/external/bluetooth/hcidump/parser/ |
H A D | hcrp.c | 85 uint16_t pid, tid, plen, status; local 90 plen = get_u16(frm); 94 printf("HCRP %s %s: tid 0x%x plen %d", 95 pid2str(pid), frm->in ? "rsp" : "cmd", tid, plen);
|
/external/srec/srec/Nametag/src/ |
H A D | Nametag.c | 36 ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t* plen) argument 38 if (self == NULL || pvalue == NULL || plen == NULL) 43 return self->getValue(self, pvalue, plen);
|
H A D | NametagImpl.c | 202 ESR_ReturnCode SR_Nametag_GetValue(const SR_Nametag* self, const char** pvalue, size_t* plen) argument 209 *plen = impl->value_len;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
H A D | sha1.c | 125 size_t pos, plen; local 140 plen = buf_len - pos; 141 if (plen >= SHA1_MAC_LEN) { 150 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha256.c | 120 size_t pos, plen; local 138 plen = buf_len - pos; 140 if (plen >= SHA256_MAC_LEN) { 146 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
/external/qemu/ |
H A D | net-checksum.c | 58 int hlen, plen, proto, csum_offset; local 64 plen = (data[16] << 8 | data[17]) - hlen; 78 if (plen < csum_offset+2) 83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_common.c | 26 * @plen: Pointer to variable to contain the returned payload length 33 * caller can just use the returned payload pointer (into *plen) for processing 38 const struct wpabuf *msg, size_t *plen) 78 *plen = len - sizeof(*hdr) - 8; 85 *plen = len - sizeof(*hdr) - 1; 37 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
H A D | eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.c | 20 * @plen: Pointer to variable to contain the returned payload length 27 * caller can just use the returned payload pointer (into *plen) for processing 32 const struct wpabuf *msg, size_t *plen) 72 *plen = len - sizeof(*hdr) - 8; 79 *plen = len - sizeof(*hdr) - 1; 31 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
H A D | eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.c | 20 * @plen: Pointer to variable to contain the returned payload length 27 * caller can just use the returned payload pointer (into *plen) for processing 32 const struct wpabuf *msg, size_t *plen) 72 *plen = len - sizeof(*hdr) - 8; 79 *plen = len - sizeof(*hdr) - 1; 31 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
H A D | eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_common.c | 20 * @plen: Pointer to variable to contain the returned payload length 27 * caller can just use the returned payload pointer (into *plen) for processing 32 const struct wpabuf *msg, size_t *plen) 72 *plen = len - sizeof(*hdr) - 8; 79 *plen = len - sizeof(*hdr) - 1; 31 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
H A D | eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
/external/openssh/ |
H A D | auth2-gss.c | 50 static void input_gssapi_token(int type, u_int32_t plen, void *ctxt); 51 static void input_gssapi_mic(int type, u_int32_t plen, void *ctxt); 52 static void input_gssapi_exchange_complete(int type, u_int32_t plen, void *ctxt); 135 input_gssapi_token(int type, u_int32_t plen, void *ctxt) argument 189 input_gssapi_errtok(int type, u_int32_t plen, void *ctxt) argument 229 input_gssapi_exchange_complete(int type, u_int32_t plen, void *ctxt) argument 258 input_gssapi_mic(int type, u_int32_t plen, void *ctxt) argument
|
/external/openssl/crypto/asn1/ |
H A D | bio_ndef.c | 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 175 *plen = *ndef_aux->boundary - *pbuf; 180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 194 *plen = 0; 198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 201 if (!ndef_prefix_free(b, pbuf, plen, par 208 ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_md5.c | 108 size_t plen; local 119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|