Home
last modified time | relevance | path

Searched refs:plen (Results 151 - 175 of 432) sorted by relevance

12345678910>>...18

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_wsc.c305 size_t send_len, plen; in eap_wsc_build_msg() local
321 plen = 2 + send_len; in eap_wsc_build_msg()
323 plen += 2; in eap_wsc_build_msg()
324 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_tls_common.c199 size_t send_len, plen; in eap_server_tls_build_msg() local
218 plen = 1 + send_len; in eap_server_tls_build_msg()
220 plen += 4; in eap_server_tls_build_msg()
222 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); in eap_server_tls_build_msg()
H A Deap_server_tnc.c222 size_t send_len, plen; in eap_tnc_build_msg() local
237 plen = 1 + send_len; in eap_tnc_build_msg()
239 plen += 4; in eap_tnc_build_msg()
240 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg()
H A Deap_server_wsc.c190 size_t send_len, plen; in eap_wsc_build_msg() local
202 plen = 2 + send_len; in eap_wsc_build_msg()
204 plen += 2; in eap_wsc_build_msg()
205 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_tnc.c93 size_t send_len, plen; in eap_tnc_build_msg() local
110 plen = 1 + send_len; in eap_tnc_build_msg()
112 plen += 4; in eap_tnc_build_msg()
113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg()
H A Deap_wsc.c307 size_t send_len, plen; in eap_wsc_build_msg() local
323 plen = 2 + send_len; in eap_wsc_build_msg()
325 plen += 2; in eap_wsc_build_msg()
326 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_tls_common.c200 size_t send_len, plen; in eap_server_tls_build_msg() local
219 plen = 1 + send_len; in eap_server_tls_build_msg()
221 plen += 4; in eap_server_tls_build_msg()
223 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); in eap_server_tls_build_msg()
H A Deap_server_tnc.c222 size_t send_len, plen; in eap_tnc_build_msg() local
237 plen = 1 + send_len; in eap_tnc_build_msg()
239 plen += 4; in eap_tnc_build_msg()
240 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg()
H A Deap_server_wsc.c192 size_t send_len, plen; in eap_wsc_build_msg() local
204 plen = 2 + send_len; in eap_wsc_build_msg()
206 plen += 2; in eap_wsc_build_msg()
207 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
/third_party/curl/tests/server/
H A Dsocksd.c446 unsigned char plen; in sockit() local
461 plen = buffer[SOCKS5_ULEN + ulen + 1]; in sockit()
462 if(rc < 3 + ulen + plen) { in sockit()
463 logmsg("Too short packet for ulen %d plen %d: %zd", ulen, plen, rc); in sockit()
467 (plen != strlen(config.password)) || in sockit()
469 memcmp(&buffer[SOCKS5_UNAME + ulen + 1], config.password, plen)) { in sockit()
/third_party/toybox/lib/
H A Dlib.c554 // Existing buffers need len in *plen
555 // Returns amount of data read in *plen
556 char *readfileat(int dirfd, char *name, char *ibuf, off_t *plen) in readfileat() argument
563 if (CFG_TOYBOX_DEBUG && (ibuf ? !*plen : *plen)) error_exit("bad readfileat"); in readfileat()
568 if (!*plen) { in readfileat()
569 if ((len = fdlength(fd))>0) *plen = len; in readfileat()
571 } else len = *plen-1; in readfileat()
578 if (*plen || rlen<len) break; in readfileat()
586 *plen in readfileat()
[all...]
/third_party/pulseaudio/src/pulsecore/
H A Dpstream.c619 size_t plen; in prepare_next_write_item() local
623 p->write.data = (void *) pa_packet_data(p->write.current->packet, &plen); in prepare_next_write_item()
