/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 501 size_t alen, plen, i, list_len; local 622 plen = WPA_GET_BE16(apos); 625 if (plen > alen) { 629 (unsigned long) plen, 635 attr->identity_len = plen; 760 plen = apos[0] * 256 + apos[1]; 761 if (plen > alen - 2) { 765 (unsigned long) plen, 770 attr->next_pseudonym_len = plen; 780 plen [all...] |
H A D | eap_sake_common.c | 214 size_t pos, plen; local 231 plen = buf_len - pos; 232 if (plen >= SHA1_MAC_LEN) { 239 os_memcpy(&buf[pos], hash, plen);
|
H A D | ikev2_common.c | 319 int plen, pdatalen; local 329 plen = WPA_GET_BE16(phdr->payload_length); 330 if (plen < (int) sizeof(*phdr) || pos + plen > end) { 332 "length %d", plen); 338 phdr->next_payload, phdr->flags, plen); 341 pdatalen = plen - sizeof(*phdr); 407 pos + plen == end) { 418 pos += plen; 597 size_t plen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 501 size_t alen, plen, i, list_len; local 622 plen = WPA_GET_BE16(apos); 625 if (plen > alen) { 629 (unsigned long) plen, 635 attr->identity_len = plen; 760 plen = apos[0] * 256 + apos[1]; 761 if (plen > alen - 2) { 765 (unsigned long) plen, 770 attr->next_pseudonym_len = plen; 780 plen [all...] |
H A D | eap_sake_common.c | 214 size_t pos, plen; local 231 plen = buf_len - pos; 232 if (plen >= SHA1_MAC_LEN) { 239 os_memcpy(&buf[pos], hash, plen);
|
/external/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 36 const unsigned char *param, int plen) 59 if (!EVP_Digest((void *)param, plen, db, NULL, EVP_sha1(), NULL)) 96 const unsigned char *param, int plen) 114 * for side-channel attacks (e.g. timing if 'plen' is huge 149 if (!EVP_Digest((void *)param, plen, phash, NULL, EVP_sha1(), NULL)) 34 RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen) argument 94 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) argument
|
/external/grub/stage2/ |
H A D | char_io.c | 313 int plen; local 341 if (section == 1 && plen + lpos < CMDLINE_WIDTH) 401 if (lpos + plen < CMDLINE_WIDTH) 404 section = ((lpos + plen - CMDLINE_WIDTH) 417 len -= plen; 418 pos += plen; 435 offset = xpos - plen; 438 xpos = lpos + plen; 449 + CMDLINE_WIDTH - plen - CMDLINE_MARGIN); 542 plen [all...] |
/external/dbus/tools/ |
H A D | dbus-launch-x11.c | 57 int plen; local 59 plen = strlen (prefix); 61 if (strncmp (s, prefix, plen) == 0) 63 memmove (s, s + plen, strlen (s) - plen + 1);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_cred.c | 75 size_t i, plen; local 77 plen = os_strlen(tag); 78 if (len < plen) 81 for (i = 0; i < len - plen; i++) { 82 if (os_memcmp(buf + i, tag, plen) == 0)
|
/external/dnsmasq/src/ |
H A D | forward.c | 206 HEADER *header, size_t plen, time_t now, struct frec *forward) 211 unsigned int crc = questions_crc(header, plen, daemon->namebuff); 213 unsigned short gotname = extract_request(header, plen, daemon->namebuff, NULL); 247 find_pseudoheader(header, plen, NULL, NULL, &is_sign); 323 if (sendto(fd, (char *)header, plen, 0, 334 daemon->packet_len = plen; 373 plen = setup_reply(header, plen, addrp, flags, daemon->local_ttl); 374 send_from(udpfd, daemon->options & OPT_NOWILD, (char *)header, plen, udpaddr, dst_addr, dst_iface); 385 size_t plen; local 204 forward_query(int udpfd, union mysockaddr *udpaddr, struct all_addr *dst_addr, unsigned int dst_iface, HEADER *header, size_t plen, time_t now, struct frec *forward) argument 502 size_t plen; local [all...] |
/external/libnfc-nci/src/nfc/nfc/ |
