/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | ikev2.c | 317 int plen; in ikev2_process_sai1() local 323 plen = ikev2_parse_proposal(&prop, pos, end); in ikev2_process_sai1() 324 if (plen < 0) in ikev2_process_sai1() 334 pos += plen; in ikev2_process_sai1() 845 size_t plen; in ikev2_build_sar1() local 870 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; in ikev2_build_sar1() 871 WPA_PUT_BE16(t->transform_length, plen); in ikev2_build_sar1() 890 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; in ikev2_build_sar1() 891 WPA_PUT_BE16(p->proposal_length, plen); in ikev2_build_sar1() 893 plen in ikev2_build_sar1() 904 size_t plen; ikev2_build_ker() local 940 size_t plen; ikev2_build_nr() local 959 size_t plen; ikev2_build_idr() local 985 size_t plen; ikev2_build_auth() local 1025 size_t plen; ikev2_build_notification() local [all...] |
/kernel/linux/linux-5.10/security/keys/ |
H A D | keyctl.c | 77 size_t, plen, in SYSCALL_DEFINE5() 86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5() 114 if (plen) { in SYSCALL_DEFINE5() 116 payload = kvmalloc(plen, GFP_KERNEL); in SYSCALL_DEFINE5() 121 if (copy_from_user(payload, _payload, plen) != 0) in SYSCALL_DEFINE5() 135 payload, plen, KEY_PERM_UNDEF, in SYSCALL_DEFINE5() 147 kvfree_sensitive(payload, plen); in SYSCALL_DEFINE5() 327 size_t plen) in keyctl_update_key() 334 if (plen > PAGE_SIZE) in keyctl_update_key() 339 if (plen) { in keyctl_update_key() 325 keyctl_update_key(key_serial_t id, const void __user *_payload, size_t plen) keyctl_update_key() argument 1179 size_t plen = from ? iov_iter_count(from) : 0; keyctl_instantiate_key_common() local 1249 keyctl_instantiate_key(key_serial_t id, const void __user *_payload, size_t plen, key_serial_t ringid) keyctl_instantiate_key() argument [all...] |
/kernel/linux/linux-6.6/security/keys/ |
H A D | keyctl.c | 77 size_t, plen, in SYSCALL_DEFINE5() 86 if (plen > 1024 * 1024 - 1) in SYSCALL_DEFINE5() 114 if (plen) { in SYSCALL_DEFINE5() 116 payload = kvmalloc(plen, GFP_KERNEL); in SYSCALL_DEFINE5() 121 if (copy_from_user(payload, _payload, plen) != 0) in SYSCALL_DEFINE5() 135 payload, plen, KEY_PERM_UNDEF, in SYSCALL_DEFINE5() 147 kvfree_sensitive(payload, plen); in SYSCALL_DEFINE5() 327 size_t plen) in keyctl_update_key() 334 if (plen > PAGE_SIZE) in keyctl_update_key() 339 if (plen) { in keyctl_update_key() 325 keyctl_update_key(key_serial_t id, const void __user *_payload, size_t plen) keyctl_update_key() argument 1179 size_t plen = from ? iov_iter_count(from) : 0; keyctl_instantiate_key_common() local 1249 keyctl_instantiate_key(key_serial_t id, const void __user *_payload, size_t plen, key_serial_t ringid) keyctl_instantiate_key() argument [all...] |
/third_party/FreeBSD/sys/dev/usb/ |
H A D | usb_if.h | 21 /* pointer to the device request */ void **pptr, /* data pointer */ uint16_t *plen, /* maximum transfer length */ uint16_t offset, /* data offset */ uint8_t *pstate); 24 /* pointer to the device request */ void **pptr, /* data pointer */ uint16_t *plen, /* maximum transfer length */ uint16_t offset, /* data offset */ uint8_t *pstate) in USB_HANDLE_REQUEST() 28 return ((usb_handle_request_t *) _m)(dev, req, pptr, plen, offset, pstate); in USB_HANDLE_REQUEST() 23 USB_HANDLE_REQUEST(device_t dev, const void *req, void **pptr, uint16_t *plen, uint16_t offset, uint8_t *pstate) USB_HANDLE_REQUEST() argument
