/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 1598 size_t plen, data_len, key_data_len; local 1621 plen = be_to_host16(hdr->length); 1622 data_len = plen + sizeof(*hdr); 1625 hdr->version, hdr->type, (unsigned long) plen); 1638 if (plen > len - sizeof(*hdr) || plen < sizeof(*key)) { 1642 (unsigned long) plen, (unsigned long) len); 1674 if (key_data_len > plen - sizeof(struct wpa_eapol_key)) { 1678 (unsigned int) (plen - sizeof(struct wpa_eapol_key)));
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 1598 size_t plen, data_len, key_data_len; local 1621 plen = be_to_host16(hdr->length); 1622 data_len = plen + sizeof(*hdr); 1625 hdr->version, hdr->type, (unsigned long) plen); 1638 if (plen > len - sizeof(*hdr) || plen < sizeof(*key)) { 1642 (unsigned long) plen, (unsigned long) len); 1674 if (key_data_len > plen - sizeof(struct wpa_eapol_key)) { 1678 (unsigned int) (plen - sizeof(struct wpa_eapol_key)));
|
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_cfg.c | 214 size_t plen; local 217 plen = ntohs(ph->len); 218 nph = (struct isakmp_gen *)((char *)ph + plen); 219 plen = ntohs(nph->len); 221 if ((payload = vmalloc(plen)) == NULL) { 226 memcpy(payload->v, nph, plen);
|
/external/pcre/dist/ |
H A D | pcregrep.c | 954 int plen = strlen(path); local 958 if (pcre_exec(ep->compiled, NULL, path, plen, 0, 0, NULL, 0) >= 0) 966 if (pcre_exec(ip->compiled, NULL, path, plen, 0, 0, NULL, 0) >= 0) 1760 int plen = offsets[2*n + 1] - offsets[2*n]; local 1761 if (plen > 0) 1765 FWRITE(matchptr + offsets[n*2], 1, plen, stdout);
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_output.c | 1980 uint16_t plen; local 1986 plen = (uint16_t)sizeof(struct sctp_ipv4addr_param); 1991 plen = (uint16_t)sizeof(struct sctp_ipv6addr_param); 1998 if (M_TRAILINGSPACE(m) >= plen) { 2008 SCTP_BUF_NEXT(mret) = sctp_get_mbuf_for_msg(plen, 0, M_NOWAIT, 1, MT_DATA); 2027 parmh->param_length = htons(plen); 2029 SCTP_BUF_LEN(mret) += plen; 2042 parmh->param_length = htons(plen); 2049 SCTP_BUF_LEN(mret) += plen; 2057 *len += plen; 5359 uint16_t ptype, plen, padded_size; local 5683 uint16_t ptype, plen; local 9413 uint16_t ptype, plen; local [all...] |
/external/chromium_org/third_party/libevent/test/ |
H A D | regress.gen.c | 724 run_some_bytes_get(struct run *msg, ev_uint8_t * *value, ev_uint32_t *plen) argument 729 *plen = msg->some_bytes_length;
|
/external/qemu/distrib/sdl-1.2.15/src/video/Xext/Xxf86dga/ |
H A D | XF86DGA.c | 540 ULONG plen,dlen; 547 (PULONG)&pmap, sizeof(pmap), &plen,
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | tls1.h | 314 const char *label, size_t llen, const unsigned char *p, size_t plen,
|
/external/ppp/pppd/ |
H A D | ccp.c | 1485 ccp_printpkt(p, plen, printer, arg) 1487 int plen; 1496 if (plen < HEADERLEN) 1501 if (len < HEADERLEN || len > plen)
|
H A D | ipxcp.c | 1473 ipxcp_printpkt(p, plen, printer, arg) 1475 int plen; 1484 if (plen < HEADERLEN) 1490 if (len < HEADERLEN || len > plen)
|
/external/bluetooth/bluedroid/stack/avdt/ |
H A D | avdt_api.c | 1353 UINT8 *p, *plen, *pm1, *p_end; local 1390 plen = p; 1430 UINT16_TO_BE_STREAM(plen, len);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509v3/ |
H A D | v3_utl.c | 573 static void skip_prefix(const unsigned char **p, size_t *plen, argument 578 size_t pattern_len = *plen; 602 *plen = pattern_len;
|
/external/chromium_org/third_party/harfbuzz-ng/src/ |
H A D | hb-uniscribe.cc | 306 _hb_generate_unique_face_name (wchar_t *face_name, unsigned int *plen) argument 330 if (plen) 331 *plen = name_str_len;
|
/external/dnsmasq/src/ |
H A D | dnsmasq.h | 723 unsigned char *find_pseudoheader(HEADER *header, size_t plen, 726 unsigned int questions_crc(HEADER *header, size_t plen, char *buff); 727 size_t resize_packet(HEADER *header, size_t plen,
|
/external/harfbuzz_ng/src/ |
H A D | hb-uniscribe.cc | 306 _hb_generate_unique_face_name (wchar_t *face_name, unsigned int *plen) argument 329 if (plen) 330 *plen = name_str_len;
|
/external/openssl/ssl/ |
H A D | s3_pkt.c | 696 unsigned char *p,*plen; local 806 plen=p; 875 s2n(wr->length,plen);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 149 size_t plen; local 151 plen = 1 + length; 153 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EKE, plen,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 149 size_t plen; local 151 plen = 1 + length; 153 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EKE, plen,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 149 size_t plen; local 151 plen = 1 + length; 153 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EKE, plen,
|
/external/chromium_org/third_party/icu/source/test/intltest/ |
H A D | intltest.cpp | 1995 int32_t plen = uprv_strlen(prop); local 1996 if ((int32_t)uprv_strlen(proplines[i]) > plen + 1 1997 && proplines[i][plen] == '=' 1998 && uprv_strncmp(proplines[i], prop, plen) == 0) { 1999 val = &(proplines[i][plen+1]);
|
/external/icu/icu4c/source/test/intltest/ |
H A D | intltest.cpp | 1997 int32_t plen = uprv_strlen(prop); local 1998 if ((int32_t)uprv_strlen(proplines[i]) > plen + 1 1999 && proplines[i][plen] == '=' 2000 && uprv_strncmp(proplines[i], prop, plen) == 0) { 2001 val = &(proplines[i][plen+1]);
|
/external/iproute2/ip/ |
H A D | xfrm_state.c | 133 int plen = slen - 2; local 143 len = (plen + 1) / 2; 147 for (i = - (plen % 2), j = 0; j < len; i += 2, j++) {
|
/external/chromium_org/third_party/npapi/bindings/ |
H A D | npfunctions.h | 121 typedef NPError (*NPN_GetAuthenticationInfoPtr)(NPP npp, const char *protocol, const char *host, int32_t port, const char *scheme, const char *realm, char **username, uint32_t *ulen, char **password, uint32_t *plen);
|
/external/iptables/extensions/ |
H A D | libxt_HMARK.c | 204 static void HMARK_parse(struct xt_option_call *cb, int plen) argument
|
/external/openssl/include/openssl/ |
H A D | tls1.h | 308 const char *label, size_t llen, const unsigned char *p, size_t plen,
|