/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 149 size_t plen; local 151 plen = 1 + length; 153 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EKE, plen,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 115 size_t plen; local 117 plen = 1 + length; 119 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EKE, plen, 185 size_t plen; local 189 plen = 2 + 4 * 4 + 1 + sm->server_id_len; 190 msg = eap_eke_build_msg(data, id, plen, EAP_EKE_ID); 307 size_t plen, prot_len; local 313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; 314 msg = eap_eke_build_msg(data, id, plen, EAP_EKE_CONFIRM);
|
H A D | eap_server_tnc.c | 222 size_t send_len, plen; local 237 plen = 1 + send_len; 239 plen += 4; 240 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
|
/external/boringssl/src/crypto/pem/ |
H A D | pem_lib.c | 228 int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, const char *name, BIO *bp, argument 254 *plen = len; 393 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 402 len= *plen; 435 *plen=j;
|
/external/dnsmasq/src/ |
H A D | forward.c | 206 HEADER *header, size_t plen, time_t now, struct frec *forward) 211 unsigned int crc = questions_crc(header, plen, daemon->namebuff); 213 unsigned short gotname = extract_request(header, plen, daemon->namebuff, NULL); 247 find_pseudoheader(header, plen, NULL, NULL, &is_sign); 335 if (sendto(fd, (char *)header, plen, 0, 346 daemon->packet_len = plen; 385 plen = setup_reply(header, plen, addrp, flags, daemon->local_ttl); 386 send_from(udpfd, daemon->options & OPT_NOWILD, (char *)header, plen, udpaddr, dst_addr, dst_iface); 397 size_t plen; local 204 forward_query(int udpfd, union mysockaddr *udpaddr, struct all_addr *dst_addr, unsigned int dst_iface, HEADER *header, size_t plen, time_t now, struct frec *forward) argument 514 size_t plen; local [all...] |
/external/iproute2/ip/ |
H A D | xfrm_state.c | 133 int plen = slen - 2; local 143 len = (plen + 1) / 2; 147 for (i = - (plen % 2), j = 0; j < len; i += 2, j++) {
|
/external/iproute2/lib/ |
H A D | utils.c | 333 unsigned plen; local 367 if (get_netmask(&plen, slash+1, 0) 368 || plen > dst->bitlen) { 373 dst->bitlen = plen;
|
/external/iproute2/tc/ |
H A D | f_u32.c | 365 int plen = 128; local 383 plen = addr.bitlen; 384 for (i=0; i<plen; i+=32) { 385 // if (((i+31)&~0x1F)<=plen) { 386 if (i + 31 <= plen) { 391 } else if (i < plen) { 392 __u32 mask = htonl(0xFFFFFFFF << (32 - (plen -i )));
|
/external/ipsec-tools/src/libipsec/ |
H A D | pfkey.c | 388 int plen; local 405 plen = sizeof(struct in_addr) << 3; 408 plen = sizeof(struct in6_addr) << 3; 448 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, (u_int)plen, 456 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, (u_int)plen, 578 int plen; local 592 plen = sizeof(struct in_addr) << 3; 595 plen = sizeof(struct in6_addr) << 3; 621 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, (u_int)plen, 627 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, (u_int)plen, 1139 int plen; local 1221 int plen; local 1498 int plen; local 1651 int plen; local [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_cfg.c | 214 size_t plen; local 217 plen = ntohs(ph->len); 218 nph = (struct isakmp_gen *)((char *)ph + plen); 219 plen = ntohs(nph->len); 221 if ((payload = vmalloc(plen)) == NULL) { 226 memcpy(payload->v, nph, plen);
|
/external/libnfc-nci/src/nfc/ndef/ |
H A D | ndef_utils.c | 843 int plen = (payload_len < 256) ? 1 : 4; local 853 recSize = payload_len + 2 + type_len + plen + ilen + id_len; 873 if (plen == 1) 885 if (plen == 1) 939 INT32 plen = (payload_len < 256) ? 1 : 4; local 943 recSize = payload_len + 2 + type_len + plen + ilen + id_len; 969 if (plen == 1) 981 if (plen == 1)
|
/external/libnfc-nci/src/nfc/nfc/ |
H A D | nfc_ncif.c | 574 void nfc_ncif_proc_credits(UINT8 *p, UINT16 plen) argument 730 void nfc_ncif_proc_discover_ntf (UINT8 *p, UINT16 plen) argument 1024 void nfc_ncif_proc_ee_action (UINT8 *p, UINT16 plen) argument 1038 if (plen >= 3) 1039 plen -= 3; 1040 if (data_len > plen) 1041 data_len = (UINT8) plen; 1103 void nfc_ncif_proc_ee_discover_req (UINT8 *p, UINT16 plen) argument 1110 NFC_TRACE_DEBUG2 ("nfc_ncif_proc_ee_discover_req %d len:%d", *p, plen); 1117 if (plen) 1193 nfc_ncif_proc_conn_create_rsp(UINT8 *p, UINT16 plen, UINT8 dest_type) argument 1384 nfc_ncif_proc_t3t_polling_ntf(UINT8 *p, UINT16 plen) argument [all...] |
/external/libnl/lib/ |
H A D | utils.c | 360 int plen; local 368 plen = strcspn(p, " \t"); 370 if (!plen) 372 else if (!strncasecmp(p, "sec", plen)) 374 else if (!strncasecmp(p, "min", plen)) 376 else if (!strncasecmp(p, "hour", plen)) 378 else if (!strncasecmp(p, "day", plen)) 383 str = p + plen;