|
/third_party/musl/src/stdio/ |
H A D | fgetln.c | 5 char *fgetln(FILE *f, size_t *plen) in fgetln() argument 13 *plen = ++z - ret; in fgetln() 16 *plen = l; in fgetln()
|
/kernel/linux/linux-5.10/net/xfrm/ |
H A D | xfrm_ipcomp.c | 41 const int plen = skb->len; in ipcomp_decompress() local 47 int err = crypto_comp_decompress(tfm, start, plen, scratch, &dlen); in ipcomp_decompress() 53 if (dlen < (plen + sizeof(struct ip_comp_hdr))) { in ipcomp_decompress() 58 len = dlen - plen; in ipcomp_decompress() 64 len += plen; in ipcomp_decompress() 137 const int plen = skb->len; in ipcomp_compress() local 147 err = crypto_comp_compress(tfm, start, plen, scratch, &dlen); in ipcomp_compress() 151 if ((dlen + sizeof(struct ip_comp_hdr)) >= plen) { in ipcomp_compress()
|
/kernel/linux/linux-6.6/net/xfrm/ |
H A D | xfrm_ipcomp.c | 41 const int plen = skb->len; in ipcomp_decompress() local 46 int err = crypto_comp_decompress(tfm, start, plen, scratch, &dlen); in ipcomp_decompress() 52 if (dlen < (plen + sizeof(struct ip_comp_hdr))) in ipcomp_decompress() 55 len = dlen - plen; in ipcomp_decompress() 61 len += plen; in ipcomp_decompress() 125 const int plen = skb->len; in ipcomp_compress() local 135 err = crypto_comp_compress(tfm, start, plen, scratch, &dlen); in ipcomp_compress() 139 if ((dlen + sizeof(struct ip_comp_hdr)) >= plen) { in ipcomp_compress()
|
/kernel/linux/linux-5.10/net/netfilter/ |
H A D | nf_conntrack_ftp.c | 70 size_t plen; member 79 .plen = sizeof("PORT") - 1, 87 .plen = sizeof("EPRT") - 1, 97 .plen = sizeof("227 ") - 1, 103 .plen = sizeof("229 ") - 1, 291 const char *pattern, size_t plen, in find_pattern() 300 size_t i = plen; in find_pattern() 304 if (dlen <= plen) { in find_pattern() 311 if (strncasecmp(data, pattern, plen) != 0) in find_pattern() 318 for (i = plen; dat in find_pattern() 290 find_pattern(const char *data, size_t dlen, const char *pattern, size_t plen, char skip, char term, unsigned int *numoff, unsigned int *numlen, struct nf_conntrack_man *cmd, int (*getnum)(const char *, size_t, struct nf_conntrack_man *, char, unsigned int *)) find_pattern() argument [all...] |
/kernel/linux/linux-6.6/net/netfilter/ |
H A D | nf_conntrack_ftp.c | 66 size_t plen; member 75 .plen = sizeof("PORT") - 1, 83 .plen = sizeof("EPRT") - 1, 93 .plen = sizeof("227 ") - 1, 99 .plen = sizeof("229 ") - 1, 287 const char *pattern, size_t plen, in find_pattern() 296 size_t i = plen; in find_pattern() 300 if (dlen <= plen) { in find_pattern() 307 if (strncasecmp(data, pattern, plen) != 0) in find_pattern() 314 for (i = plen; dat in find_pattern() 286 find_pattern(const char *data, size_t dlen, const char *pattern, size_t plen, char skip, char term, unsigned int *numoff, unsigned int *numlen, struct nf_conntrack_man *cmd, int (*getnum)(const char *, size_t, struct nf_conntrack_man *, char, unsigned int *)) find_pattern() argument [all...] |
/third_party/ltp/testcases/kernel/pty/ |
