len - (offset - own_buf)); 2421 if (decode_xfer_write (offset, packet_len - (offset - own_buf), 2515 handle_query (char *own_buf, int packet_len, int *new_packet_len_p) 2980 handle_search_memory (own_buf, packet_len); 3037 if (handle_qxfer (own_buf, packet_len, new_packet_len_p)) 3500 handle_v_requests (char *own_buf, int packet_len, int *new_packet_len 4560 int packet_len; local [all...] |
| /src/sys/fs/udf/ |
| ecma167-udf.h | 450 uint16_t packet_len; member in struct:part_map_spare
|
| /src/sys/net/ |
| if_wg.c | 2707 uint16_t packet_len; local 2731 packet_len = ntohs(ip->ip_len); 2745 packet_len = sizeof(*ip6) + ntohs(ip6->ip6_plen); 2753 if (packet_len > decrypted_len) { 2754 WG_DLOG("packet_len %u > decrypted_len %zu\n", packet_len,
|