/external/bluetooth/hcidump/parser/ |
hcrp.c | 85 uint16_t pid, tid, plen, status; local 90 plen = get_u16(frm); 94 printf("HCRP %s %s: tid 0x%x plen %d", 95 pid2str(pid), frm->in ? "rsp" : "cmd", tid, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
eap_sake_common.c | 220 size_t pos, plen; local 237 plen = buf_len - pos; 238 if (plen >= SHA1_MAC_LEN) { 245 os_memcpy(&buf[pos], hash, plen);
|
eap_sim_common.c | 506 size_t alen, plen, i, list_len; local 627 plen = WPA_GET_BE16(apos); 630 if (plen > alen) { 634 (unsigned long) plen, 640 attr->identity_len = plen; 765 plen = apos[0] * 256 + apos[1]; 766 if (plen > alen - 2) { 770 (unsigned long) plen, 775 attr->next_pseudonym_len = plen; 785 plen = apos[0] * 256 + apos[1] [all...] |
/external/qemu/ |
net-checksum.c | 59 int hlen, plen, proto, csum_offset; local 65 plen = (data[16] << 8 | data[17]) - hlen; 79 if (plen < csum_offset+2) 84 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
|
/external/wpa_supplicant/ |
eap_gtc.c | 59 size_t password_len, identity_len, len, plen; local 107 plen = password_len; 112 plen += 9 + identity_len + 1; 114 plen, EAP_CODE_RESPONSE, req->identifier, &rpos); 126 (u8 *) (resp + 1) + 1, plen);
|
eap_sake_common.c | 219 size_t pos, plen; local 236 plen = buf_len - pos; 237 if (plen >= SHA1_MAC_LEN) { 244 os_memcpy(&buf[pos], hash, plen);
|
eap_sim_common.c | 236 size_t alen, plen, i, list_len; local 483 plen = apos[0] * 256 + apos[1]; 484 if (plen > alen - 2) { 488 (unsigned long) plen, 493 attr->next_pseudonym_len = plen; 503 plen = apos[0] * 256 + apos[1]; 504 if (plen > alen - 2) { 508 (unsigned long) plen, 513 attr->next_reauth_id_len = plen;
|
sha256.c | 126 size_t pos, plen; local 141 plen = buf_len - pos; 143 if (plen >= SHA256_MAC_LEN) { 149 memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
/external/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_md5.c | 108 size_t plen; local 119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
eap_tls_common.c | 114 size_t send_len, plen; local 133 plen = 1 + send_len; 135 plen += 4; 137 req = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, plen,
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 173 int saltlen, iter, plen; local 188 plen = param->value.sequence->length; 189 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 233 plen = pbe2->keyfunc->parameter->value.sequence->length; 234 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
|
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 401 UINT16_t plen = 0; local 431 plen += sizeof(pid) + TAG_HDR_SIZE; 443 plen += elen + TAG_HDR_SIZE; 452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; 460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; 463 packet.length = htons(plen); 464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
|
discovery.c | 250 UINT16_t plen; local 255 plen = TAG_HDR_SIZE + namelen; 256 CHECK_ROOM(cursor, packet.payload, plen); 287 plen += sizeof(pid) + TAG_HDR_SIZE; 290 packet.length = htons(plen); 292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE)); 421 UINT16_t plen; local 426 plen = TAG_HDR_SIZE + namelen; 427 CHECK_ROOM(cursor, packet.payload, plen); 455 plen += sizeof(pid) + TAG_HDR_SIZE [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_cred.c | 75 size_t i, plen; local 77 plen = os_strlen(tag); 78 if (len < plen) 81 for (i = 0; i < len - plen; i++) { 82 if (os_memcmp(buf + i, tag, plen) == 0)
|
/bionic/libc/netbsd/nameser/ |
ns_name.c | 801 int b, blen, plen, i; local 805 plen = (blen + 3) / 4; 806 plen += sizeof("\\[x/]") + (blen > 99 ? 3 : (blen > 9) ? 2 : 1); 807 if (dn + plen >= eom)
|
/external/bluetooth/bluez/cups/ |
hcrp.c | 56 uint16_t plen; member in struct:hcrp_pdu_hdr 92 hdr.plen = htons(HCRP_CREDIT_GRANT_CP_SIZE); 119 hdr.plen = htons(0); 147 hdr.plen = htons(0);
|
/external/bluetooth/hcidump/src/ |
bpasniff.c | 181 uint16_t plen; local 233 plen = ((hdr & 0x10) >> 4) | ((hdr & 0x08) >> 2) | (hdr & 0x04) | ((hdr & 0x02) << 2) | ((hdr & 0x01) << 4); 237 plen = plen | ((hdr & 0x80) >> 2) | (hdr & 0x40) | ((hdr & 0x20) << 2) | ((hdr & 0x08) << 4); 241 printf("%s: addr 0x%02x flow %d arqn %d seqn %d hec 0x%02x llid %d pflow %d plen %d\n", 242 type2str(type), addr, flow, arqn, seqn, hec, llid, pflow, plen); 247 frm.data_len = plen;
|
/external/dbus/tools/ |
dbus-launch-x11.c | 55 int plen; local 57 plen = strlen (prefix); 59 if (strncmp (s, prefix, plen) == 0) 61 memmove (s, s + plen, strlen (s) - plen + 1);
|
/external/dropbear/ |
svr-chansession.c | 1027 int plen, vlen; local 1029 plen = strlen(param); 1032 newvar = m_malloc(plen + vlen + 2); /* 2 is for '=' and '\0' */ 1033 memcpy(newvar, param, plen); 1034 newvar[plen] = '='; 1035 memcpy(&newvar[plen+1], var, vlen); 1036 newvar[plen+vlen+1] = '\0';
|
/external/openssl/ssl/ |
s3_pkt.c | 656 unsigned char *p,*plen; local 778 plen=p; 821 s2n(wr->length,plen); [all...] |
/external/qemu/hw/ |
bt-hci-csr.c | 138 ((struct hci_event_hdr *) ret)->plen = len; 282 return (((struct hci_command_hdr *) pkt)->plen + 1) & ~1; 284 return ((struct hci_command_hdr *) pkt)->plen; 286 return ((struct hci_event_hdr *) pkt)->plen; 303 int plen = s->in_len; local 309 memcpy(s->inpkt + plen, buf, len); 312 if (s->in_len >= 2 && plen < 2) 315 if (s->in_len >= s->in_hdr && plen < s->in_hdr) 325 plen = 0;
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.c | 126 size_t pos, plen; local 144 plen = buf_len - pos; 146 if (plen >= SHA256_MAC_LEN) { 152 os_memcpy(&buf[pos], hash, plen);
|