/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
ieee802_11_common.c | 22 static int ieee802_11_parse_vendor_specific(u8 *pos, size_t elen, 31 if (elen < 4) { 35 (unsigned long) elen); 50 elems->wpa_ie_len = elen; 54 if (elen < 5) { 58 (unsigned long) elen); 71 elems->wmm_len = elen; 75 elems->wmm_tspec_len = elen; 81 pos[4], (unsigned long) elen); 88 elems->wps_ie_len = elen; 145 u8 id, elen; local [all...] |
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.c | 22 static int ieee802_11_parse_vendor_specific(const u8 *pos, size_t elen, 31 if (elen < 4) { 35 (unsigned long) elen); 50 elems->wpa_ie_len = elen; 54 if (elen < 5) { 58 (unsigned long) elen); 71 elems->wmm_len = elen; 75 elems->wmm_tspec_len = elen; 81 pos[4], (unsigned long) elen); 88 elems->wps_ie_len = elen; 161 u8 id, elen; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_attr_parse.c | 81 u8 id, elen; local 85 elen = *pos++; 86 if (pos + elen > end) 88 if (wps_set_vendor_ext_wfa_subelem(attr, id, elen, pos) < 0) 90 pos += elen;
|
/external/wpa_supplicant/ |
base64.c | 161 size_t len, elen; local 174 e = base64_encode(buf, len, &elen); 176 e = base64_decode(buf, len, &elen); 182 fwrite(e, 1, elen, f);
|
eap_md5.c | 47 size_t elen[3]; local 102 elen[0] = 1; 104 elen[1] = password_len; 106 elen[2] = challenge_len; 107 md5_vector(3, addr, elen, rpos);
|
eap_leap.c | 335 size_t elen[5], password_len; local 362 elen[0] = 16; 364 elen[1] = LEAP_CHALLENGE_LEN; 366 elen[2] = LEAP_RESPONSE_LEN; 368 elen[3] = LEAP_CHALLENGE_LEN; 370 elen[4] = LEAP_RESPONSE_LEN; 371 md5_vector(5, addr, elen, key);
|
radius.c | 697 size_t elen[3]; local 702 elen[0] = sizeof(tv); 704 elen[1] = len; 706 elen[2] = sizeof(l); 707 md5_vector(3, addr, elen, msg->hdr->authenticator); 786 size_t elen[3]; local 811 elen[0] = secret_len; 814 elen[1] = MD5_MAC_LEN; 816 elen[2] = 2; /* Salt */ 819 elen[1] = MD5_MAC_LEN 979 size_t elen; local [all...] |
mlme.c | 358 u8 id, elen; local 361 elen = *pos++; 364 if (elen > left) { 367 "parse failed (id=%d elen=%d left=%d)", 368 id, elen, left); 376 elems->ssid_len = elen; 380 elems->supp_rates_len = elen; 384 elems->fh_params_len = elen; 388 elems->ds_params_len = elen; 392 elems->cf_params_len = elen; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
base64.c | 162 size_t len, elen; local 175 e = base64_encode(buf, len, &elen); 177 e = base64_decode(buf, len, &elen); 183 fwrite(e, 1, elen, f);
|
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 437 size_t elen = strlen(msg); local 439 err.length = htons(elen); 441 memcpy(cursor, &err, elen + TAG_HDR_SIZE); 442 cursor += elen + TAG_HDR_SIZE; 443 plen += elen + TAG_HDR_SIZE;
|
/external/bluetooth/bluez/attrib/ |
att.c | 198 uint16_t elen, num; local 204 elen = pdu[1]; 205 num = (len - 2) / elen; 206 list = att_data_list_alloc(num, elen); 422 uint16_t elen, num; local 428 elen = pdu[1]; 429 num = (len - 2) / elen; 430 list = att_data_list_alloc(num, elen); 790 uint16_t elen, num; local 803 elen = sizeof(pdu[0]) + sizeof(*format) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_leap.c | 334 size_t elen[5], password_len; local 366 elen[0] = 16; 368 elen[1] = LEAP_CHALLENGE_LEN; 370 elen[2] = LEAP_RESPONSE_LEN; 372 elen[3] = LEAP_CHALLENGE_LEN; 374 elen[4] = LEAP_RESPONSE_LEN; 375 md5_vector(5, addr, elen, key);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 341 size_t elen[5], password_len; local 379 elen[0] = 16; 381 elen[1] = LEAP_CHALLENGE_LEN; 383 elen[2] = LEAP_RESPONSE_LEN; 385 elen[3] = LEAP_CHALLENGE_LEN; 387 elen[4] = LEAP_RESPONSE_LEN; 388 md5_vector(5, addr, elen, key);
|
/external/dhcpcd/ |
configure.c | 169 ssize_t e, elen, l; local 174 elen = 8; 175 env = xmalloc(sizeof(char *) * (elen + 1)); 210 env[elen] = xmalloc(e); 211 snprintf(env[elen++], e, "profile=%s", iface->state->profile); 218 env = xrealloc(env, sizeof(char *) * (elen + 2)); 219 env[elen] = xmalloc(e); 220 snprintf(env[elen++], e, "new_ssid=%s", iface->ssid); 225 env = xrealloc(env, sizeof(char *) * (elen + 2)); 226 env[elen] = xmalloc(e) 274 ssize_t elen; local 300 ssize_t e, elen = 0; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 702 size_t elen[3]; local 707 elen[0] = sizeof(tv); 709 elen[1] = len; 711 elen[2] = sizeof(l); 712 md5_vector(3, addr, elen, msg->hdr->authenticator); 791 size_t elen[3]; local 816 elen[0] = secret_len; 819 elen[1] = MD5_MAC_LEN; 821 elen[2] = 2; /* Salt */ 824 elen[1] = MD5_MAC_LEN 983 size_t elen; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 744 size_t elen[3]; local 749 elen[0] = sizeof(tv); 751 elen[1] = len; 753 elen[2] = sizeof(l); 754 md5_vector(3, addr, elen, msg->hdr->authenticator); 833 size_t elen[3]; local 858 elen[0] = secret_len; 861 elen[1] = MD5_MAC_LEN; 863 elen[2] = 2; /* Salt */ 866 elen[1] = MD5_MAC_LEN 1025 size_t elen; local [all...] |
/external/openssl/apps/ |
req.c | 1571 int elen, slen; local [all...] |
/external/mksh/src/ |
funcs.c | 399 int ilen, olen, nlen, elen; local 418 elen = strlen(current_wd + ilen + olen) + 1; 419 dir = allocd = alloc(ilen + nlen + elen, ATEMP); 422 memcpy(dir + ilen + nlen, current_wd + ilen + olen, elen); [all...] |
/external/tcpdump/ |
print-bgp.c | 123 u_int16_t elen; member in union:bgp_attr::__anon11483 127 EXTRACT_16BITS(&(p)->bgpa_len.elen) : (p)->bgpa_len.len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
eapol_supp_sm.c | 1180 u16 elen; local 1182 elen = be_to_host16(ehdr->length); 1183 if (elen > plen && elen <= len - sizeof(*hdr)) { 1193 "%d -> %d", (int) plen, elen); 1194 plen = elen; [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 1217 u16 elen; local [all...] |