/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s23_pkt.c | 97 if (s->packet_length < (unsigned int)n) { 102 j = BIO_read(s->rbio, (char *)&(p[s->packet_length]), 103 n - s->packet_length); 107 s->packet_length += j; 108 if (s->packet_length >= (unsigned int)n) 109 return (s->packet_length);
|
H A D | d1_pkt.c | 210 s->packet_length = rdata->packet_length; 243 rdata->packet_length = s->packet_length; 260 s->packet_length = 0; 378 s->packet_length = rdata->packet_length; 407 * At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length, 444 s->packet_length = 0; 517 s->packet_length [all...] |
H A D | s23_srvr.c | 456 * s->packet_length. We have at least 11 valid packet bytes. 461 ssl3_finish_mac(s, s->packet + 2, s->packet_length - 2); 466 s->packet_length - 2, s, s->msg_callback_arg); 474 if ((csl + sil + cl + 11) != s->packet_length) { /* We can't have TLS 527 while (p < s->packet + s->packet_length) { 584 s->packet_length = n; 618 s->packet_length = n; 628 s->packet_length = 0;
|
H A D | s2_pkt.c | 216 if (n > (int)s->packet_length) { 217 n -= s->packet_length; 321 s->packet_length += n; 324 s->packet_length = n; 341 if ((s->s2->rbuf_left != 0) || ((s->packet_length != 0) && extend)) { 344 off = s->packet_length; 391 s->packet_length += n; 393 s->packet_length = n;
|
H A D | dtls1.h | 253 unsigned int packet_length; member in struct:dtls1_record_data_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s23_pkt.c | 98 if (s->packet_length < (unsigned int)n) 105 j=BIO_read(s->rbio,(char *)&(p[s->packet_length]), 106 n-s->packet_length); 110 s->packet_length+=j; 111 if (s->packet_length >= (unsigned int)n) 112 return(s->packet_length);
|
H A D | s23_srvr.c | 409 ssl3_finish_mac(s, s->packet+2, s->packet_length-2); 411 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */ 419 if ((csl+sil+cl+11) != s->packet_length) 511 s->packet_length=n; 536 s->packet_length=n; 544 s->packet_length=0;
|
H A D | dtls1.h | 196 unsigned int packet_length; member in struct:dtls1_record_data_st
|
H A D | s2_pkt.c | 222 if (n > (int)s->packet_length) 224 n-=s->packet_length; 327 s->packet_length+=n; 331 s->packet_length=n; 346 if ((s->s2->rbuf_left != 0) || ((s->packet_length != 0) && extend)) 351 off=s->packet_length; 409 s->packet_length+=n; 411 s->packet_length=n;
|
H A D | d1_pkt.c | 155 s->packet_length = rdata->packet_length; 181 rdata->packet_length = s->packet_length; 196 s->packet_length = 0; 307 s->packet_length = rdata->packet_length; 338 /* At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length, 454 s->packet_length=0; 509 (s->packet_length < DTLS1_RT_HEADER_LENGT [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s23_pkt.c | 97 if (s->packet_length < (unsigned int)n) { 102 j = BIO_read(s->rbio, (char *)&(p[s->packet_length]), 103 n - s->packet_length); 107 s->packet_length += j; 108 if (s->packet_length >= (unsigned int)n) 109 return (s->packet_length);
|
H A D | d1_pkt.c | 210 s->packet_length = rdata->packet_length; 243 rdata->packet_length = s->packet_length; 260 s->packet_length = 0; 378 s->packet_length = rdata->packet_length; 407 * At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr->length, 444 s->packet_length = 0; 517 s->packet_length [all...] |
H A D | s23_srvr.c | 456 * s->packet_length. We have at least 11 valid packet bytes. 461 ssl3_finish_mac(s, s->packet + 2, s->packet_length - 2); 466 s->packet_length - 2, s, s->msg_callback_arg); 474 if ((csl + sil + cl + 11) != s->packet_length) { /* We can't have TLS 527 while (p < s->packet + s->packet_length) { 584 s->packet_length = n; 618 s->packet_length = n; 628 s->packet_length = 0;
|
H A D | s2_pkt.c | 216 if (n > (int)s->packet_length) { 217 n -= s->packet_length; 321 s->packet_length += n; 324 s->packet_length = n; 341 if ((s->s2->rbuf_left != 0) || ((s->packet_length != 0) && extend)) { 344 off = s->packet_length; 391 s->packet_length += n; 393 s->packet_length = n;
|
H A D | dtls1.h | 253 unsigned int packet_length; member in struct:dtls1_record_data_st
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/core/ |