|
/external/libxml2/ |
H A D | dict.c | 75 #define xmlDictComputeQKey(dict, prefix, plen, name, len) \ 79 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) : \ 80 xmlDictComputeBigQKey(prefix, plen, name, len, (dict)->seed))) 85 #define xmlDictComputeQKey(dict, prefix, plen, name, len) \ 86 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) 296 * @plen: the prefix length 305 xmlDictAddQString(xmlDictPtr dict, const xmlChar *prefix, unsigned int plen, argument 320 if (pool->end - pool->free > namelen + plen + 1) 336 if (size < 4 * (namelen + plen + 1)) 337 size = 4 * (namelen + plen 407 xmlDictComputeBigQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument 478 xmlDictComputeFastQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument 1079 unsigned int len, plen, l; local [all...] |
/external/netcat/ |
H A D | netcat.c | 392 int rv, plen; local 397 plen = jflag ? 16384 : 2048; 398 rv = recvfrom(s, buf, plen, MSG_PEEK, 766 int plen; local 768 plen = jflag ? 16384 : 2048; 791 if ((n = read(nfd, buf, plen)) < 0) 806 if ((n = read(wfd, buf, plen)) < 0)
|
/external/openssh/ |
H A D | auth-pam.c | 719 size_t plen; local 730 plen = 0; 740 len = plen + mlen + 1; 742 strlcpy(**prompts + plen, msg, len - plen); 743 plen += mlen; 750 len = plen + mlen + 2; 752 strlcpy(**prompts + plen, msg, len - plen); 753 plen [all...] |
/external/tcpdump/ |
H A D | print-eigrp.c | 136 u_int8_t plen; member in struct:eigrp_tlv_ip_int_t 156 u_int8_t plen; member in struct:eigrp_tlv_ip_ext_t 327 bit_length = tlv_ptr.eigrp_tlv_ip_int->plen; 356 bit_length = tlv_ptr.eigrp_tlv_ip_ext->plen;
|
/external/toybox/toys/pending/ |
H A D | route.c | 181 unsigned long plen; local 182 plen = atolx_range(prefix + 1, 0, 32); 185 = htonl( ~(INVALID_ADDR >> plen)); 332 unsigned long plen; local 337 plen = atolx_range(prefix + 1, 0, 128); //DEFAULT_PREFIXLEN); 338 } else plen = DEFAULT_PREFIXLEN; 340 rt->rtmsg_flags = (plen == DEFAULT_PREFIXLEN) ? (RTF_UP | RTF_HOST) : RTF_UP; 341 rt->rtmsg_dst_len = plen; 396 unsigned long plen = 0; local 400 rt.rtmsg_dst_len = plen; [all...] |
/external/toybox/toys/posix/ |
H A D | sed.c | 274 static void walk_pattern(char **pline, long plen) argument 293 TT.nextlen = plen;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | vlan_init.c | 796 int len, plen; local 799 plen = len - sizeof(*h); 800 if (len > left || plen < 0) { 802 "message: len=%d left=%d plen=%d", 803 len, left, plen); 809 vlan_read_ifnames(h, plen, 0, hapd); 812 vlan_read_ifnames(h, plen, 1, hapd);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 501 size_t alen, plen, i, list_len; local 622 plen = WPA_GET_BE16(apos); 625 if (plen > alen) { 629 (unsigned long) plen, 635 attr->identity_len = plen; 760 plen = apos[0] * 256 + apos[1]; 761 if (plen > alen - 2) { 765 (unsigned long) plen, 770 attr->next_pseudonym_len = plen; 780 plen [all...] |
H A D | ikev2_common.c | 254 unsigned int plen, pdatalen, left; local 268 plen = WPA_GET_BE16(phdr->payload_length); 269 if (plen < sizeof(*phdr) || plen > left) { 271 "length %d", plen); 277 phdr->next_payload, phdr->flags, plen); 280 pdatalen = plen - sizeof(*phdr); 346 pos + plen == end) { 357 pos += plen; 536 size_t plen; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 315 int plen; local 321 plen = ikev2_parse_proposal(&prop, pos, end); 322 if (plen < 0) 332 pos += plen; 844 size_t plen; local 869 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 870 WPA_PUT_BE16(t->transform_length, plen); 889 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 890 WPA_PUT_BE16(p->proposal_length, plen); 892 plen 903 size_t plen; local 939 size_t plen; local 958 size_t plen; local 984 size_t plen; local 1024 size_t plen; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server.c | 89 size_t plen = 1; local 96 plen += 2 + domain_len; 99 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_ERP_TYPE_REAUTH_START, plen, 694 size_t plen; local 714 plen = 1 + 2 + 2 + os_strlen(nai); 716 plen += 1 + hash_len; 717 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_ERP_TYPE_REAUTH, plen, 1444 size_t plen; local 1462 plen = be_to_host16(hdr->length); 1463 if (plen > wpabuf_le [all...] |
H A D | ikev2.c | 323 int plen; local 329 plen = ikev2_parse_proposal(data, &prop, pos, end); 330 if (plen < 0) 338 pos += plen; 908 size_t plen; local 934 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 935 WPA_PUT_BE16(t->transform_length, plen); 954 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 955 WPA_PUT_BE16(p->proposal_length, plen); 957 plen 968 size_t plen; local 1005 size_t plen; local 1024 size_t plen; local 1050 size_t plen; local [all...] |