/dports/net/tshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-rtcp.c | 3710 gint16 extension_length; in dissect_rtcp_profile_specific_extensions() local 3719 extension_length = tvb_get_ntohs (tvb, offset+2); in dissect_rtcp_profile_specific_extensions() 3720 if (extension_length < 4) { in dissect_rtcp_profile_specific_extensions() 3721 extension_length = 4; /* expert info? */ in dissect_rtcp_profile_specific_extensions() 3724 …pse_tree = proto_tree_add_subtree(tree, tvb, offset, extension_length, ett_pse, &pse_item, "Payloa… in dissect_rtcp_profile_specific_extensions() 3746 if (extension_length == 16) in dissect_rtcp_profile_specific_extensions() 3828 extension_length - 4, ENC_NA); in dissect_rtcp_profile_specific_extensions() 3831 remaining -= extension_length; in dissect_rtcp_profile_specific_extensions() 3832 offset += extension_length - 4; in dissect_rtcp_profile_specific_extensions()
|
H A D | packet-reload.c | 3814 guint32 extension_length; in dissect_reload_messagecontents() local 3816 extension_length = tvb_get_ntohl(tvb, offset+extension_offset+3); in dissect_reload_messagecontents() 3817 if (extension_length > 0) { in dissect_reload_messagecontents() 3825 guint32 extension_length; in dissect_reload_messagecontents() local 3827 extension_length = tvb_get_ntohl(tvb, offset+extension_offset+3); in dissect_reload_messagecontents() 3828 if ((extension_length > 0) && (MSGCODE_TO_METHOD(message_code) == METHOD_PING)) { in dissect_reload_messagecontents() 3830 …t_diagnosticrequest(-1, tvb, pinfo, extension_tree, offset+extension_offset+3+4, extension_length); in dissect_reload_messagecontents() 3833 …_diagnosticresponse(-1, tvb, pinfo, extension_tree, offset+extension_offset+3+4, extension_length); in dissect_reload_messagecontents()
|
H A D | packet-gsm_rlcmac.h | 866 guint8 extension_length; member
|
H A D | packet-gsm_rlcmac.c | 2449 M_UINT_OFFSET (Extension_Bits_t, extension_length, 6, 1, &hf_si_length), 2450 M_LEFT_VAR_BMP(Extension_Bits_t, Extension_Info, extension_length, 0, &hf_si_rest_bitmap),
|
/dports/emulators/mess/mame-mame0226/src/tools/imgtool/ |
H A D | imgtool.h | 267 …_padded_filename(const char *source, size_t filename_length, size_t extension_length, char pad = '…
|
H A D | imgtool.cpp | 101 …ract_padded_filename(const char *source, size_t filename_length, size_t extension_length, char pad) in extract_padded_filename() argument 104 std::string extension = extract_padded_string(source + filename_length, extension_length, pad); in extract_padded_filename()
|
/dports/emulators/mame/mame-mame0226/src/tools/imgtool/ |
H A D | imgtool.h | 267 …_padded_filename(const char *source, size_t filename_length, size_t extension_length, char pad = '…
|
H A D | imgtool.cpp | 101 …ract_padded_filename(const char *source, size_t filename_length, size_t extension_length, char pad) in extract_padded_filename() argument 104 std::string extension = extract_padded_string(source + filename_length, extension_length, pad); in extract_padded_filename()
|
/dports/lang/seed7/seed7/src/ |
H A D | sql_fire.c | 3578 memSizeType extension_length; in doAttach() local 3589 extension_length = strlen(extension); in doAttach() 3590 if (loginData->fileName8Length < extension_length || in doAttach() 3591 memcmp(&loginData->fileName8[loginData->fileName8Length - extension_length], in doAttach() 3592 extension, extension_length) != 0) { in doAttach() 3593 fileName8Length = loginData->fileName8Length + extension_length; in doAttach() 3599 memcpy(&fileName8[loginData->fileName8Length], extension, extension_length); in doAttach()
|
/dports/games/egoboo/egoboo-2.8.1/src/game/ |
H A D | egoboo_vfs.c | 1599 size_t extension_length = strlen(( *pctxt )->ext ); in _vfs_search() local 1646 if ((( signed )string_length - ( signed )extension_length ) >= 0 ) in _vfs_search() 1648 sztest += ( string_length - extension_length ); in _vfs_search()
|
