/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 101 u8 id, u8 op_code, size_t plen) 107 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 130 size_t left, plen; local 196 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 198 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 100 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
|
H A D | eap.c | 1063 size_t plen; local 1076 plen = be_to_host16(hdr->length); 1077 if (plen > wpabuf_len(req)) { 1079 "(len=%lu plen=%lu)", 1081 (unsigned long) plen); 1090 md5_vector(1, addr, &plen, sm->req_md5); 1095 if (plen < sizeof(*hdr) + 1) { 1104 if (plen < sizeof(*hdr) + 8) { 1106 "expanded EAP-Packet (plen=%lu)", 1107 (unsigned long) plen); [all...] |
H A D | eap_psk.c | 191 size_t buflen, left, data_len, len, plen; local 319 plen = sizeof(*hdr4) + 4 + 16 + data_len; 320 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 125 size_t plen; local 127 plen = length + sizeof(struct eap_sake_hdr); 129 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pax.c | 94 u8 id, u8 op_code, size_t plen) 100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 123 size_t left, plen; local 189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
|
H A D | eap_psk.c | 186 size_t buflen, left, data_len, len, plen; local 314 plen = sizeof(*hdr4) + 4 + 16 + data_len; 315 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
H A D | eap_wsc.c | 273 size_t send_len, plen; local 289 plen = 2 + send_len; 291 plen += 2; 292 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pax.c | 94 u8 id, u8 op_code, size_t plen) 100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 123 size_t left, plen; local 189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
|
H A D | eap_psk.c | 186 size_t buflen, left, data_len, len, plen; local 314 plen = sizeof(*hdr4) + 4 + 16 + data_len; 315 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
H A D | eap_wsc.c | 273 size_t send_len, plen; local 289 plen = 2 + send_len; 291 plen += 2; 292 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 558 size_t plen; local 567 plen = be_to_host16(hdr->length); 577 if (plen > len - sizeof(*hdr) || plen < sizeof(*key)) { 580 (unsigned long) plen, (unsigned long) len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 94 u8 id, u8 op_code, size_t plen) 100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 123 size_t left, plen; local 189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
|
H A D | eap_psk.c | 186 size_t buflen, left, data_len, len, plen; local 314 plen = sizeof(*hdr4) + 4 + 16 + data_len; 315 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
H A D | eap_wsc.c | 273 size_t send_len, plen; local 289 plen = 2 + send_len; 291 plen += 2; 292 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1153 size_t plen; local 1168 plen = be_to_host16(hdr->length); 1169 if (plen > len - sizeof(*hdr)) { 1175 plen < len - sizeof(*hdr) && 1183 if (elen > plen && elen <= len - sizeof(*hdr)) { 1193 "%d -> %d", (int) plen, elen); 1194 plen = elen; 1198 data_len = plen + sizeof(*hdr); 1210 sm->eapReqData = wpabuf_alloc_copy(hdr + 1, plen); 1219 if (plen < sizeo [all...] |
/external/dropbear/ |
H A D | svr-chansession.c | 1027 int plen, vlen; local 1029 plen = strlen(param); 1032 newvar = m_malloc(plen + vlen + 2); /* 2 is for '=' and '\0' */ 1033 memcpy(newvar, param, plen); 1034 newvar[plen] = '='; 1035 memcpy(&newvar[plen+1], var, vlen); 1036 newvar[plen+vlen+1] = '\0';
|
/external/iproute2/lib/ |
H A D | utils.c | 328 unsigned plen; local 362 if (get_netmask(&plen, slash+1, 0) 363 || plen > dst->bitlen) { 368 dst->bitlen = plen;
|
/external/ipsec-tools/src/libipsec/ |
H A D | pfkey_dump.c | 701 int plen; local 705 plen = sizeof(struct in_addr) << 3; 708 plen = sizeof(struct in6_addr) << 3; 714 if (pref == plen)
|
/external/ppp/pppd/ |
H A D | chap-new.c | 132 static int chap_print_pkt(unsigned char *p, int plen, 572 chap_print_pkt(unsigned char *p, int plen, argument 579 if (plen < CHAP_HDRLEN) 584 if (len < CHAP_HDRLEN || len > plen)
|
/external/webkit/Source/WebKit/mac/Plugins/ |
H A D | npapi.mm | 204 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char *realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) 212 password:password passwordLength:plen];
|
/external/mksh/src/ |
H A D | misc.c | 1461 size_t len, plen = 0; local 1488 plen = pend - plist; 1492 if ((!use_cdpath || !plen || plist[0] != '/') && 1502 if (use_cdpath && plen) { 1503 XcheckN(*xsp, xp, plen); 1504 memcpy(xp, plist, plen); 1505 xp += plen; 1506 if (plist[plen - 1] != '/')
|
/external/openssh/ |
H A D | monitor_wrap.c | 600 u_int bloblen, plen; local 666 plen = packet_get_keycontext(MODE_OUT, NULL); 667 p = xmalloc(plen+1); 669 buffer_put_string(&m, p, plen); 672 plen = packet_get_keycontext(MODE_IN, NULL); 673 p = xmalloc(plen+1); 675 buffer_put_string(&m, p, plen);
|