/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | drv_callbacks.c | 620 size_t plen __maybe_unused; 626 plen = drv_mgmt->frame_len - 24 - 1; 633 wpa_printf(MSG_DEBUG, "RX_ACTION cat %d action plen %d", 634 mgmt->u.action.category, (int) plen); 644 wpa_ft_action_rx(sta->wpa_sm, payload, plen); 648 if (mgmt->u.action.category == WLAN_ACTION_SA_QUERY && plen >= 4) {
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_asconf.c | 2789 uint16_t plen, ptype; local 2816 plen = ntohs(ph->param_length); 2828 if (plen != sizeof(struct sctp_ipv6addr_param) || 2851 if (plen != sizeof(struct sctp_ipv4addr_param) || 2910 if (SCTP_SIZE32(plen) == 0) { 2912 plen, ptype); 2916 offset += SCTP_SIZE32(plen); 2933 uint16_t plen, ptype; local 2976 plen = ntohs(ph->param_length); 2982 if (plen ! [all...] |
H A D | sctp_pcb.c | 2405 uint16_t plen; local 2438 plen = ntohs(phdr->param_length); 2439 if (plen == 0) { 2444 plen == sizeof(struct sctp_ipv4addr_param)) { 2449 (struct sctp_paramhdr *)&ip4_parm, min(plen, sizeof(ip4_parm))); 2465 plen == sizeof(struct sctp_ipv6addr_param)) { 2470 (struct sctp_paramhdr *)&ip6_parm, min(plen,sizeof(ip6_parm))); 2484 offset += SCTP_SIZE32(plen); 7090 uint16_t ptype, plen; local 7212 plen [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 188 size_t buflen, left, data_len, len, plen; local 316 plen = sizeof(*hdr4) + 4 + 16 + data_len; 317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 188 size_t buflen, left, data_len, len, plen; local 316 plen = sizeof(*hdr4) + 4 + 16 + data_len; 317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 188 size_t buflen, left, data_len, len, plen; local 316 plen = sizeof(*hdr4) + 4 + 16 + data_len; 317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/test/ |
H A D | RTPencode.cc | 257 uint16_t length, plen; local 594 plen = htons(12 + enc_len); 600 if (fwrite(&plen, 2, 1, out_file) != 1) { 689 plen = htons(12 + enc_len); 696 if (fwrite(&plen, 2, 1, out_file) != 1) { 742 old_plen=plen;
|
/external/iproute2/tc/ |
H A D | f_u32.c | 365 int plen = 128; local 383 plen = addr.bitlen; 384 for (i=0; i<plen; i+=32) { 385 // if (((i+31)&~0x1F)<=plen) { 386 if (i + 31 <= plen) { 391 } else if (i < plen) { 392 __u32 mask = htonl(0xFFFFFFFF << (32 - (plen -i )));
|
/external/chromium_org/third_party/webrtc/test/ |
H A D | rtp_file_reader.cc | 107 uint16_t plen; variable 110 TRY(Read(&plen)); 113 // Use 'len' here because a 'plen' of 0 specifies rtcp.
|
/external/openssl/crypto/rsa/ |
H A D | rsa.h | 235 #define EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx, plen) \ 239 0, plen)
|
/external/openssl/include/openssl/ |
H A D | rsa.h | 235 #define EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx, plen) \ 239 0, plen)
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_pkt.c | 642 unsigned char *p,*plen; local 751 plen=p; 810 s2n(wr->length,plen); 813 s->msg_callback(1, 0, SSL3_RT_HEADER, plen - 5, 5, s, s->msg_callback_arg);
|
/external/ipsec-tools/src/racoon/ |
H A D | ipsec_doi.c | 4257 u_int plen = 0; local 4304 plen = sizeof(struct in_addr) << 3; 4308 plen = sizeof(struct in6_addr) << 3; 4336 plen = 0; 4344 plen += 8; 4345 if (plen >= max) 4349 if (plen < max) { 4359 plen += l; 4365 *prefixlen = plen; 4390 u_int plen local [all...] |
H A D | racoonctl.c | 1526 int plen, i; local 1531 plen = strlen(port); 1532 if (len < plen + 1) 1536 for (i = 0; i < len - plen - 1 && addr[i] != '\0'; /*noting*/) 1540 for (i = 0; i < plen && port[i] != '\0'; /*noting*/)
|
/external/openssl/crypto/asn1/ |
H A D | asn_mime.c | 105 static int strip_eol(char *linebuf, int *plen); 937 static int strip_eol(char *linebuf, int *plen) argument 939 int len = *plen; 951 *plen = len;
|
/external/ppp/pppd/ |
H A D | ipv6cp.c | 1434 ipv6cp_printpkt(p, plen, printer, arg) 1436 int plen; 1445 if (plen < HEADERLEN) 1451 if (len < HEADERLEN || len > plen)
|
H A D | eap.c | 435 int id, i, plen, toffs; local 467 plen = b64dec(&bs, 481 if (id + 1 <= plen && id + 9 > plen) 484 if (plen % 8 == 0 && i < 5) { 490 if ((i = plen = *(unsigned char *)clear) > 7) 492 esp->es_server.ea_peerlen = plen; 495 plen -= i; 498 while (plen > 0) { 502 plen [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.c | 655 size_t plen; local 678 plen = hdr.length; 680 if (pos + plen > buf + len) 683 *next = pos + plen; 685 if (asn1_get_next(pos, plen, &hdr) < 0 || 695 plen = *next - pos; 697 if (asn1_get_next(pos, plen, &hdr) < 0 ||
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.c | 655 size_t plen; local 678 plen = hdr.length; 680 if (pos + plen > buf + len) 683 *next = pos + plen; 685 if (asn1_get_next(pos, plen, &hdr) < 0 || 695 plen = *next - pos; 697 if (asn1_get_next(pos, plen, &hdr) < 0 ||
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | x509v3.c | 655 size_t plen; local 678 plen = hdr.length; 680 if (pos + plen > buf + len) 683 *next = pos + plen; 685 if (asn1_get_next(pos, plen, &hdr) < 0 || 695 plen = *next - pos; 697 if (asn1_get_next(pos, plen, &hdr) < 0 ||
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | events.c | 2808 size_t plen; local 2817 plen = len - IEEE80211_HDRLEN - 1; 2821 MAC2STR(mgmt->sa), category, (int) plen, freq); 2825 ft_rx_action(wpa_s, payload, plen); 2833 sme_sa_query_rx(wpa_s, mgmt->sa, payload, plen); 2851 payload, plen, freq) == 0) 2856 if (category == WLAN_ACTION_PUBLIC && plen >= 4 && 2866 if (category == WLAN_ACTION_QOS && plen >= 1 && 2869 size_t qlen = plen - 1; 2881 category, payload, plen, fre [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 1598 size_t plen, data_len, key_data_len; local 1621 plen = be_to_host16(hdr->length); 1622 data_len = plen + sizeof(*hdr); 1625 hdr->version, hdr->type, (unsigned long) plen); 1638 if (plen > len - sizeof(*hdr) || plen < sizeof(*key)) { 1642 (unsigned long) plen, (unsigned long) len); 1674 if (key_data_len > plen - sizeof(struct wpa_eapol_key)) { 1678 (unsigned int) (plen - sizeof(struct wpa_eapol_key)));
|