/external/qemu/slirp-android/ |
D | cksum.c | 51 register int mlen = 0; in cksum() local 67 mlen = m->m_len; in cksum() 69 if (len < mlen) in cksum() 70 mlen = len; in cksum() 71 len -= mlen; in cksum() 75 if ((1 & (long) w) && (mlen > 0)) { in cksum() 80 mlen--; in cksum() 87 while ((mlen -= 32) >= 0) { in cksum() 94 mlen += 32; in cksum() 95 while ((mlen -= 8) >= 0) { in cksum() [all …]
|
/external/qemu/slirp/ |
D | cksum.c | 51 register int mlen = 0; in cksum() local 67 mlen = m->m_len; in cksum() 69 if (len < mlen) in cksum() 70 mlen = len; in cksum() 71 len -= mlen; in cksum() 75 if ((1 & (long) w) && (mlen > 0)) { in cksum() 80 mlen--; in cksum() 87 while ((mlen -= 32) >= 0) { in cksum() 94 mlen += 32; in cksum() 95 while ((mlen -= 8) >= 0) { in cksum() [all …]
|
/external/ipsec-tools/src/racoon/ |
D | str2val.c | 51 val2str(buf, mlen) in val2str() argument 53 size_t mlen; 56 size_t len = (mlen * 2) + mlen / 8 + 10; 61 for (i = 0, j = 0; i < mlen; i++) {
|
/external/openssl/crypto/rsa/ |
D | rsa_oaep.c | 97 int i, dblen, mlen = -1; in RSA_padding_check_PKCS1_OAEP() local 163 mlen = dblen - ++i; in RSA_padding_check_PKCS1_OAEP() 164 if (tlen < mlen) in RSA_padding_check_PKCS1_OAEP() 167 mlen = -1; in RSA_padding_check_PKCS1_OAEP() 170 memcpy(to, db + i, mlen); in RSA_padding_check_PKCS1_OAEP() 174 return mlen; in RSA_padding_check_PKCS1_OAEP()
|
/external/ppp/pppd/ |
D | upap.c | 620 int mlen, ulen, wlen; local 665 mlen = p[0]; 666 if (len < mlen + 1) 669 p += mlen + 1; 670 len -= mlen + 1; 672 print_string(msg, mlen, printer, arg);
|
D | chap-new.c | 313 int response_len, ok, mlen; in chap_handle_response() local 365 mlen = strlen(message); in chap_handle_response() 366 len = CHAP_HDRLEN + mlen; in chap_handle_response() 371 if (mlen > 0) in chap_handle_response() 372 memcpy(p + CHAP_HDRLEN, message, mlen); in chap_handle_response()
|
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
D | l2_packet_pcap.c | 99 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 100 eth = os_malloc(mlen); in l2_packet_send() 110 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send() 112 ret = eth_send(l2->eth, (u8 *) eth, mlen); in l2_packet_send()
|
D | l2_packet_winpcap.c | 90 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 91 eth = os_malloc(mlen); in l2_packet_send() 99 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send()
|
D | l2_packet_ndis.c | 122 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 123 eth = os_malloc(mlen); in l2_packet_send() 131 res = WriteFile(driver_ndis_get_ndisuio_handle(), eth, mlen, in l2_packet_send()
|
/external/wpa_supplicant/ |
D | l2_packet_pcap.c | 99 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 100 eth = os_malloc(mlen); in l2_packet_send() 110 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send() 112 ret = eth_send(l2->eth, (u8 *) eth, mlen); in l2_packet_send()
|
D | l2_packet_winpcap.c | 90 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 91 eth = os_malloc(mlen); in l2_packet_send() 99 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send()
|
D | l2_packet_ndis.c | 122 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 123 eth = os_malloc(mlen); in l2_packet_send() 131 res = WriteFile(driver_ndis_get_ndisuio_handle(), eth, mlen, in l2_packet_send()
|
