/external/openssl/ssl/ |
H A D | tls1.h | 308 const char *label, size_t llen, const unsigned char *p, size_t plen,
|
/external/ppp/pppd/ |
H A D | ipcp.c | 2030 ipcp_printpkt(p, plen, printer, arg) 2032 int plen; 2041 if (plen < HEADERLEN) 2047 if (len < HEADERLEN || len > plen)
|
H A D | lcp.c | 1971 lcp_printpkt(p, plen, printer, arg) 1973 int plen; 1982 if (plen < HEADERLEN) 1988 if (len < HEADERLEN || len > plen)
|
/external/qemu/android/ |
H A D | hw-qemud.c | 150 * '*pmsg' which contains '*plen' bytes 152 * this functions updates '*pmsg' and '*plen', and returns 156 qemud_sink_fill( QemudSink* ss, const uint8_t* *pmsg, int *plen) argument 163 if (avail > *plen) 164 avail = *plen; 168 *plen -= avail;
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 978 size_t left, plen; local 997 plen = left; 998 ppos = plain = os_malloc(plen); 1026 if (plain[0] == 0 || plain[0] > plen - 1) {
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 978 size_t left, plen; local 997 plen = left; 998 ppos = plain = os_malloc(plen); 1026 if (plain[0] == 0 || plain[0] > plen - 1) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 978 size_t left, plen; local 997 plen = left; 998 ppos = plain = os_malloc(plen); 1026 if (plain[0] == 0 || plain[0] > plen - 1) {
|
/external/chromium_org/content/child/npapi/ |
H A D | plugin_host.cc | 1040 uint32_t* plen) { 1042 !ulen || !password || !plen) 1031 NPN_GetAuthenticationInfo(NPP id, const char* protocol, const char* host, int32_t port, const char* scheme, const char* realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) argument
|
/external/qemu/distrib/sdl-1.2.15/src/video/Xext/Xxf86dga/ |
H A D | XF86DGA2.c | 914 ULONG plen,dlen; 921 (PULONG)&pmap, sizeof(pmap), &plen,
|
/external/ipsec-tools/src/racoon/ |
H A D | crypto_openssl.c | 2616 long plen = -1; local 2627 plen = BIO_get_mem_data(bio, &ptr); 2628 res = vmalloc(plen+1); 2632 memcpy (res->v, ptr, plen); 2633 res->v[plen] = '\0';
|
/external/libmtp/src/ |
H A D | ptp-pack.c | 212 size_t plen; local 221 plen = len*2 + 1; 223 retcopy = malloc(plen); 228 memcpy(retcopy, packed, plen); 229 *packed_size = plen;
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x509_vfy.c | 511 int i, ok=0, must_be_ca, plen = 0; local 626 && (plen > (x->ex_pathlen + proxy_path_length + 1))) 636 plen++;
|
/external/chromium_org/third_party/icu/source/i18n/ |
H A D | msgfmt.cpp | 1549 int32_t plen = pattern.length(); local 1551 int32_t blen = plen * 2 + 1; // space for null termination, convenience 1556 int32_t len = umsg_autoQuoteApostrophe(pat, plen, buf, blen, &status);
|
/external/icu/icu4c/source/i18n/ |
H A D | msgfmt.cpp | 1549 int32_t plen = pattern.length(); local 1551 int32_t blen = plen * 2 + 1; // space for null termination, convenience 1556 int32_t len = umsg_autoQuoteApostrophe(pat, plen, buf, blen, &status);
|
/external/openssl/crypto/x509/ |
H A D | x509_vfy.c | 454 int i, ok=0, must_be_ca, plen = 0; 569 && (plen > (x->ex_pathlen + proxy_path_length + 1))) 579 plen++;
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | pem.h | 407 OPENSSL_EXPORT int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char *name, BIO *bp, pem_password_cb *cb, void *u);
|
/external/chromium_org/third_party/icu/source/test/intltest/ |
H A D | loctest.cpp | 1790 plen = (int32_t)strlen(prefix); local 1791 int32_t c = uprv_strncmp(string, prefix, plen); 1797 if (slen == plen) return 0; 1798 if (string[plen] == '_') return 1;
|
/external/chromium_org/third_party/npapi/bindings/ |
H A D | npapi.h | 907 uint32_t *plen);
|
/external/icu/icu4c/source/test/intltest/ |
H A D | loctest.cpp | 1790 plen = (int32_t)strlen(prefix); local 1791 int32_t c = uprv_strncmp(string, prefix, plen); 1797 if (slen == plen) return 0; 1798 if (string[plen] == '_') return 1;
|
/external/openssl/crypto/pem/ |
H A D | pem.h | 415 int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char *name, BIO *bp,
|
/external/openssl/include/openssl/ |
H A D | pem.h | 415 int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char *name, BIO *bp,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_openssl.c | 290 int plen = 16; local 291 if (EVP_DecryptUpdate(c, plain, &plen, crypt, 16) != 1) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_openssl.c | 290 int plen = 16; local 291 if (EVP_DecryptUpdate(c, plain, &plen, crypt, 16) != 1) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_openssl.c | 290 int plen = 16; local 291 if (EVP_DecryptUpdate(c, plain, &plen, crypt, 16) != 1) {
|
/external/valgrind/main/coregrind/m_syswrap/ |
H A D | syswrap-generic.c | 725 Int plen = sizeof(struct vki_sockaddr_in); local 727 if (VG_(getpeername)(fd, (struct vki_sockaddr *)&paddr, &plen) != -1) { 730 inet_to_name(&paddr, plen, pname)); 741 Int plen = sizeof(struct vki_sockaddr_in6); local 743 if (VG_(getpeername)(fd, (struct vki_sockaddr *)&paddr, &plen) != -1) { 746 inet6_to_name(&paddr, plen, pname));
|