/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 341 int plen; local 347 plen = ikev2_parse_proposal(&prop, pos, end); 348 if (plen < 0) 358 pos += plen; 878 size_t plen; local 916 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 917 WPA_PUT_BE16(t->transform_length, plen); 936 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 937 WPA_PUT_BE16(p->proposal_length, plen); 939 plen 950 size_t plen; local 986 size_t plen; local 1005 size_t plen; local 1031 size_t plen; local 1071 size_t plen; local [all...] |
/external/libppp/src/ |
H A D | pap.c | 89 int namelen, keylen, plen; local 93 plen = namelen + keylen + 2; 100 lh.length = htons(plen + sizeof(struct fsmheader)); 101 bp = m_get(plen + sizeof(struct fsmheader), MB_PAPOUT); 119 int plen, mlen; local 124 plen = mlen + 1; 125 lh.length = htons(plen + sizeof(struct fsmheader)); 126 bp = m_get(plen + sizeof(struct fsmheader), MB_PAPOUT);
|
/external/openssh/ |
H A D | cipher.c | 412 int plen = 0; local 415 plen = EVP_X_STATE_LEN(cc->evp); 417 return (plen); 418 memcpy(dat, EVP_X_STATE(cc->evp), plen); 420 return (plen); 427 int plen; local 430 plen = EVP_X_STATE_LEN(cc->evp); 431 memcpy(EVP_X_STATE(cc->evp), dat, plen);
|
/external/libnfc-nci/src/nfc/int/ |
H A D | nfc_int.h | 229 NFC_API extern void nfc_ncif_proc_discover_ntf (UINT8 *p, UINT16 plen); 234 NFC_API extern void nfc_ncif_proc_credits(UINT8 *p, UINT16 plen); 238 NFC_API extern void nfc_ncif_proc_ee_action (UINT8 *p, UINT16 plen); 239 NFC_API extern void nfc_ncif_proc_ee_discover_req (UINT8 *p, UINT16 plen); 242 NFC_API extern void nfc_ncif_proc_conn_create_rsp (UINT8 *p, UINT16 plen, UINT8 dest_type); 244 NFC_API extern void nfc_ncif_proc_t3t_polling_ntf (UINT8 *p, UINT16 plen);
|
/external/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 177 int plen; local 190 plen = param->value.sequence->length; 191 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 236 int saltlen, iter, plen; local 260 plen = param->value.sequence->length; 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 328 int plen; local 334 plen = ikev2_parse_proposal(data, &prop, pos, end); 335 if (plen < 0) 343 pos += plen; 913 size_t plen; local 939 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 940 WPA_PUT_BE16(t->transform_length, plen); 959 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 960 WPA_PUT_BE16(p->proposal_length, plen); 962 plen 973 size_t plen; local 1010 size_t plen; local 1029 size_t plen; local 1055 size_t plen; local [all...] |
H A D | eap_md5.c | 108 size_t plen; local 119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
H A D | eap_sake.c | 108 size_t plen; local 110 plen = sizeof(struct eap_sake_hdr) + length; 112 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen, 134 size_t plen; local 138 plen = 4; 140 plen += 2 + data->serverid_len; 141 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY); 165 size_t plen; local 177 plen = 2 + EAP_SAKE_RAND_LEN; 179 plen [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 323 int plen; local 329 plen = ikev2_parse_proposal(data, &prop, pos, end); 330 if (plen < 0) 338 pos += plen; 908 size_t plen; local 934 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 935 WPA_PUT_BE16(t->transform_length, plen); 954 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 955 WPA_PUT_BE16(p->proposal_length, plen); 957 plen 968 size_t plen; local 1005 size_t plen; local 1024 size_t plen; local 1050 size_t plen; local [all...] |
H A D | eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
H A D | eap_server_sake.c | 103 size_t plen; local 105 plen = sizeof(struct eap_sake_hdr) + length; 107 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen, 129 size_t plen; local 133 plen = 4; 135 plen += 2 + data->serverid_len; 136 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY); 160 size_t plen; local 172 plen = 2 + EAP_SAKE_RAND_LEN; 174 plen [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.c | 323 int plen; local 329 plen = ikev2_parse_proposal(data, &prop, pos, end); 330 if (plen < 0) 338 pos += plen; 908 size_t plen; local 934 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 935 WPA_PUT_BE16(t->transform_length, plen); 954 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 955 WPA_PUT_BE16(p->proposal_length, plen); 957 plen 968 size_t plen; local 1005 size_t plen; local 1024 size_t plen; local 1050 size_t plen; local [all...] |