D | wpa.c | 2396 size_t mlen; in wpa_supplicant_send_stk_1_of_4() local 2405 sizeof(*msg) + kde_len, &mlen, in wpa_supplicant_send_stk_1_of_4() 2446 mbuf, mlen, NULL); in wpa_supplicant_send_stk_1_of_4() 2453 size_t mlen; in wpa_supplicant_send_stk_3_of_4() local 2464 sizeof(*msg) + kde_len, &mlen, in wpa_supplicant_send_stk_3_of_4() 2501 ETH_P_EAPOL, mbuf, mlen, msg->key_mic); in wpa_supplicant_send_stk_3_of_4()
|
/external/bluetooth/bluez/src/ |
D | sdpd-request.c | 345 int status = 0, i, plen, mlen, mtu, scanned; in service_search_req() local 367 mlen = scanned + sizeof(uint16_t) + 1; in service_search_req() 369 if (plen < mlen || plen != mlen + *(uint8_t *)(pdata+sizeof(uint16_t))) { in service_search_req() 627 int status = 0, plen, mlen; in service_attr_req() local 667 mlen = scanned + sizeof(uint32_t) + sizeof(uint16_t) + 1; in service_attr_req() 669 if (plen < mlen || plen != mlen + *(uint8_t *)pdata) { in service_attr_req()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_pax.c | 339 u16 flen, mlen; in eap_pax_process() local 349 mlen = wpabuf_len(reqData) - EAP_PAX_ICV_LEN; in eap_pax_process() 418 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0, in eap_pax_process() 422 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0, in eap_pax_process()
|
D | eap_gpsk.c | 601 size_t mlen; in eap_gpsk_send_gpsk_4() local 605 mlen = eap_gpsk_mic_len(data->vendor, data->specifier); in eap_gpsk_send_gpsk_4() 607 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, 1 + 2 + mlen, in eap_gpsk_send_gpsk_4() 618 rpos = wpabuf_put(resp, mlen); in eap_gpsk_send_gpsk_4()
|
/external/openssl/ssl/ |
D | t1_lib.c | 1649 int slen, mlen, renew_ticket = 0; in tls_decrypt_ticket() local 1685 mlen = HMAC_size(&hctx); in tls_decrypt_ticket() 1686 if (mlen < 0) in tls_decrypt_ticket() 1691 eticklen -= mlen; in tls_decrypt_ticket() 1696 if (memcmp(tick_hmac, etick + eticklen, mlen)) in tls_decrypt_ticket() 1709 if (EVP_DecryptFinal(&ctx, sdec + slen, &mlen) <= 0) in tls_decrypt_ticket() 1711 slen += mlen; in tls_decrypt_ticket()
|
/external/grub/netboot/ |
D | sk_g16.h | 147 unsigned short mlen; /* Message Byte Count */ member
|
D | sk_g16.c | 585 int len = (rmdp->mlen & 0x0fff); /* extract message length from receive buffer */ in SK_poll() 945 rmdp->mlen = 0; /* init message length */ in SK_lance_init()
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | peerkey.c | 336 size_t mlen; in wpa_supplicant_send_stk_1_of_4() local 345 sizeof(*msg) + kde_len, &mlen, in wpa_supplicant_send_stk_1_of_4() 386 mbuf, mlen, NULL); in wpa_supplicant_send_stk_1_of_4() 393 size_t mlen; in wpa_supplicant_send_stk_3_of_4() local 404 sizeof(*msg) + kde_len, &mlen, in wpa_supplicant_send_stk_3_of_4() 441 ETH_P_EAPOL, mbuf, mlen, msg->key_mic); in wpa_supplicant_send_stk_3_of_4()
|
/external/ppp/pppd/include/net/ |
D | vjcompress.h | 134 extern u_int vj_compress_tcp __P((struct ip *ip, u_int mlen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_pax.c | 194 size_t len, mlen; in eap_pax_check() local 203 mlen = sizeof(struct eap_hdr) + 1 + len; in eap_pax_check() 270 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN; in eap_pax_check()
|
/external/webkit/JavaScriptCore/runtime/ |
D | StringPrototype.cpp | 692 int mlen = ovector[1] - ovector[0]; in stringProtoFuncSplit() local 693 pos = mpos + (mlen == 0 ? 1 : mlen); in stringProtoFuncSplit() 694 if (mpos != p0 || mlen) { in stringProtoFuncSplit() 696 p0 = mpos + mlen; in stringProtoFuncSplit()
|
/external/libpcap/ |
D | gencode.c | 5268 register int nlen, mlen; local 5276 mlen = __pcap_atoin(s2, &m); 5278 m <<= 32 - mlen;
|