/external/tcpdump/ |
H A D | print-udld.c | 88 int code, type, len; local 126 len = EXTRACT_16BITS(tptr+2); 127 len -= 4; 131 if (type == 0 || len == 0) { 137 type, len); 159 tptr += len;
|
H A D | print-vrrp.c | 88 vrrp_print(register const u_char *bp, register u_int len, int ttl) argument 107 printf(", intvl %us, length %u", bp[5],len); 113 if (TTEST2(bp[0], len)) { 117 vec[0].len = len;
|
/external/valgrind/main/coregrind/ |
H A D | pub_core_aspacemgr.h | 79 /* Is the area [start .. start+len-1] validly accessible by the 87 // ( Addr start, SizeT len, UInt prot ); 93 ( Addr start, SizeT len, UInt prot ); 100 ( Addr start, SizeT len, UInt prot ); 140 Addr len; member in struct:__anon32688 159 ( Addr start, SizeT len, /*OUT*/Bool* ok ); 161 /* Returns True if [start, start + len - 1] is covered by a single 170 ( Addr start, SizeT len); 177 ( Addr a, SizeT len, UInt prot, UInt flags, Int fd, Off64T offset ); 183 extern Bool VG_(am_notify_client_shmat)( Addr a, SizeT len, UIn [all...] |
/external/valgrind/main/memcheck/tests/amd64/ |
H A D | insn-pcmpistri.c | 38 /* len = length of string including trailing null */ 39 const size_t len = strlen(s) + 1; local 40 const size_t roundup = ((len+15)/16)*16; 46 memcpy(space, s, len); 53 for (i=len ; i < roundup ; ++i) 58 assert(len > 0); 59 (void)VALGRIND_SET_VBITS(&s_copy[len-1], &ff, 1);
|
/external/valgrind/main/none/tests/mips32/ |
H A D | vfp.c | 241 void ppMem(double *m, int len) argument 245 for (i = 0; i < len; i=i+4) 255 void ppMemF(float *m, int len) argument 259 for (i = 0; i < len; i=i+4)
|
/external/valgrind/main/none/tests/s390x/ |
H A D | tre.c | 11 uint64_t len; member in struct:__anon33241 19 tre_regs tre(uint8_t *codepage, uint8_t *addr, uint64_t len, uint8_t test_byte) argument 27 register uint64_t l1 asm ("3") = len; 37 regs.len = l1; 45 void run_test(void *tran_table, void *srcaddr, uint64_t len, uint8_t test) argument 50 regs = tre(tran_table, srcaddr, len, test); 56 if ((uint64_t)srcaddr + (len - regs.len) != regs.addr) 60 for ( i = 0; i < len; i++) {
|
H A D | troo.c | 9 uint64_t len; member in struct:__anon33242 26 troo_regs tr(uint8_t *addr, uint8_t *codepage, uint8_t *dest, uint64_t len, argument 31 register uint64_t length asm("3") = len; 47 regs.len = length; 55 int run_test(void *srcaddr, void *tableaddr, void *desaddr, uint64_t len, argument 61 assert(len <= sizeof src); 66 regs = tr(srcaddr, tableaddr, desaddr, len, testbyte); 70 if ((uint64_t)srcaddr + (len - regs.len) != regs.srcaddr) 72 if ((uint64_t)desaddr + (len [all...] |
H A D | trot.c | 9 uint64_t len; member in struct:__anon33243 27 trot_regs tr(uint8_t *addr, uint16_t *codepage, uint16_t *dest, uint64_t len, argument 32 register uint64_t length asm("3") = len; 48 regs.len = length; 56 int run_test(void *srcaddr, void *tableaddr, void *desaddr, uint64_t len, argument 62 assert(len <= sizeof src); 67 regs = tr(srcaddr, tableaddr, desaddr, len, testbyte); 71 if ((uint64_t)srcaddr + (len - regs.len) != regs.srcaddr) 73 if ((uint64_t)desaddr + 2*(len [all...] |
H A D | trto.c | 9 uint64_t len; member in struct:__anon33244 26 trto_regs tr(uint16_t *addr, uint16_t *codepage, uint8_t *dest, uint64_t len, argument 31 register uint64_t length asm("3") = len; 47 regs.len = length; 55 int run_test(void *srcaddr, void *tableaddr, void *desaddr, uint64_t len, argument 61 assert(len <= sizeof src); 66 regs = tr(srcaddr, tableaddr, desaddr, len, testbyte); 70 if ((uint64_t)srcaddr + (len - regs.len) != regs.srcaddr) 72 if ((uint64_t)desaddr + ((len [all...] |
H A D | trtt.c | 9 uint64_t len; member in struct:__anon33245 27 trtt_regs tr(uint16_t *addr, uint16_t *codepage, uint16_t *dest, uint64_t len, argument 32 register uint64_t length asm("3") = len; 48 regs.len = length; 57 int run_test(void *srcaddr, void *tableaddr, void *desaddr, uint64_t len, argument 63 assert(len <= sizeof src); 68 regs = tr(srcaddr, tableaddr, desaddr, len, testbyte); 72 if ((uint64_t)srcaddr + (len - regs.len) != regs.srcaddr) 74 if ((uint64_t)desaddr + (len [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-omac1.c | 34 * @len: Lengths of the data blocks 43 const u8 *addr[], const size_t *len, u8 *mac) 57 total_len += len[e]; 62 end = pos + len[0]; 70 end = pos + len[e]; 88 end = pos + len[e]; 42 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | crypto_internal.c | 125 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 133 MD5Update(&ctx->u.md5, data, len); 137 SHA1Update(&ctx->u.sha1, data, len); 142 sha256_process(&ctx->u.sha256, data, len); 151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 159 if (mac == NULL || len == NULL) { 166 if (*len < 16) { 167 *len = 16; 171 *len = 16; 175 if (*len < 2 [all...] |
