/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_wsc.c | 305 size_t send_len, plen; in eap_wsc_build_msg() local 321 plen = 2 + send_len; in eap_wsc_build_msg() 323 plen += 2; in eap_wsc_build_msg() 324 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_tls_common.c | 199 size_t send_len, plen; in eap_server_tls_build_msg() local 218 plen = 1 + send_len; in eap_server_tls_build_msg() 220 plen += 4; in eap_server_tls_build_msg() 222 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); in eap_server_tls_build_msg()
|
H A D | eap_server_tnc.c | 222 size_t send_len, plen; in eap_tnc_build_msg() local 237 plen = 1 + send_len; in eap_tnc_build_msg() 239 plen += 4; in eap_tnc_build_msg() 240 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg()
|
H A D | eap_server_wsc.c | 190 size_t send_len, plen; in eap_wsc_build_msg() local 202 plen = 2 + send_len; in eap_wsc_build_msg() 204 plen += 2; in eap_wsc_build_msg() 205 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_tnc.c | 93 size_t send_len, plen; in eap_tnc_build_msg() local 110 plen = 1 + send_len; in eap_tnc_build_msg() 112 plen += 4; in eap_tnc_build_msg() 113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg()
|
H A D | eap_wsc.c | 307 size_t send_len, plen; in eap_wsc_build_msg() local 323 plen = 2 + send_len; in eap_wsc_build_msg() 325 plen += 2; in eap_wsc_build_msg() 326 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_tls_common.c | 200 size_t send_len, plen; in eap_server_tls_build_msg() local 219 plen = 1 + send_len; in eap_server_tls_build_msg() 221 plen += 4; in eap_server_tls_build_msg() 223 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); in eap_server_tls_build_msg()
|
H A D | eap_server_tnc.c | 222 size_t send_len, plen; in eap_tnc_build_msg() local 237 plen = 1 + send_len; in eap_tnc_build_msg() 239 plen += 4; in eap_tnc_build_msg() 240 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg()
|
H A D | eap_server_wsc.c | 192 size_t send_len, plen; in eap_wsc_build_msg() local 204 plen = 2 + send_len; in eap_wsc_build_msg() 206 plen += 2; in eap_wsc_build_msg() 207 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
|
/third_party/curl/tests/server/ |
H A D | socksd.c | 446 unsigned char plen; in sockit() local 461 plen = buffer[SOCKS5_ULEN + ulen + 1]; in sockit() 462 if(rc < 3 + ulen + plen) { in sockit() 463 logmsg("Too short packet for ulen %d plen %d: %zd", ulen, plen, rc); in sockit() 467 (plen != strlen(config.password)) || in sockit() 469 memcmp(&buffer[SOCKS5_UNAME + ulen + 1], config.password, plen)) { in sockit()
|
/third_party/toybox/lib/ |
H A D | lib.c | 554 // Existing buffers need len in *plen 555 // Returns amount of data read in *plen 556 char *readfileat(int dirfd, char *name, char *ibuf, off_t *plen) in readfileat() argument 563 if (CFG_TOYBOX_DEBUG && (ibuf ? !*plen : *plen)) error_exit("bad readfileat"); in readfileat() 568 if (!*plen) { in readfileat() 569 if ((len = fdlength(fd))>0) *plen = len; in readfileat() 571 } else len = *plen-1; in readfileat() 578 if (*plen || rlen<len) break; in readfileat() 586 *plen in readfileat() [all...] |
/third_party/pulseaudio/src/pulsecore/ |
H A D | pstream.c | 619 size_t plen; in prepare_next_write_item() local 623 p->write.data = (void *) pa_packet_data(p->write.current->packet, &plen); in prepare_next_write_item() 624 p->write.descriptor[PA_PSTREAM_DESCRIPTOR_LENGTH] = htonl((uint32_t) plen); in prepare_next_write_item() 626 if (plen <= MINIBUF_SIZE - PA_PSTREAM_DESCRIPTOR_SIZE) { in prepare_next_write_item() 627 memcpy(&p->write.minibuf[PA_PSTREAM_DESCRIPTOR_SIZE], p->write.data, plen); in prepare_next_write_item() 628 p->write.minibuf_validsize = PA_PSTREAM_DESCRIPTOR_SIZE + plen; in prepare_next_write_item() 972 size_t plen; in do_read() local 981 re->data = (void *) pa_packet_data(re->packet, &plen); in do_read()
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/ |
H A D | pkcs5.h | 80 * \param plen Length of password 90 size_t plen, const unsigned char *salt, size_t slen,
|
/third_party/backends/backend/ |
H A D | snapscan-sources.h | 60 typedef SANE_Status (*SourceGet) (Source *ps, SANE_Byte *pbuf, SANE_Int *plen);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_common.h | 24 const struct wpabuf *msg, size_t *plen);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_common.h | 24 const struct wpabuf *msg, size_t *plen);
|
/third_party/musl/src/network/ |
H A D | getnameinfo.c | 136 static int dns_parse_callback(void *c, int rr, const void *data, int len, const void *packet, int plen) in dns_parse_callback() argument 139 if (__dn_expand(packet, (const unsigned char *)packet + plen, in dns_parse_callback()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | dh_ctrl.c | 265 int EVP_PKEY_CTX_get_dh_kdf_outlen(EVP_PKEY_CTX *ctx, int *plen) in EVP_PKEY_CTX_get_dh_kdf_outlen() argument 285 *plen = (int)len; in EVP_PKEY_CTX_get_dh_kdf_outlen()
|
/third_party/openssl/crypto/evp/ |
H A D | dh_ctrl.c | 265 int EVP_PKEY_CTX_get_dh_kdf_outlen(EVP_PKEY_CTX *ctx, int *plen) in EVP_PKEY_CTX_get_dh_kdf_outlen() argument 285 *plen = (int)len; in EVP_PKEY_CTX_get_dh_kdf_outlen()
|
/device/soc/rockchip/common/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd_wifi6/include/ |
H A D | bcmarp.h | 58 uint8 plen; /* Protocol address length (IP = 4) */ member
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap-new.c | 107 static int chap_print_pkt(const unsigned char *p, int plen, 593 static int chap_print_pkt(const unsigned char *p, int plen, argument 599 if (plen < CHAP_HDRLEN) 604 if (len < CHAP_HDRLEN || len > plen)
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | rsa.h | 117 # define EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx, plen) \ 119 EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN, 0, plen) 355 const unsigned char *param, int plen, 360 int plen, const EVP_MD *md,
|
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | asn_mime.c | 58 static int strip_eol(char *linebuf, int *plen, int flags); 1002 static int strip_eol(char *linebuf, int *plen, int flags) in strip_eol() argument 1004 int len = *plen; in strip_eol() 1018 *plen = len; in strip_eol() 1034 *plen = len; in strip_eol()
|
/third_party/openssl/crypto/asn1/ |
H A D | asn_mime.c | 58 static int strip_eol(char *linebuf, int *plen, int flags); 996 static int strip_eol(char *linebuf, int *plen, int flags) in strip_eol() argument 998 int len = *plen; in strip_eol() 1012 *plen = len; in strip_eol() 1028 *plen = len; in strip_eol()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ibss_rsn.c | 720 size_t plen; in ibss_rsn_eapol_dst_supp() local 729 plen = be_to_host16(hdr->length); in ibss_rsn_eapol_dst_supp() 739 if (plen > len - sizeof(*hdr) || plen < sizeof(*key)) { in ibss_rsn_eapol_dst_supp() 742 (unsigned long) plen, (unsigned long) len); in ibss_rsn_eapol_dst_supp()
|