/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/ |
H A D | print-mobility.c | 175 int mhlen, hlen, type; local 207 hlen = IP6M_MINLEN; 213 hlen = IP6M_MINLEN; 215 TCHECK2(*mh, hlen + 8); 218 EXTRACT_32BITS(&bp[hlen]), 219 EXTRACT_32BITS(&bp[hlen + 4])); 221 hlen += 8; 229 hlen = IP6M_MINLEN; 231 TCHECK2(*mh, hlen + 8); 234 EXTRACT_32BITS(&bp[hlen]), [all...] |
H A D | print-sl.c | 117 u_int hlen; local 145 hlen = IP_HL(ip); 146 hlen += TH_OFF((struct tcphdr *)&((int *)ip)[hlen]); 147 lastlen[dir][lastconn] = length - (hlen << 2); 195 register u_int flags, hlen; local 231 * 'hlen' is the length of the uncompressed TCP/IP header (in words). 233 * 'length - hlen' is the amount of data in the packet. 235 hlen = IP_HL(ip); 236 hlen [all...] |
H A D | print-tcp.c | 143 register u_int hlen; local 172 hlen = TH_OFF(tp) * 4; 180 if (!qflag && hlen >= sizeof(*tp) && hlen <= length && 181 (length - hlen) >= 4) { 187 fraglenp = (u_char *)tp + hlen; 190 if (fraglen > (length - hlen) - 4) 191 fraglen = (length - hlen) - 4; 237 if (hlen < sizeof(*tp)) { 239 length - hlen, hle [all...] |
H A D | print-dccp.c | 177 u_int hlen; local 203 hlen = dh->dccph_doff * 4; 220 (void)printf(" %d", len - hlen); 221 if (hlen > len) { 223 hlen, len); 323 if (hlen > dccp_basic_hdr_len(dh) + extlen){ 329 hlen -= dccp_basic_hdr_len(dh) + extlen; 334 if (hlen <= optlen) break; 335 hlen -= optlen;
|
H A D | print-icmp.c | 347 u_int hlen, dport, mtu, obj_tlen, obj_class_num, obj_ctype; local 384 hlen = IP_HL(oip) * 4; 385 ouh = (struct udphdr *)(((u_char *)oip) + hlen); 625 hlen = plen - ICMP_EXTD_MINLEN; 627 vec[0].len = hlen; 631 hlen); 633 hlen -= 4; /* subtract common header size */ 636 while (hlen > sizeof(struct icmp_mpls_ext_object_header_t)) { 651 hlen-=sizeof(struct icmp_mpls_ext_object_header_t); /* length field includes tlv header */ 685 if (hlen < obj_tle [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/otus/80211core/ |
H A D | cinit.c | 73 u16_t hlen = 16; local 143 hlen = 19; 211 hlen = 19; 249 header[hlen] = up; 250 hlen += 1; 282 header[hlen] = 0; 283 hlen += 1; 306 header[hlen] = 0; 307 hlen += 1; 354 header[hlen] 1412 u8_t hlen = 32; // MAC ctrl + PHY ctrl + 802.11 MM header local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | mss.c | 50 int hlen; local 58 hlen = OPENVPN_IPH_GET_LEN (pip->version_len); 63 && hlen <= BLEN (buf) 64 && BLEN (buf) - hlen 68 if (buf_advance (&newbuf, hlen)) 130 int hlen, olen, optlen; local 140 hlen = OPENVPN_TCPH_GET_DOFF (tc->doff_res); 143 if (hlen <= (int) sizeof (struct openvpn_tcphdr) 144 || hlen > BLEN (buf)) 147 for (olen = hlen [all...] |
H A D | proto.c | 108 int hlen; local 119 hlen = OPENVPN_IPH_GET_LEN (pip->version_len); 130 msg (msglevel, "%s %s: size=%d totlen=%d hlen=%d errcount=" counter_format, 135 hlen,
|
H A D | dhcp.h | 60 uint8_t hlen; /* hardware address length (e.g. '6' for 10Mb Ethernet) */ member in struct:dhcp
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/modules/ |
H A D | vjcompress.c | 180 register u_int hlen = getip_hl(*ip); local 197 th = (struct tcphdr *)&((int *)ip)[hlen]; 245 hlen += getth_off(*th); 246 hlen <<= 2; 247 if (hlen > mlen) 275 oth = (struct tcphdr *)&((int *)&cs->cs_ip)[hlen]; 276 deltaS = hlen; 277 hlen += getth_off(*th); 278 hlen <<= 2; 279 if (hlen > mle 442 register u_int hlen; local 483 register u_int hlen, changes; local [all...] |
H A D | ppp_comp.c | 611 int len, proto, type, hlen, code; local 651 hlen = len; 653 hlen = PPP_HDRLEN + MAX_IPHDR; 655 hlen = PPP_HDRLEN; 656 if (hlen > len) 657 hlen = len; 658 if (mp->b_wptr < mp->b_rptr + hlen || mp->b_datap->db_ref > 1) { 659 PULLUP(mp, hlen); 661 DPRINT1("ppp_comp_wsrv: pullup failed (%d)\n", hlen); 800 int len, hlen, vjle local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/modules/ |
