/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | bgscan.c | 38 size_t nlen; local 49 nlen = os_strlen(name); 51 nlen = params - name; 56 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) {
|
/external/zlib/contrib/infback9/ |
H A D | inflate9.h | 40 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 30 size_t nlen; local 36 nlen = i_nonce_len + r_nonce_len; 37 nonces = os_malloc(nlen); 43 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_ikev2_common.c | 24 size_t nlen; local 30 nlen = i_nonce_len + r_nonce_len; 31 nonces = os_malloc(nlen); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_ikev2_common.c | 24 size_t nlen; local 30 nlen = i_nonce_len + r_nonce_len; 31 nonces = os_malloc(nlen); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 24 size_t nlen; local 30 nlen = i_nonce_len + r_nonce_len; 31 nonces = os_malloc(nlen); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/external/openssl/crypto/modes/ |
H A D | ccm128.c | 77 const unsigned char *nonce,size_t nlen,size_t mlen) 81 if (nlen<(14-L)) return -1; /* nonce is too short */ 76 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce,size_t nlen,size_t mlen) argument
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_parse.c | 22 size_t i, nlen; local 150 nlen = WPA_GET_BE16(pos); 152 if (data + len - pos < (int) nlen || nlen > 32) { 154 "length %d (buf len %d)", (int) nlen, 158 os_memcpy(msg->device_name, pos, nlen); 159 msg->device_name[nlen] = '\0'; 160 for (i = 0; i < nlen; i++) {
|
H A D | p2p_build.c | 154 size_t nlen, i; local 194 nlen = p2p->cfg->dev_name ? os_strlen(p2p->cfg->dev_name) : 0; 196 wpabuf_put_be16(buf, nlen); 197 wpabuf_put_data(buf, p2p->cfg->dev_name, nlen);
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_parse.c | 22 size_t i, nlen; local 150 nlen = WPA_GET_BE16(pos); 152 if (data + len - pos < (int) nlen || nlen > 32) { 154 "length %d (buf len %d)", (int) nlen, 158 os_memcpy(msg->device_name, pos, nlen); 159 msg->device_name[nlen] = '\0'; 160 for (i = 0; i < nlen; i++) {
|
H A D | p2p_build.c | 154 size_t nlen, i; local 194 nlen = p2p->cfg->dev_name ? os_strlen(p2p->cfg->dev_name) : 0; 196 wpabuf_put_be16(buf, nlen); 197 wpabuf_put_data(buf, p2p->cfg->dev_name, nlen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_parse.c | 22 size_t i, nlen; local 150 nlen = WPA_GET_BE16(pos); 152 if (data + len - pos < (int) nlen || nlen > 32) { 154 "length %d (buf len %d)", (int) nlen, 158 os_memcpy(msg->device_name, pos, nlen); 159 msg->device_name[nlen] = '\0'; 160 for (i = 0; i < nlen; i++) {
|
H A D | p2p_build.c | 154 size_t nlen, i; local 194 nlen = p2p->cfg->dev_name ? os_strlen(p2p->cfg->dev_name) : 0; 196 wpabuf_put_be16(buf, nlen); 197 wpabuf_put_data(buf, p2p->cfg->dev_name, nlen);
|
/external/openssh/ |
H A D | auth-options.c | 436 u_int nlen, dlen, clen; local 447 if ((name = buffer_get_cstring_ret(&c, &nlen)) == NULL || 455 if (strlen(name) != nlen) {
|
/external/qemu/distrib/zlib-1.2.3/ |
H A D | inflate.h | 108 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
|
/external/zlib/contrib/puff/ |
H A D | puff.c | 646 * - Given the number of literal/length code lengths (nlen) and distance code 647 * lengths (ndist), then they are treated as one long list of nlen + ndist 666 int nlen, ndist, ncode; /* number of lengths in descriptor */ local 683 nlen = bits(s, 5) + 257; 686 if (nlen > MAXLCODES || ndist > MAXDCODES) 702 while (index < nlen + ndist) { 721 if (index + symbol > nlen + ndist) 733 err = construct(&lencode, lengths, nlen); 734 if (err && (err < 0 || nlen != lencode.count[0] + lencode.count[1])) 738 err = construct(&distcode, lengths + nlen, ndis [all...] |
/external/openssl/crypto/pem/ |
H A D | pem_lib.c | 590 int nlen,n,i,j,outl; local 596 nlen=strlen(name); 599 (BIO_write(bp,name,nlen) != nlen) || 635 (BIO_write(bp,name,nlen) != nlen) ||
|
/external/ppp/pppd/ |
H A D | chap-new.c | 285 int clen = 1, nlen, len; local 293 nlen = strlen(ss->name); 294 memcpy(p + 1 + clen, ss->name, nlen); 296 len = CHAP_HDRLEN + 1 + clen + nlen; 426 int clen, nlen; local 438 nlen = len - (clen + 1); 441 slprintf(rname, sizeof(rname), "%.*v", nlen, pkt + clen + 1); 462 nlen = strlen(cs->name); 463 memcpy(p + clen + 1, cs->name, nlen); 466 len = CHAP_HDRLEN + clen + 1 + nlen; 576 int clen, nlen; local [all...] |
/external/zlib/ |
H A D | inflate.h | 112 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | httpbase.cc | 162 size_t nlen = (value - line); local 168 if (MatchHeader(line, nlen, HH_CONTENT_LENGTH)) { 175 } else if (MatchHeader(line, nlen, HH_TRANSFER_ENCODING)) { 185 return ProcessHeader(line, nlen, value, vlen, error); 833 HttpBase::ProcessHeader(const char* name, size_t nlen, const char* value, argument 835 std::string sname(name, nlen), svalue(value, vlen);
|
/external/tcpdump/ |
H A D | addrtoname.c | 350 * with length 'nlen' 354 lookup_bytestring(register const u_char *bs, const unsigned int nlen) argument 359 if (nlen >= 6) { 363 } else if (nlen >= 4) { 375 memcmp((const char *)bs, (const char *)(tp->e_bs), nlen) == 0) 384 tp->e_bs = (u_char *) calloc(1, nlen + 1); 385 memcpy(tp->e_bs, bs, nlen); 399 unsigned int nlen = *nsap; local 401 const u_char *ensap = nsap + nlen - 6; 403 if (nlen > [all...] |
/external/libsepol/src/ |
H A D | services.c | 583 size_t slen, tlen, nlen; local 587 context_to_string(NULL, policydb, newcontext, &n, &nlen);
|
/external/mksh/src/ |
H A D | var.c | 584 int olen, nlen; local 594 nlen = vp->u2.field; 596 nlen = olen; 598 p = alloc((psiz = nlen * /* MB_LEN_MAX */ 3 + 1), ATEMP); 641 shf_snprintf(p, nlen + 1, "%-*.*s",
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.c | 394 int nlen = msg->attr_size * 2; local 397 nlen * sizeof(*msg->attr_pos)); 402 msg->attr_size = nlen; 428 size_t nlen = msg->buf_size; local 430 while (nlen < buf_needed) 431 nlen *= 2; 432 nbuf = os_realloc(msg->buf, nlen); 437 os_memset(msg->buf + msg->buf_size, 0, nlen - msg->buf_size); 438 msg->buf_size = nlen;
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 435 int nlen = msg->attr_size * 2; local 438 nlen * sizeof(*msg->attr_pos)); 443 msg->attr_size = nlen;
|