Searched refs:packet_length (Results 1 - 25 of 59) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Ds23_pkt.c97 if (s->packet_length < (unsigned int)n) {
102 j = BIO_read(s->rbio, (char *)&(p[s->packet_length]),
103 n - s->packet_length);
107 s->packet_length += j;
108 if (s->packet_length >= (unsigned int)n)
109 return (s->packet_length);
H A Dd1_pkt.c210 s->packet_length = rdata->packet_length;
243 rdata->packet_length = s->packet_length;
260 s->packet_length = 0;
378 s->packet_length = rdata->packet_length;
407 * At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length,
444 s->packet_length = 0;
517 s->packet_length
[all...]
H A Ds23_srvr.c456 * s->packet_length. We have at least 11 valid packet bytes.
461 ssl3_finish_mac(s, s->packet + 2, s->packet_length - 2);
466 s->packet_length - 2, s, s->msg_callback_arg);
474 if ((csl + sil + cl + 11) != s->packet_length) { /* We can't have TLS
527 while (p < s->packet + s->packet_length) {
584 s->packet_length = n;
618 s->packet_length = n;
628 s->packet_length = 0;
H A Ds2_pkt.c216 if (n > (int)s->packet_length) {
217 n -= s->packet_length;
321 s->packet_length += n;
324 s->packet_length = n;
341 if ((s->s2->rbuf_left != 0) || ((s->packet_length != 0) && extend)) {
344 off = s->packet_length;
391 s->packet_length += n;
393 s->packet_length = n;
H A Ddtls1.h253 unsigned int packet_length; member in struct:dtls1_record_data_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Ds23_pkt.c98 if (s->packet_length < (unsigned int)n)
105 j=BIO_read(s->rbio,(char *)&(p[s->packet_length]),
106 n-s->packet_length);
110 s->packet_length+=j;
111 if (s->packet_length >= (unsigned int)n)
112 return(s->packet_length);
H A Ds23_srvr.c409 ssl3_finish_mac(s, s->packet+2, s->packet_length-2);
411 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */
419 if ((csl+sil+cl+11) != s->packet_length)
511 s->packet_length=n;
536 s->packet_length=n;
544 s->packet_length=0;
H A Ddtls1.h196 unsigned int packet_length; member in struct:dtls1_record_data_st
H A Ds2_pkt.c222 if (n > (int)s->packet_length)
224 n-=s->packet_length;
327 s->packet_length+=n;
331 s->packet_length=n;
346 if ((s->s2->rbuf_left != 0) || ((s->packet_length != 0) && extend))
351 off=s->packet_length;
409 s->packet_length+=n;
411 s->packet_length=n;
H A Dd1_pkt.c155 s->packet_length = rdata->packet_length;
181 rdata->packet_length = s->packet_length;
196 s->packet_length = 0;
307 s->packet_length = rdata->packet_length;
338 /* At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length,
454 s->packet_length=0;
509 (s->packet_length < DTLS1_RT_HEADER_LENGT
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Ds23_pkt.c97 if (s->packet_length < (unsigned int)n) {
102 j = BIO_read(s->rbio, (char *)&(p[s->packet_length]),
103 n - s->packet_length);
107 s->packet_length += j;
108 if (s->packet_length >= (unsigned int)n)
109 return (s->packet_length);
H A Dd1_pkt.c210 s->packet_length = rdata->packet_length;
243 rdata->packet_length = s->packet_length;
260 s->packet_length = 0;
378 s->packet_length = rdata->packet_length;
407 * At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length,
444 s->packet_length = 0;
517 s->packet_length
[all...]
H A Ds23_srvr.c456 * s->packet_length. We have at least 11 valid packet bytes.