624 p->write.descriptor[PA_PSTREAM_DESCRIPTOR_LENGTH] = htonl((uint32_t) plen); in prepare_next_write_item()
626 if (plen <= MINIBUF_SIZE - PA_PSTREAM_DESCRIPTOR_SIZE) { in prepare_next_write_item()
627 memcpy(&p->write.minibuf[PA_PSTREAM_DESCRIPTOR_SIZE], p->write.data, plen); in prepare_next_write_item()
628 p->write.minibuf_validsize = PA_PSTREAM_DESCRIPTOR_SIZE + plen; in prepare_next_write_item()
972 size_t plen; in do_read() local
981 re->data = (void *) pa_packet_data(re->packet, &plen); in do_read()
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/
H A Dpkcs5.h80 * \param plen Length of password
90 size_t plen, const unsigned char *salt, size_t slen,
/third_party/backends/backend/
H A Dsnapscan-sources.h60 typedef SANE_Status (*SourceGet) (Source *ps, SANE_Byte *pbuf, SANE_Int *plen);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_common.h24 const struct wpabuf *msg, size_t *plen);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_common.h24 const struct wpabuf *msg, size_t *plen);
/third_party/musl/src/network/
H A Dgetnameinfo.c136 static int dns_parse_callback(void *c, int rr, const void *data, int len, const void *packet, int plen) in dns_parse_callback() argument
139 if (__dn_expand(packet, (const unsigned char *)packet + plen, in dns_parse_callback()
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Ddh_ctrl.c265 int EVP_PKEY_CTX_get_dh_kdf_outlen(EVP_PKEY_CTX *ctx, int *plen) in EVP_PKEY_CTX_get_dh_kdf_outlen() argument
285 *plen = (int)len; in EVP_PKEY_CTX_get_dh_kdf_outlen()
/third_party/openssl/crypto/evp/
H A Ddh_ctrl.c265 int EVP_PKEY_CTX_get_dh_kdf_outlen(EVP_PKEY_CTX *ctx, int *plen) in EVP_PKEY_CTX_get_dh_kdf_outlen() argument
285 *plen = (int)len; in EVP_PKEY_CTX_get_dh_kdf_outlen()
/device/soc/rockchip/common/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd_wifi6/include/
H A Dbcmarp.h58 uint8 plen; /* Protocol address length (IP = 4) */ member
/third_party/lwip/src/netif/ppp/
H A Dchap-new.c107 static int chap_print_pkt(const unsigned char *p, int plen,
593 static int chap_print_pkt(const unsigned char *p, int plen, argument
599 if (plen < CHAP_HDRLEN)
604 if (len < CHAP_HDRLEN || len > plen)
/third_party/openssl/ohos_lite/include/openssl/
H A Drsa.h117 # define EVP_PKEY_CTX_get_rsa_pss_saltlen(ctx, plen) \
119 EVP_PKEY_CTRL_GET_RSA_PSS_SALTLEN, 0, plen)
355 const unsigned char *param, int plen,
360 int plen, const EVP_MD *md,
/third_party/node/deps/openssl/openssl/crypto/asn1/
H A Dasn_mime.c58 static int strip_eol(char *linebuf, int *plen, int flags);
1002 static int strip_eol(char *linebuf, int *plen, int flags) in strip_eol() argument
1004 int len = *plen; in strip_eol()
1018 *plen = len; in strip_eol()
1034 *plen = len; in strip_eol()
/third_party/openssl/crypto/asn1/
H A Dasn_mime.c58 static int strip_eol(char *linebuf, int *plen, int flags);
996 static int strip_eol(char *linebuf, int *plen, int flags) in strip_eol() argument
998 int len = *plen; in strip_eol()
1012 *plen = len; in strip_eol()
1028 *plen = len; in strip_eol()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dibss_rsn.c720 size_t plen; in ibss_rsn_eapol_dst_supp() local
729 plen = be_to_host16(hdr->length); in ibss_rsn_eapol_dst_supp()
739 if (plen > len - sizeof(*hdr) || plen < sizeof(*key)) { in ibss_rsn_eapol_dst_supp()
742 (unsigned long) plen, (unsigned long) len); in ibss_rsn_eapol_dst_supp()

Completed in 20 milliseconds

12345678910>>...18