H A D | pty04.c | 376 int rlen, plen = 0; in read_netdev() local 381 plen = mtu - 1; in read_netdev() 384 plen = CAN_MTU; in read_netdev() 387 data = tst_alloc(plen); in read_netdev() 391 TEST(try_sync_read(sk, data, plen)); in read_netdev() 394 check_data(ldisc, data, plen); in read_netdev() 397 TEST(try_sync_read(sk, data, plen)); in read_netdev() 400 check_data(ldisc, data, plen); in read_netdev() 403 TEST(try_sync_write(sk, data, plen)); in read_netdev() 410 if (try_sync_write(sk, data, plen) < in read_netdev() [all...] |
/kernel/linux/linux-6.6/crypto/ |
H A D | af_alg.c | 716 size_t plen = min_t(size_t, used, sg[i].length); in af_alg_pull_tsgl() local 727 if (dst_offset >= plen) { in af_alg_pull_tsgl() 729 dst_offset -= plen; in af_alg_pull_tsgl() 734 plen - dst_offset, in af_alg_pull_tsgl() 741 sg[i].length -= plen; in af_alg_pull_tsgl() 742 sg[i].offset += plen; in af_alg_pull_tsgl() 744 used -= plen; in af_alg_pull_tsgl() 745 ctx->used -= plen; in af_alg_pull_tsgl() 995 ssize_t plen; in af_alg_sendmsg() local 1047 plen in af_alg_sendmsg() [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 413 size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and in aesni_cbc_hmac_sha1_cipher() local 428 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha1_cipher() 429 plen = len; in aesni_cbc_hmac_sha1_cipher() 431 ((plen + SHA_DIGEST_LENGTH + in aesni_cbc_hmac_sha1_cipher() 438 if (plen > (sha_off + iv) in aesni_cbc_hmac_sha1_cipher() 439 && (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { in aesni_cbc_hmac_sha1_cipher() 456 SHA1_Update(&key->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha1_cipher() 458 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha1_cipher() 460 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha1_cipher() 463 SHA1_Final(out + plen, in aesni_cbc_hmac_sha1_cipher() [all...] |
H A D | e_aes_cbc_hmac_sha256.c | 428 size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and in aesni_cbc_hmac_sha256_cipher() local 443 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha256_cipher() 444 plen = len; in aesni_cbc_hmac_sha256_cipher() 446 ((plen + SHA256_DIGEST_LENGTH + in aesni_cbc_hmac_sha256_cipher() 467 plen > (sha_off + iv) && in aesni_cbc_hmac_sha256_cipher() 468 (blocks = (plen - (sha_off + iv)) / SHA256_CBLOCK)) { in aesni_cbc_hmac_sha256_cipher() 485 SHA256_Update(&key->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha256_cipher() 487 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha256_cipher() 489 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha256_cipher() 492 SHA256_Final(out + plen, in aesni_cbc_hmac_sha256_cipher() [all...] |
/third_party/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 413 size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and in aesni_cbc_hmac_sha1_cipher() local 428 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha1_cipher() 429 plen = len; in aesni_cbc_hmac_sha1_cipher() 431 ((plen + SHA_DIGEST_LENGTH + in aesni_cbc_hmac_sha1_cipher() 438 if (plen > (sha_off + iv) in aesni_cbc_hmac_sha1_cipher() 439 && (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { in aesni_cbc_hmac_sha1_cipher() 456 SHA1_Update(&key->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha1_cipher() 458 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha1_cipher() 460 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha1_cipher() 463 SHA1_Final(out + plen, in aesni_cbc_hmac_sha1_cipher() [all...] |