/dports/net/wireshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-reload.c | 3814 guint32 extension_length; 3816 extension_length = tvb_get_ntohl(tvb, offset+extension_offset+3); 3817 if (extension_length > 0) { 3825 guint32 extension_length; 3827 extension_length = tvb_get_ntohl(tvb, offset+extension_offset+3); 3828 if ((extension_length > 0) && (MSGCODE_TO_METHOD(message_code) == METHOD_PING)) { 3830 …t_diagnosticrequest(-1, tvb, pinfo, extension_tree, offset+extension_offset+3+4, extension_length); 3833 …_diagnosticresponse(-1, tvb, pinfo, extension_tree, offset+extension_offset+3+4, extension_length);
|
H A D | packet-gsm_rlcmac.h | 866 guint8 extension_length; member
|
H A D | packet-gsm_rlcmac.c | 2449 M_UINT_OFFSET (Extension_Bits_t, extension_length, 6, 1, &hf_si_length), 2450 M_LEFT_VAR_BMP(Extension_Bits_t, Extension_Info, extension_length, 0, &hf_si_rest_bitmap),
|
/dports/net/wireshark/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-reload.c | 3814 guint32 extension_length; in dissect_reload_messagecontents() local 3816 extension_length = tvb_get_ntohl(tvb, offset+extension_offset+3); in dissect_reload_messagecontents() 3817 if (extension_length > 0) { in dissect_reload_messagecontents() 3825 guint32 extension_length; in dissect_reload_messagecontents() local 3827 extension_length = tvb_get_ntohl(tvb, offset+extension_offset+3); in dissect_reload_messagecontents() 3828 if ((extension_length > 0) && (MSGCODE_TO_METHOD(message_code) == METHOD_PING)) { in dissect_reload_messagecontents() 3830 …t_diagnosticrequest(-1, tvb, pinfo, extension_tree, offset+extension_offset+3+4, extension_length); in dissect_reload_messagecontents() 3833 …_diagnosticresponse(-1, tvb, pinfo, extension_tree, offset+extension_offset+3+4, extension_length); in dissect_reload_messagecontents()
|
H A D | packet-gsm_rlcmac.h | 866 guint8 extension_length; member
|
H A D | packet-gsm_rlcmac.c | 2449 M_UINT_OFFSET (Extension_Bits_t, extension_length, 6, 1, &hf_si_length), 2450 M_LEFT_VAR_BMP(Extension_Bits_t, Extension_Info, extension_length, 0, &hf_si_rest_bitmap),
|
/dports/net/tshark-lite/wireshark-3.6.1/epan/dissectors/ |
H A D | packet-reload.c | 3814 guint32 extension_length; in dissect_reload_messagecontents() local 3816 extension_length = tvb_get_ntohl(tvb, offset+extension_offset+3); in dissect_reload_messagecontents() 3817 if (extension_length > 0) { in dissect_reload_messagecontents() 3825 guint32 extension_length; in dissect_reload_messagecontents() local 3827 extension_length = tvb_get_ntohl(tvb, offset+extension_offset+3); in dissect_reload_messagecontents() 3828 if ((extension_length > 0) && (MSGCODE_TO_METHOD(message_code) == METHOD_PING)) { in dissect_reload_messagecontents() 3830 …t_diagnosticrequest(-1, tvb, pinfo, extension_tree, offset+extension_offset+3+4, extension_length); in dissect_reload_messagecontents() 3833 …_diagnosticresponse(-1, tvb, pinfo, extension_tree, offset+extension_offset+3+4, extension_length); in dissect_reload_messagecontents()
|
H A D | packet-gsm_rlcmac.h | 866 guint8 extension_length; member
|
H A D | packet-gsm_rlcmac.c | 2449 M_UINT_OFFSET (Extension_Bits_t, extension_length, 6, 1, &hf_si_length), 2450 M_LEFT_VAR_BMP(Extension_Bits_t, Extension_Info, extension_length, 0, &hf_si_rest_bitmap),
|
/dports/editors/the/THE-3.3RC4/ |
H A D | parser.c | 1638 if ( len >= FILE_START + curr->extension_length ) 1640 start = len - curr->extension_length; 1643 if ( memcmp( work+start, curr->extension, curr->extension_length ) == 0 ) 1653 if ( memcmpi( work+start, curr->extension, curr->extension_length ) == 0 ) 4175 parser->current_extension->extension_length = strlen((DEFCHAR *)word[i]); 4176 …extension = (CHARTYPE *)(*the_malloc)((1+parser->current_extension->extension_length)*sizeof(CHART…
|
H A D | the.h | 1214 short extension_length; member
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ssl/ |
H A D | ssl3con.c | 8378 PRInt32 extension_length; in ssl3_HandleClientHello() local 8379 extension_length = ssl3_ConsumeHandshakeNumber(ss, 2, &b, &length); in ssl3_HandleClientHello() 8380 if (extension_length < 0) { in ssl3_HandleClientHello() 8383 if (extension_length != length) { in ssl3_HandleClientHello()
|