/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
H A D | padding.c | 367 const uint8_t *param, unsigned plen, 406 if (!EVP_Digest((void *)param, plen, db, NULL, md, NULL)) { 447 const uint8_t *param, unsigned plen, 497 if (!EVP_Digest((void *)param, plen, phash, NULL, md, NULL)) { 365 RSA_padding_add_PKCS1_OAEP_mgf1(uint8_t *to, unsigned tlen, const uint8_t *from, unsigned flen, const uint8_t *param, unsigned plen, const EVP_MD *md, const EVP_MD *mgf1md) argument 445 RSA_padding_check_PKCS1_OAEP_mgf1(uint8_t *to, unsigned tlen, const uint8_t *from, unsigned flen, const uint8_t *param, unsigned plen, const EVP_MD *md, const EVP_MD *mgf1md) argument
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/test/delay_tool/ |
H A D | plot_neteq_delay.m | 60 plen=plen(ix);
|
/external/iproute2/lib/ |
H A D | utils.c | 333 unsigned plen; local 367 if (get_netmask(&plen, slash+1, 0) 368 || plen > dst->bitlen) { 373 dst->bitlen = plen;
|
/external/ipsec-tools/src/libipsec/ |
H A D | pfkey_dump.c | 701 int plen; local 705 plen = sizeof(struct in_addr) << 3; 708 plen = sizeof(struct in6_addr) << 3; 714 if (pref == plen)
|
/external/ppp/pppd/ |
H A D | chap-new.c | 132 static int chap_print_pkt(unsigned char *p, int plen, 572 chap_print_pkt(unsigned char *p, int plen, argument 579 if (plen < CHAP_HDRLEN) 584 if (len < CHAP_HDRLEN || len > plen)
|
/external/qemu/include/exec/ |
H A D | cpu-common.h | 116 hwaddr *plen,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_wsc.c | 306 size_t send_len, plen; local 322 plen = 2 + send_len; 324 plen += 2; 325 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
H A D | eap.c | 1237 size_t plen; local 1250 plen = be_to_host16(hdr->length); 1251 if (plen > wpabuf_len(req)) { 1253 "(len=%lu plen=%lu)", 1255 (unsigned long) plen); 1264 md5_vector(1, addr, &plen, sm->req_md5); 1269 if (plen < sizeof(*hdr) + 1) { 1278 if (plen < sizeof(*hdr) + 8) { 1280 "expanded EAP-Packet (plen=%lu)", 1281 (unsigned long) plen); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_wsc.c | 306 size_t send_len, plen; local 322 plen = 2 + send_len; 324 plen += 2; 325 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
H A D | eap.c | 1237 size_t plen; local 1250 plen = be_to_host16(hdr->length); 1251 if (plen > wpabuf_len(req)) { 1253 "(len=%lu plen=%lu)", 1255 (unsigned long) plen); 1264 md5_vector(1, addr, &plen, sm->req_md5); 1269 if (plen < sizeof(*hdr) + 1) { 1278 if (plen < sizeof(*hdr) + 8) { 1280 "expanded EAP-Packet (plen=%lu)", 1281 (unsigned long) plen); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_wsc.c | 306 size_t send_len, plen; local 322 plen = 2 + send_len; 324 plen += 2; 325 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
H A D | eap.c | 1237 size_t plen; local 1250 plen = be_to_host16(hdr->length); 1251 if (plen > wpabuf_len(req)) { 1253 "(len=%lu plen=%lu)", 1255 (unsigned long) plen); 1264 md5_vector(1, addr, &plen, sm->req_md5); 1269 if (plen < sizeof(*hdr) + 1) { 1278 if (plen < sizeof(*hdr) + 8) { 1280 "expanded EAP-Packet (plen=%lu)", 1281 (unsigned long) plen); [all...] |
/external/mksh/src/ |
H A D | misc.c | 1604 size_t len, plen = 0; local 1631 plen = pend - plist; 1635 if ((!use_cdpath || !plen || plist[0] != '/') && 1645 if (use_cdpath && plen) { 1646 XcheckN(*xsp, xp, plen); 1647 memcpy(xp, plist, plen); 1648 xp += plen; 1649 if (plist[plen - 1] != '/')
|
/external/tcpdump/ |