H A D | eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
H A D | eap_server_sake.c | 103 size_t plen; local 105 plen = sizeof(struct eap_sake_hdr) + length; 107 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen, 129 size_t plen; local 133 plen = 4; 135 plen += 2 + data->serverid_len; 136 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY); 160 size_t plen; local 172 plen = 2 + EAP_SAKE_RAND_LEN; 174 plen [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 323 int plen; local 329 plen = ikev2_parse_proposal(data, &prop, pos, end); 330 if (plen < 0) 338 pos += plen; 908 size_t plen; local 934 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 935 WPA_PUT_BE16(t->transform_length, plen); 954 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 955 WPA_PUT_BE16(p->proposal_length, plen); 957 plen 968 size_t plen; local 1005 size_t plen; local 1024 size_t plen; local 1050 size_t plen; local [all...] |
H A D | eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
H A D | eap_server_sake.c | 103 size_t plen; local 105 plen = sizeof(struct eap_sake_hdr) + length; 107 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen, 129 size_t plen; local 133 plen = 4; 135 plen += 2 + data->serverid_len; 136 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY); 160 size_t plen; local 172 plen = 2 + EAP_SAKE_RAND_LEN; 174 plen [all...] |
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | discovery.c | 250 UINT16_t plen; local 255 plen = TAG_HDR_SIZE + namelen; 256 CHECK_ROOM(cursor, packet.payload, plen); 287 plen += sizeof(pid) + TAG_HDR_SIZE; 290 packet.length = htons(plen); 292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE)); 421 UINT16_t plen; local 426 plen = TAG_HDR_SIZE + namelen; 427 CHECK_ROOM(cursor, packet.payload, plen); 455 plen [all...] |
H A D | common.c | 401 UINT16_t plen = 0; local 431 plen += sizeof(pid) + TAG_HDR_SIZE; 443 plen += elen + TAG_HDR_SIZE; 452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; 460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; 463 packet.length = htons(plen); 464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
|
/external/qemu/hw/ |
H A D | bt-hci-csr.c | 137 ((struct hci_event_hdr *) ret)->plen = len; 281 return (((struct hci_command_hdr *) pkt)->plen + 1) & ~1; 283 return ((struct hci_command_hdr *) pkt)->plen; 285 return ((struct hci_event_hdr *) pkt)->plen; 302 int plen = s->in_len; local 308 memcpy(s->inpkt + plen, buf, len); 311 if (s->in_len >= 2 && plen < 2) 314 if (s->in_len >= s->in_hdr && plen < s->in_hdr) 324 plen = 0;
|
/external/openssl/crypto/rand/ |
H A D | rand_lib.c | 267 size_t plen; local 283 plen = drbg_get_adin(dctx, &p); 284 memcpy(pers + 16, p, plen);
|
/external/tcpdump/ |
H A D | print-icmp.c | 334 icmp_print(const u_char *bp, u_int plen, const u_char *bp2, int fragmented) argument 560 (void)printf("ICMP %s, length %u", str, plen); 563 if (TTEST2(*bp, plen)) { 564 sum = in_cksum((u_short*)dp, plen, 0); 591 if (vflag >= 1 && plen > ICMP_EXTD_MINLEN && ICMP_MPLS_EXT_TYPE(dp->icmp_type)) { 603 plen - ICMP_EXTD_MINLEN, 0)) { 619 hlen = plen - ICMP_EXTD_MINLEN; 623 plen - ICMP_EXTD_MINLEN, 0) ? "in" : "",
|
/external/icu4c/i18n/ |
H A D | bmsearch.cpp | 387 int32_t plen = patternCEs.size(); local 390 if (U_FAILURE(status) || plen == 0) { 394 int32_t *history = NEW_ARRAY(int32_t, plen); 401 for (int32_t i = 0; i < plen; i += 1) { 405 minLengthCache = NEW_ARRAY(int32_t, plen + 1); 419 for(int32_t p = 1; p < plen; p += 1) { 429 minLengthCache[plen] = 0; 431 for(int32_t p = 0; p < plen - 1; p += 1) { 661 int32_t plen = patCEs->size(); local 666 if (plen < [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 506 size_t alen, plen, i, list_len; local 627 plen = WPA_GET_BE16(apos); 630 if (plen > alen) { 634 (unsigned long) plen, 640 attr->identity_len = plen; 765 plen = apos[0] * 256 + apos[1]; 766 if (plen > alen - 2) { 770 (unsigned long) plen, 775 attr->next_pseudonym_len = plen; 785 plen [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 501 size_t alen, plen, i, list_len; local 622 plen = WPA_GET_BE16(apos); 625 if (plen > alen) { 629 (unsigned long) plen, 635 attr->identity_len = plen; 760 plen = apos[0] * 256 + apos[1]; 761 if (plen > alen - 2) { 765 (unsigned long) plen, 770 attr->next_pseudonym_len = plen; 780 plen [all...] |