Searched refs:plen (Results 51 - 75 of 265) sorted by relevance

1234567891011

/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.c341 int plen; local
347 plen = ikev2_parse_proposal(&prop, pos, end);
348 if (plen < 0)
358 pos += plen;
878 size_t plen; local
916 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t;
917 WPA_PUT_BE16(t->transform_length, plen);
936 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p;
937 WPA_PUT_BE16(p->proposal_length, plen);
939 plen
950 size_t plen; local
986 size_t plen; local
1005 size_t plen; local
1031 size_t plen; local
1071 size_t plen; local
[all...]
/external/libppp/src/
H A Dpap.c89 int namelen, keylen, plen; local
93 plen = namelen + keylen + 2;
100 lh.length = htons(plen + sizeof(struct fsmheader));
101 bp = m_get(plen + sizeof(struct fsmheader), MB_PAPOUT);
119 int plen, mlen; local
124 plen = mlen + 1;
125 lh.length = htons(plen + sizeof(struct fsmheader));
126 bp = m_get(plen + sizeof(struct fsmheader), MB_PAPOUT);
/external/openssh/
H A Dcipher.c412 int plen = 0; local
415 plen = EVP_X_STATE_LEN(cc->evp);
417 return (plen);
418 memcpy(dat, EVP_X_STATE(cc->evp), plen);
420 return (plen);
427 int plen; local
430 plen = EVP_X_STATE_LEN(cc->evp);
431 memcpy(EVP_X_STATE(cc->evp), dat, plen);
/external/libnfc-nci/src/nfc/int/
H A Dnfc_int.h229 NFC_API extern void nfc_ncif_proc_discover_ntf (UINT8 *p, UINT16 plen);
234 NFC_API extern void nfc_ncif_proc_credits(UINT8 *p, UINT16 plen);
238 NFC_API extern void nfc_ncif_proc_ee_action (UINT8 *p, UINT16 plen);
239 NFC_API extern void nfc_ncif_proc_ee_discover_req (UINT8 *p, UINT16 plen);
242 NFC_API extern void nfc_ncif_proc_conn_create_rsp (UINT8 *p, UINT16 plen, UINT8 dest_type);
244 NFC_API extern void nfc_ncif_proc_t3t_polling_ntf (UINT8 *p, UINT16 plen);
/external/openssl/crypto/evp/
H A Dp5_crpt2.c177 int plen; local
190 plen = param->value.sequence->length;
191 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) {
236 int saltlen, iter, plen; local
260 plen = param->value.sequence->length;
262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Dikev2.c328 int plen; local
334 plen = ikev2_parse_proposal(data, &prop, pos, end);
335 if (plen < 0)
343 pos += plen;
913 size_t plen; local
939 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t;
940 WPA_PUT_BE16(t->transform_length, plen);
959 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p;
960 WPA_PUT_BE16(p->proposal_length, plen);
962 plen
973 size_t plen; local
1010 size_t plen; local
1029 size_t plen; local
1055 size_t plen; local
[all...]
H A Deap_md5.c108 size_t plen; local
119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
H A Deap_sake.c108 size_t plen; local
110 plen = sizeof(struct eap_sake_hdr) + length;
112 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
134 size_t plen; local
138 plen = 4;
140 plen += 2 + data->serverid_len;
141 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY);
165 size_t plen; local
177 plen = 2 + EAP_SAKE_RAND_LEN;
179 plen
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.c323 int plen; local
329 plen = ikev2_parse_proposal(data, &prop, pos, end);
330 if (plen < 0)
338 pos += plen;
908 size_t plen; local
934 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t;
935 WPA_PUT_BE16(t->transform_length, plen);
954 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p;
955 WPA_PUT_BE16(p->proposal_length, plen);
957 plen
968 size_t plen; local
1005 size_t plen; local
1024 size_t plen; local
1050 size_t plen; local
[all...]
H A Deap_server_md5.c103 size_t plen; local
114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
H A Deap_server_sake.c103 size_t plen; local
105 plen = sizeof(struct eap_sake_hdr) + length;
107 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
129 size_t plen; local
133 plen = 4;
135 plen += 2 + data->serverid_len;
136 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY);
160 size_t plen; local
172 plen = 2 + EAP_SAKE_RAND_LEN;
174 plen
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.c323 int plen; local
329 plen = ikev2_parse_proposal(data, &prop, pos, end);
330 if (plen < 0)
338 pos += plen;
908 size_t plen; local
934 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t;
935 WPA_PUT_BE16(t->transform_length, plen);
954 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p;
955 WPA_PUT_BE16(p->proposal_length, plen);
957 plen
968 size_t plen; local
1005 size_t plen; local