H A D | sha256-prf.c | 59 size_t len[4]; local 64 len[0] = 2; 66 len[1] = os_strlen(label); 68 len[2] = data_len; 70 len[3] = sizeof(length_le); 78 hmac_sha256_vector(key, key_len, 4, addr, len, 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_ndis_.c | 37 * data (variable len, optional) 42 u8 *buf, size_t len) 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 49 if (len < sizeof(int)) 55 if (buf + len - pos > 2) { 58 if (data_len > (size_t) (buf + len - pos)) { 90 DWORD len; local 93 if (ReadFile(drv->events_pipe, buf, sizeof(buf), &len, NULL)) 94 wpa_driver_ndis_event_process(drv, buf, len); 41 wpa_driver_ndis_event_process(struct wpa_driver_ndis_data *drv, u8 *buf, size_t len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.c | 25 size_t len[5]; local 28 len[0] = 0; 30 len[1] = label_len; 32 len[2] = seed_len; 47 len[3] = 1; 49 len[4] = 2; 63 len[3] = 1; 65 len[4] = 1; 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) 81 len[ [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 46 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, reqData, &len); 47 if (pos == NULL || len == 0) { 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 49 pos, (unsigned long) len); 59 if (challenge_len == 0 || challenge_len > len - 1) { 61 "(challenge_len=%lu len=%lu)", 62 (unsigned long) challenge_len, (unsigned long) len);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | bignum.c | 71 * @len: Length of the buffer, can be %NULL if buffer is known to be long 75 int bignum_get_unsigned_bin(const struct bignum *n, u8 *buf, size_t *len) argument 78 if (len && need > *len) { 79 *len = need; 86 if (len) 87 *len = need; 96 * @len: Length of buf in octets 99 int bignum_set_unsigned_bin(struct bignum *n, const u8 *buf, size_t len) argument 101 if (mp_read_unsigned_bin((mp_int *) n, (u8 *) buf, len) ! [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | base64.c | 20 * @len: Length of the data to be encoded 29 unsigned char * base64_encode(const unsigned char *src, size_t len, argument 37 olen = len * 4 / 3 + 4; /* 3-byte blocks to 4-byte */ 40 if (olen < len) 46 end = src + len; 90 * @len: Length of the data to be decoded 97 unsigned char * base64_decode(const unsigned char *src, size_t len, argument 110 for (i = 0; i < len; i++) { 124 for (i = 0; i < len; i++) {
|
H A D | http-utils.h | 17 size_t len; member in struct:http_othername
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_attr_parse.c | 21 u8 id, u8 len, const u8 *pos) 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", 24 id, len); 27 if (len != 1) { 29 "%u", len); 36 attr->authorized_macs_len = len; 39 if (len != 1) { 41 "Shareable length %u", len); 47 if (len != 1) { 49 "length %u", len); 20 wps_set_vendor_ext_wfa_subelem(struct wps_parse_attr *attr, u8 id, u8 len, const u8 *pos) argument 80 wps_parse_vendor_ext_wfa(struct wps_parse_attr *attr, const u8 *pos, u16 len) argument 100 wps_parse_vendor_ext(struct wps_parse_attr *attr, const u8 *pos, u16 len) argument 141 wps_set_attr(struct wps_parse_attr *attr, u16 type, const u8 *pos, u16 len) argument 553 u16 type, len; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-omac1.c | 34 * @len: Lengths of the data blocks 43 const u8 *addr[], const size_t *len, u8 *mac) 57 total_len += len[e]; 62 end = pos + len[0]; 70 end = pos + len[e]; 88 end = pos + len[e]; 42 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | crypto_internal.c | 125 void crypto_hash_update(struct crypto_hash *ctx, const u8 *data, size_t len) argument 133 MD5Update(&ctx->u.md5, data, len); 137 SHA1Update(&ctx->u.sha1, data, len); 142 sha256_process(&ctx->u.sha256, data, len); 151 int crypto_hash_finish(struct crypto_hash *ctx, u8 *mac, size_t *len) argument 159 if (mac == NULL || len == NULL) { 166 if (*len < 16) { 167 *len = 16; 171 *len = 16; 175 if (*len < 2 [all...] |
H A D | sha256-prf.c | 59 size_t len[4]; local 64 len[0] = 2; 66 len[1] = os_strlen(label); 68 len[2] = data_len; 70 len[3] = sizeof(length_le); 78 hmac_sha256_vector(key, key_len, 4, addr, len, 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_ndis_.c | 37 * data (variable len, optional) 42 u8 *buf, size_t len) 48 wpa_hexdump(MSG_MSGDUMP, "NDIS: received event data", buf, len); 49 if (len < sizeof(int)) 55 if (buf + len - pos > 2) { 58 if (data_len > (size_t) (buf + len - pos)) { 90 DWORD len; local 93 if (ReadFile(drv->events_pipe, buf, sizeof(buf), &len, NULL)) 94 wpa_driver_ndis_event_process(drv, buf, len); 41 wpa_driver_ndis_event_process(struct wpa_driver_ndis_data *drv, u8 *buf, size_t len) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_peap_common.c | 25 size_t len[5]; local 28 len[0] = 0; 30 len[1] = label_len; 32 len[2] = seed_len; 47 len[3] = 1; 49 len[4] = 2; 63 len[3] = 1; 65 len[4] = 1; 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) 81 len[ [all...] |