H A D | print-rsvp.c | 643 , u_int plen 1677 sigcheck = signature_verify(pptr, plen, (unsigned char *)obj_ptr.\ 1811 u_short plen, tlen, subtlen; local 1838 plen = tlen = EXTRACT_16BITS(rsvp_com_header->length); 1912 if (rsvp_obj_print(pptr, plen, subtptr,"\n\t ", subtlen) == -1) 1932 if (rsvp_obj_print(pptr, plen, tptr,"\n\t ", tlen) == -1)
|
H A D | print-openflow-1.0.c | 749 uint16_t property, plen, rate; local 763 plen = EXTRACT_16BITS(cp); 765 printf(", len %u", plen); 766 if (plen < OF_QUEUE_PROP_HEADER_LEN || plen > len) 774 plen_bogus = plen != OF_QUEUE_PROP_HEADER_LEN; 777 plen_bogus = plen != OF_QUEUE_PROP_MIN_RATE_LEN; 787 TCHECK2(*cp, plen - 4); 788 cp += plen - 4; 805 len -= plen; [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | vlan_init.c | 681 int len, plen; local 684 plen = len - sizeof(*h); 685 if (len > left || plen < 0) { 687 "message: len=%d left=%d plen=%d", 688 len, left, plen); 694 vlan_read_ifnames(h, plen, 0, hapd); 697 vlan_read_ifnames(h, plen, 1, hapd);
|
H A D | drv_callbacks.c | 620 size_t plen __maybe_unused; 626 plen = drv_mgmt->frame_len - 24 - 1; 633 wpa_printf(MSG_DEBUG, "RX_ACTION cat %d action plen %d", 634 mgmt->u.action.category, (int) plen); 644 wpa_ft_action_rx(sta->wpa_sm, payload, plen); 648 if (mgmt->u.action.category == WLAN_ACTION_SA_QUERY && plen >= 4) {
|
/external/wpa_supplicant_8/src/ap/ |
H A D | vlan_init.c | 681 int len, plen; local 684 plen = len - sizeof(*h); 685 if (len > left || plen < 0) { 687 "message: len=%d left=%d plen=%d", 688 len, left, plen); 694 vlan_read_ifnames(h, plen, 0, hapd); 697 vlan_read_ifnames(h, plen, 1, hapd);
|
H A D | drv_callbacks.c | 620 size_t plen __maybe_unused; 626 plen = drv_mgmt->frame_len - 24 - 1; 633 wpa_printf(MSG_DEBUG, "RX_ACTION cat %d action plen %d", 634 mgmt->u.action.category, (int) plen); 644 wpa_ft_action_rx(sta->wpa_sm, payload, plen); 648 if (mgmt->u.action.category == WLAN_ACTION_SA_QUERY && plen >= 4) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | vlan_init.c | 681 int len, plen; local 684 plen = len - sizeof(*h); 685 if (len > left || plen < 0) { 687 "message: len=%d left=%d plen=%d", 688 len, left, plen); 694 vlan_read_ifnames(h, plen, 0, hapd); 697 vlan_read_ifnames(h, plen, 1, hapd);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server.c | 928 size_t plen; local 945 plen = be_to_host16(hdr->length); 946 if (plen > wpabuf_len(resp)) { 948 "(len=%lu plen=%lu)", 950 (unsigned long) plen); 959 if (plen > sizeof(*hdr)) { 963 if (plen < sizeof(*hdr) + 8) { 965 "expanded EAP-Packet (plen=%lu)", 966 (unsigned long) plen);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server.c | 928 size_t plen; local 945 plen = be_to_host16(hdr->length); 946 if (plen > wpabuf_len(resp)) { 948 "(len=%lu plen=%lu)", 950 (unsigned long) plen); 959 if (plen > sizeof(*hdr)) { 963 if (plen < sizeof(*hdr) + 8) { 965 "expanded EAP-Packet (plen=%lu)", 966 (unsigned long) plen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 928 size_t plen; local 945 plen = be_to_host16(hdr->length); 946 if (plen > wpabuf_len(resp)) { 948 "(len=%lu plen=%lu)", 950 (unsigned long) plen); 959 if (plen > sizeof(*hdr)) { 963 if (plen < sizeof(*hdr) + 8) { 965 "expanded EAP-Packet (plen=%lu)", 966 (unsigned long) plen);
|
/external/openssl/crypto/pem/ |
H A D | pem_lib.c | 273 int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char *name, BIO *bp, argument 299 *plen = len; 440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 449 len= *plen; 486 *plen=j;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 708 size_t plen; local 717 plen = be_to_host16(hdr->length); 727 if (plen > len - sizeof(*hdr) || plen < sizeof(*key)) { 730 (unsigned long) plen, (unsigned long) len);
|