H A D | vjcompress.c | 176 register u_int hlen = getip_hl(*ip); local 193 th = (struct tcphdr *)&((int *)ip)[hlen]; 241 hlen += getth_off(*th); 242 hlen <<= 2; 243 if (hlen > mlen) 271 oth = (struct tcphdr *)&((int *)&cs->cs_ip)[hlen]; 272 deltaS = hlen; 273 hlen += getth_off(*th); 274 hlen <<= 2; 275 if (hlen > mle 438 register u_int hlen; local 479 register u_int hlen, changes; local [all...] |
H A D | ppp_comp.c | 603 int len, proto, type, hlen, code; local 643 hlen = len; 645 hlen = PPP_HDRLEN + MAX_IPHDR; 647 hlen = PPP_HDRLEN; 648 if (hlen > len) 649 hlen = len; 650 if (mp->b_wptr < mp->b_rptr + hlen || mp->b_datap->db_ref > 1) { 651 PULLUP(mp, hlen); 653 DPRINT1("ppp_comp_wsrv: pullup failed (%d)\n", hlen); 792 int len, hlen, vjle local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | kdf.c | 130 unsigned int hlen; /* Output length of the digest function. */ local 144 hlen = gcry_md_get_algo_dlen (hashalgo); 145 if (!hlen) 151 is not larger that 0xffffffff * hlen. */ 154 l = ((dklen - 1)/ hlen) + 1; 155 r = dklen - (l - 1) * hlen; 159 ? gcry_malloc_secure (saltlen + 4 + hlen + hlen) 160 : gcry_malloc (saltlen + 4 + hlen + hlen)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | kdf.c | 130 unsigned int hlen; /* Output length of the digest function. */ local 144 hlen = gcry_md_get_algo_dlen (hashalgo); 145 if (!hlen) 151 is not larger that 0xffffffff * hlen. */ 154 l = ((dklen - 1)/ hlen) + 1; 155 r = dklen - (l - 1) * hlen; 159 ? gcry_malloc_secure (saltlen + 4 + hlen + hlen) 160 : gcry_malloc (saltlen + 4 + hlen + hlen)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/macintosh/ |
H A D | windfarm_pid.c | 38 int i, hlen = st->param.history_len; local 45 for (i = 0; i < hlen; i++) { 52 st->index = (st->index + 1) % hlen; 58 for (i = 0, integ = 0; i < hlen; i++) 59 integ += st->errors[(st->index + hlen - i) % hlen]; 64 st->errors[(st->index + hlen - 1) % hlen]; 93 int i, hlen = st->param.history_len; local 100 for (i = 0; i < hlen; [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/udhcpd/ |
H A D | arpping.h | 17 u_char hlen; /* hardware address length (must be 6) */
member in struct:arpMsg
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/udhcpd/ |
H A D | arpping.h | 17 u_char hlen; /* hardware address length (must be 6) */ member in struct:arpMsg
|
H A D | packet.h | 10 u_int8_t hlen; member in struct:dhcpMessage
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/xfs/linux-2.6/ |
H A D | xfs_ioctl.h | 71 u32 hlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | ipip.h | 28 int hlen; /* Precalculated GRE header length */ member in struct:ip_tunnel
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/vlan/ |
H A D | vconfig.c | 69 int hlen; local 76 hlen = strlen(hex_str); 80 for (i = 0; i<hlen; i++) { 84 if (i >= hlen) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | content_encoding.c | 335 ssize_t hlen; 337 switch (check_gzip_header((unsigned char *)k->str, nread, &hlen)) { 339 z->next_in = (Bytef *)k->str + hlen; 340 z->avail_in = (uInt)(nread - hlen); 373 ssize_t hlen; 385 switch (check_gzip_header(z->next_in, z->avail_in, &hlen)) { 390 z->next_in = (Bytef *)k->str + hlen + nread - z->avail_in; 391 z->avail_in = (uInt)(z->avail_in - hlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ppp-2.4.4/solaris/ |
H A D | ppp_comp.c | 611 int len, proto, type, hlen, code; local 651 hlen = len; 653 hlen = PPP_HDRLEN + MAX_IPHDR; 655 hlen = PPP_HDRLEN; 656 if (hlen > len) 657 hlen = len; 658 if (mp->b_wptr < mp->b_rptr + hlen || mp->b_datap->db_ref > 1) { 659 PULLUP(mp, hlen); 661 DPRINT1("ppp_comp_wsrv: pullup failed (%d)\n", hlen); 800 int len, hlen, vjle local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/ppp/solaris/ |
H A D | ppp_comp.c | 603 int len, proto, type, hlen, code; local 643 hlen = len; 645 hlen = PPP_HDRLEN + MAX_IPHDR; 647 hlen = PPP_HDRLEN; 648 if (hlen > len) 649 hlen = len; 650 if (mp->b_wptr < mp->b_rptr + hlen || mp->b_datap->db_ref > 1) { 651 PULLUP(mp, hlen); 653 DPRINT1("ppp_comp_wsrv: pullup failed (%d)\n", hlen); 792 int len, hlen, vjle local [all...] |