H A D | ud_header.c | 73 { STRUCT_FIELD(lrh, packet_length), 188 * lrh.packet_length, grh.ip_version, grh.payload_length, 198 u16 packet_length; local 205 packet_length = (IB_LRH_BYTES + 214 packet_length += IB_GRH_BYTES / 4; 225 header->lrh.packet_length = cpu_to_be16(packet_length);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/ |
H A D | smc9194.c | 1137 word packet_length; local 1153 /* First two words are status and packet_length */ 1155 packet_length = inw( ioaddr + DATA_1 ); 1157 packet_length &= 0x07ff; /* mask off top bits */ 1159 PRINTK2(("RCV: STATUS %4x LENGTH %4x\n", status, packet_length )); 1164 packet_length -= 6; 1173 packet_length++; 1179 skb = dev_alloc_skb( packet_length + 5); 1194 data = skb_put( skb, packet_length); 1202 packet_length >> [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | dtls1.h | 196 unsigned int packet_length; member in struct:dtls1_record_data_st
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/usb/ |
H A D | gl620a.c | 72 __le32 packet_length; member in struct:gl_packet 106 size = le32_to_cpu(packet->packet_length);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/msm/ |
H A D | mddihost.c | 119 regacc_pkt_ptr->packet_length = curr_llist_ptr->packet_header_count; 187 regacc_pkt_ptr->packet_length = curr_llist_ptr->packet_header_count + 265 regacc_pkt_ptr->packet_length = curr_llist_ptr->packet_header_count; 319 regacc_pkt_ptr->packet_length = curr_llist_ptr->packet_header_count + 4;
|
H A D | mddihosti.h | 190 uint16 packet_length; member in struct:GCC_PACKED 192 the packet_length field. */ 205 uint16 packet_length; member in struct:GCC_PACKED 207 the packet_length field. */ 233 uint16 packet_length; member in struct:GCC_PACKED 235 the packet_length field. */ 289 uint16 packet_length; member in struct:GCC_PACKED 290 /* total # of bytes in the packet not including the packet_length field. */ 357 uint16 packet_length; member in struct:GCC_PACKED 358 /* total # of bytes in the packet not including the packet_length fiel [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/dvb/ttusb-dec/ |
H A D | ttusb_dec.c | 134 int packet_length; member in struct:ttusb_dec 550 if (dec->packet_length % 2) { 555 for (i = 0; i < dec->packet_length; i += 2) 563 packet_id = dec->packet[dec->packet_length - 4] << 8; 564 packet_id += dec->packet[dec->packet_length - 3]; 628 dec->packet_length = 0; 638 dec->packet[dec->packet_length++] = *b++; 640 if (dec->packet_length == 2) { 667 dec->packet[dec->packet_length++] = *b++; 670 dec->packet_length [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bridge/ |
H A D | br_forward.c | 93 static inline unsigned packet_length(const struct sk_buff *skb) function 101 if (packet_length(skb) > skb->dev->mtu && !skb_is_gso(skb)) 128 if (packet_length(skb) > skb->dev->mtu && !skb_is_gso(skb))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ecryptfs/ |
H A D | keystore.c | 2010 * @packet_length: Length of the Tag 11 packet written; zero on error 2016 size_t contents_length, size_t *packet_length) 2022 (*packet_length) = 0; 2039 dest[(*packet_length)++] = ECRYPTFS_TAG_11_PACKET_TYPE; 2040 rc = ecryptfs_write_packet_length(&dest[(*packet_length)], 2048 (*packet_length) += packet_size_length; 2049 dest[(*packet_length)++] = 0x62; /* binary data format specifier */ 2050 dest[(*packet_length)++] = 8; 2051 memcpy(&dest[(*packet_length)], "_CONSOLE", 8); 2052 (*packet_length) 2015 write_tag_11_packet(char *dest, size_t *remaining_bytes, char *contents, size_t contents_length, size_t *packet_length) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/batman-adv/ |
H A D | vis.c | 608 static void broadcast_vis_packet(struct vis_info *info, int packet_length) argument 638 packet_length, batman_if, dstaddr); 647 static void unicast_vis_packet(struct vis_info *info, int packet_length) argument 668 packet_length, batman_if, dstaddr); 678 int packet_length; local 688 packet_length = sizeof(struct vis_packet) + 692 broadcast_vis_packet(info, packet_length); 694 unicast_vis_packet(info, packet_length);
|