1024 size_t plen; local
1050 size_t plen; local
[all...]
H A Deap_server_md5.c103 size_t plen; local
114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
H A Deap_server_sake.c103 size_t plen; local
105 plen = sizeof(struct eap_sake_hdr) + length;
107 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
129 size_t plen; local
133 plen = 4;
135 plen += 2 + data->serverid_len;
136 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY);
160 size_t plen; local
172 plen = 2 + EAP_SAKE_RAND_LEN;
174 plen
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.c323 int plen; local
329 plen = ikev2_parse_proposal(data, &prop, pos, end);
330 if (plen < 0)
338 pos += plen;
908 size_t plen; local
934 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t;
935 WPA_PUT_BE16(t->transform_length, plen);
954 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p;
955 WPA_PUT_BE16(p->proposal_length, plen);
957 plen
968 size_t plen; local
1005 size_t plen; local
1024 size_t plen; local
1050 size_t plen; local
[all...]
H A Deap_server_md5.c103 size_t plen; local
114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
H A Deap_server_sake.c103 size_t plen; local
105 plen = sizeof(struct eap_sake_hdr) + length;
107 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
129 size_t plen; local
133 plen = 4;
135 plen += 2 + data->serverid_len;
136 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY);
160 size_t plen; local
172 plen = 2 + EAP_SAKE_RAND_LEN;
174 plen
[all...]
/external/ppp/pppd/plugins/rp-pppoe/
H A Ddiscovery.c250 UINT16_t plen; local
255 plen = TAG_HDR_SIZE + namelen;
256 CHECK_ROOM(cursor, packet.payload, plen);
287 plen += sizeof(pid) + TAG_HDR_SIZE;
290 packet.length = htons(plen);
292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
421 UINT16_t plen; local
426 plen = TAG_HDR_SIZE + namelen;
427 CHECK_ROOM(cursor, packet.payload, plen);
455 plen
[all...]
H A Dcommon.c401 UINT16_t plen = 0; local
431 plen += sizeof(pid) + TAG_HDR_SIZE;
443 plen += elen + TAG_HDR_SIZE;
452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE;
460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE;
463 packet.length = htons(plen);
464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
/external/qemu/hw/
H A Dbt-hci-csr.c137 ((struct hci_event_hdr *) ret)->plen = len;
281 return (((struct hci_command_hdr *) pkt)->plen + 1) & ~1;
283 return ((struct hci_command_hdr *) pkt)->plen;
285 return ((struct hci_event_hdr *) pkt)->plen;
302 int plen = s->in_len; local
308 memcpy(s->inpkt + plen, buf, len);
311 if (s->in_len >= 2 && plen < 2)
314 if (s->in_len >= s->in_hdr && plen < s->in_hdr)
324 plen = 0;
/external/openssl/crypto/rand/
H A Drand_lib.c267 size_t plen; local
283 plen = drbg_get_adin(dctx, &p);
284 memcpy(pers + 16, p, plen);
/external/tcpdump/
H A Dprint-icmp.c334 icmp_print(const u_char *bp, u_int plen, const u_char *bp2, int fragmented) argument
560 (void)printf("ICMP %s, length %u", str, plen);
563 if (TTEST2(*bp, plen)) {
564 sum = in_cksum((u_short*)dp, plen, 0);
591 if (vflag >= 1 && plen > ICMP_EXTD_MINLEN && ICMP_MPLS_EXT_TYPE(dp->icmp_type)) {
603 plen - ICMP_EXTD_MINLEN, 0)) {
619 hlen = plen - ICMP_EXTD_MINLEN;
623 plen - ICMP_EXTD_MINLEN, 0) ? "in" : "",
/external/icu4c/i18n/
H A Dbmsearch.cpp387 int32_t plen = patternCEs.size(); local
390 if (U_FAILURE(status) || plen == 0) {
394 int32_t *history = NEW_ARRAY(int32_t, plen);
401 for (int32_t i = 0; i < plen; i += 1) {
405 minLengthCache = NEW_ARRAY(int32_t, plen + 1);
419 for(int32_t p = 1; p < plen; p += 1) {
429 minLengthCache[plen] = 0;
431 for(int32_t p = 0; p < plen - 1; p += 1) {
661 int32_t plen = patCEs->size(); local
666 if (plen <
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c506 size_t alen, plen, i, list_len; local
627 plen = WPA_GET_BE16(apos);
630 if (plen > alen) {
634 (unsigned long) plen,
640 attr->identity_len = plen;
765 plen = apos[0] * 256 + apos[1];
766 if (plen > alen - 2) {
770 (unsigned long) plen,
775 attr->next_pseudonym_len = plen;
785 plen
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c501 size_t alen, plen, i, list_len; local
622 plen = WPA_GET_BE16(apos);
625 if (plen > alen) {
629 (unsigned long) plen,
635 attr->identity_len = plen;
760 plen = apos[0] * 256 + apos[1];
761 if (plen > alen - 2) {
765 (unsigned long) plen,
770 attr->next_pseudonym_len = plen;
780 plen
[all...]

Completed in 364 milliseconds

1234567891011