H A D | nfc_ncif.c | 571 void nfc_ncif_proc_credits(UINT8 *p, UINT16 plen) argument 710 void nfc_ncif_proc_discover_ntf (UINT8 *p, UINT16 plen) argument 992 void nfc_ncif_proc_ee_action (UINT8 *p, UINT16 plen) argument 1006 if (plen >= 3) 1007 plen -= 3; 1008 if (data_len > plen) 1009 data_len = (UINT8) plen; 1071 void nfc_ncif_proc_ee_discover_req (UINT8 *p, UINT16 plen) argument 1078 NFC_TRACE_DEBUG2 ("nfc_ncif_proc_ee_discover_req %d len:%d", *p, plen); 1085 if (plen) 1161 nfc_ncif_proc_conn_create_rsp(UINT8 *p, UINT16 plen, UINT8 dest_type) argument 1352 nfc_ncif_proc_t3t_polling_ntf(UINT8 *p, UINT16 plen) argument [all...] |
/external/libppp/src/ |
H A D | fsm.c | 191 int plen; local 210 plen = sizeof(struct fsmheader) + count; 213 lh.length = htons(plen); 214 bp = m_get(plen, mtype); 470 int plen, flen; local 475 plen = m_length(bp); 477 if (plen < flen) { 478 log_Printf(LogWARN, "%s: FsmRecvConfigReq: plen (%d) < flen (%d)\n", 479 fp->link->name, plen, flen); 613 int plen, fle local 676 int plen, flen; local 806 size_t plen; local [all...] |
/external/openssh/ |
H A D | auth-pam.c | 719 size_t plen; local 730 plen = 0; 740 len = plen + mlen + 1; 742 strlcpy(**prompts + plen, msg, len - plen); 743 plen += mlen; 750 len = plen + mlen + 2; 752 strlcpy(**prompts + plen, msg, len - plen); 753 plen [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | sha1.c | 127 size_t pos, plen; local 142 plen = buf_len - pos; 143 if (plen >= SHA1_MAC_LEN) { 150 os_memcpy(&buf[pos], hash, plen); 176 size_t pos, plen; local 199 plen = buf_len - pos; 201 if (plen >= SHA1_MAC_LEN) { 205 os_memcpy(&buf[pos], hash, plen); 361 size_t left = buflen, plen; local 368 plen [all...] |
H A D | sha256.c | 126 size_t pos, plen; local 144 plen = buf_len - pos; 146 if (plen >= SHA256_MAC_LEN) { 152 os_memcpy(&buf[pos], hash, plen);
|
/external/qemu/hw/ |
H A D | bt-hid.c | 185 int plen; local 188 plen = MIN(len, ch->remote_mtu - 1); 189 pkt = ch->sdu_out(ch, plen + 1); 192 if (plen) 193 memcpy(pkt + 1, data, plen); 196 len -= plen; 197 data += plen; 199 } while (plen == ch->remote_mtu - 1);
|
/external/ppp/pppd/ |
H A D | cbcp.c | 227 cbcp_printpkt(p, plen, printer, arg) 229 int plen; 236 if (plen < HEADERLEN) 242 if (len < HEADERLEN || len > plen)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 220 size_t pos, plen; local 237 plen = buf_len - pos; 238 if (plen >= SHA1_MAC_LEN) { 245 os_memcpy(&buf[pos], hash, plen);
|
H A D | ikev2_common.c | 324 int plen, pdatalen; local 334 plen = WPA_GET_BE16(phdr->payload_length); 335 if (plen < (int) sizeof(*phdr) || pos + plen > end) { 337 "length %d", plen); 343 phdr->next_payload, phdr->flags, plen); 346 pdatalen = plen - sizeof(*phdr); 412 pos + plen == end) { 423 pos += plen; 602 size_t plen; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_tls_common.c | 114 size_t send_len, plen; local 133 plen = 1 + send_len; 135 plen += 4; 137 req = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, plen,
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.c | 214 size_t pos, plen; local 231 plen = buf_len - pos; 232 if (plen >= SHA1_MAC_LEN) { 239 os_memcpy(&buf[pos], hash, plen);
|
H A D | ikev2_common.c | 319 int plen, pdatalen; local 329 plen = WPA_GET_BE16(phdr->payload_length); 330 if (plen < (int) sizeof(*phdr) || pos + plen > end) { 332 "length %d", plen); 338 phdr->next_payload, phdr->flags, plen); 341 pdatalen = plen - sizeof(*phdr); 407 pos + plen == end) { 418 pos += plen; 597 size_t plen; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls_common.c | 123 size_t send_len, plen; local 142 plen = 1 + send_len; 144 plen += 4; 146 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls_common.c | 123 size_t send_len, plen; local 142 plen = 1 + send_len; 144 plen += 4; 146 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls_common.c | 123 size_t send_len, plen; local 142 plen = 1 + send_len; 144 plen += 4; 146 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
|