461 ssl3_finish_mac(s, s->packet + 2, s->packet_length - 2);
466 s->packet_length - 2, s, s->msg_callback_arg);
474 if ((csl + sil + cl + 11) != s->packet_length) { /* We can't have TLS
527 while (p < s->packet + s->packet_length) {
584 s->packet_length = n;
618 s->packet_length = n;
628 s->packet_length = 0;
H A Ds2_pkt.c216 if (n > (int)s->packet_length) {
217 n -= s->packet_length;
321 s->packet_length += n;
324 s->packet_length = n;
341 if ((s->s2->rbuf_left != 0) || ((s->packet_length != 0) && extend)) {
344 off = s->packet_length;
391 s->packet_length += n;
393 s->packet_length = n;
H A Ddtls1.h253 unsigned int packet_length; member in struct:dtls1_record_data_st
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/core/
H A Dud_header.c73 { STRUCT_FIELD(lrh, packet_length),
188 * lrh.packet_length, grh.ip_version, grh.payload_length,
198 u16 packet_length; local
205 packet_length = (IB_LRH_BYTES +
214 packet_length += IB_GRH_BYTES / 4;
225 header->lrh.packet_length = cpu_to_be16(packet_length);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/
H A Dsmc9194.c1137 word packet_length; local
1153 /* First two words are status and packet_length */
1155 packet_length = inw( ioaddr + DATA_1 );
1157 packet_length &= 0x07ff; /* mask off top bits */
1159 PRINTK2(("RCV: STATUS %4x LENGTH %4x\n", status, packet_length ));
1164 packet_length -= 6;
1173 packet_length++;
1179 skb = dev_alloc_skb( packet_length + 5);
1194 data = skb_put( skb, packet_length);
1202 packet_length >>
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Ddtls1.h196 unsigned int packet_length; member in struct:dtls1_record_data_st
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/usb/
H A Dgl620a.c72 __le32 packet_length; member in struct:gl_packet
106 size = le32_to_cpu(packet->packet_length);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/msm/
H A Dmddihost.c119 regacc_pkt_ptr->packet_length = curr_llist_ptr->packet_header_count;
187 regacc_pkt_ptr->packet_length = curr_llist_ptr->packet_header_count +
265 regacc_pkt_ptr->packet_length = curr_llist_ptr->packet_header_count;
319 regacc_pkt_ptr->packet_length = curr_llist_ptr->packet_header_count + 4;
H A Dmddihosti.h190 uint16 packet_length; member in struct:GCC_PACKED
192 the packet_length field. */
205 uint16 packet_length; member in struct:GCC_PACKED
207 the packet_length field. */
233 uint16 packet_length; member in struct:GCC_PACKED
235 the packet_length field. */
289 uint16 packet_length; member in struct:GCC_PACKED
290 /* total # of bytes in the packet not including the packet_length field. */
357 uint16 packet_length; member in struct:GCC_PACKED
358 /* total # of bytes in the packet not including the packet_length fiel
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/dvb/ttusb-dec/
H A Dttusb_dec.c134 int packet_length; member in struct:ttusb_dec
550 if (dec->packet_length % 2) {
555 for (i = 0; i < dec->packet_length; i += 2)
563 packet_id = dec->packet[dec->packet_length - 4] << 8;
564 packet_id += dec->packet[dec->packet_length - 3];
628 dec->packet_length = 0;
638 dec->packet[dec->packet_length++] = *b++;
640 if (dec->packet_length == 2) {
667 dec->packet[dec->packet_length++] = *b++;
670 dec->packet_length
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bridge/
H A Dbr_forward.c93 static inline unsigned packet_length(const struct sk_buff *skb) function
101 if (packet_length(skb) > skb->dev->mtu && !skb_is_gso(skb))
128 if (packet_length(skb) > skb->dev->mtu && !skb_is_gso(skb))
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/
H A Dkeystore.c2010 * @packet_length: Length of the Tag 11 packet written; zero on error
2016 size_t contents_length, size_t *packet_length)
2022 (*packet_length) = 0;
2039 dest[(*packet_length)++] = ECRYPTFS_TAG_11_PACKET_TYPE;
2040 rc = ecryptfs_write_packet_length(&dest[(*packet_length)],
2048 (*packet_length) += packet_size_length;
2049 dest[(*packet_length)++] = 0x62; /* binary data format specifier */
2050 dest[(*packet_length)++] = 8;
2051 memcpy(&dest[(*packet_length)], "_CONSOLE", 8);
2052 (*packet_length)
2015 write_tag_11_packet(char *dest, size_t *remaining_bytes, char *contents, size_t contents_length, size_t *packet_length) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/batman-adv/
H A Dvis.c608 static void broadcast_vis_packet(struct vis_info *info, int packet_length) argument
638 packet_length, batman_if, dstaddr);
647 static void unicast_vis_packet(struct vis_info *info, int packet_length) argument
668 packet_length, batman_if, dstaddr);
678 int packet_length; local
688 packet_length = sizeof(struct vis_packet) +
692 broadcast_vis_packet(info, packet_length);
694 unicast_vis_packet(info, packet_length);

Completed in 477 milliseconds

123