H A D | e_aes_cbc_hmac_sha256.c | 428 size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and in aesni_cbc_hmac_sha256_cipher() local 443 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha256_cipher() 444 plen = len; in aesni_cbc_hmac_sha256_cipher() 446 ((plen + SHA256_DIGEST_LENGTH + in aesni_cbc_hmac_sha256_cipher() 467 plen > (sha_off + iv) && in aesni_cbc_hmac_sha256_cipher() 468 (blocks = (plen - (sha_off + iv)) / SHA256_CBLOCK)) { in aesni_cbc_hmac_sha256_cipher() 485 SHA256_Update(&key->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha256_cipher() 487 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha256_cipher() 489 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha256_cipher() 492 SHA256_Final(out + plen, in aesni_cbc_hmac_sha256_cipher() [all...] |
/kernel/linux/linux-5.10/net/6lowpan/ |
H A D | iphc.c | 218 ipv6_addr_prefix(&addr_pfx, addr, table[i].plen); in lowpan_iphc_ctx_get_by_addr() 221 * zero. Otherwise we use table[i]->plen. in lowpan_iphc_ctx_get_by_addr() 223 if (table[i].plen < 64) in lowpan_iphc_ctx_get_by_addr() 226 addr_plen = table[i].plen; in lowpan_iphc_ctx_get_by_addr() 236 if (table[i].plen > ret->plen) in lowpan_iphc_ctx_get_by_addr() 264 /* setting plen */ in lowpan_iphc_ctx_get_by_mcast_addr() 265 addr_mcast.s6_addr[3] = table[i].plen; in lowpan_iphc_ctx_get_by_mcast_addr() 268 table[i].plen); in lowpan_iphc_ctx_get_by_mcast_addr() 384 ipv6_addr_prefix_copy(ipaddr, &ctx->pfx, ctx->plen); in lowpan_iphc_uncompress_ctx_addr() [all...] |
/kernel/linux/linux-6.6/net/6lowpan/ |
H A D | iphc.c | 218 ipv6_addr_prefix(&addr_pfx, addr, table[i].plen); in lowpan_iphc_ctx_get_by_addr() 221 * zero. Otherwise we use table[i]->plen. in lowpan_iphc_ctx_get_by_addr() 223 if (table[i].plen < 64) in lowpan_iphc_ctx_get_by_addr() 226 addr_plen = table[i].plen; in lowpan_iphc_ctx_get_by_addr() 236 if (table[i].plen > ret->plen) in lowpan_iphc_ctx_get_by_addr() 264 /* setting plen */ in lowpan_iphc_ctx_get_by_mcast_addr() 265 addr_mcast.s6_addr[3] = table[i].plen; in lowpan_iphc_ctx_get_by_mcast_addr() 268 table[i].plen); in lowpan_iphc_ctx_get_by_mcast_addr() 384 ipv6_addr_prefix_copy(ipaddr, &ctx->pfx, ctx->plen); in lowpan_iphc_uncompress_ctx_addr() [all...] |
/kernel/linux/linux-6.6/drivers/mtd/parsers/ |
H A D | ofpart_core.c | 213 int i, plen, nr_parts; in parse_ofoldpart_partitions() local 224 part = of_get_property(dp, "partitions", &plen); in parse_ofoldpart_partitions() 230 nr_parts = plen / sizeof(part[0]); in parse_ofoldpart_partitions() 236 names = of_get_property(dp, "partition-names", &plen); in parse_ofoldpart_partitions() 245 if (names && (plen > 0)) { in parse_ofoldpart_partitions() 249 plen -= len; in parse_ofoldpart_partitions()
|
/kernel/linux/linux-6.6/include/net/bluetooth/ |
H A D | hci_sync.h | 27 struct sk_buff *__hci_cmd_sync(struct hci_dev *hdev, u16 opcode, u32 plen, 29 struct sk_buff *hci_cmd_sync(struct hci_dev *hdev, u16 opcode, u32 plen, 31 struct sk_buff *__hci_cmd_sync_ev(struct hci_dev *hdev, u16 opcode, u32 plen, 33 struct sk_buff *__hci_cmd_sync_sk(struct hci_dev *hdev, u16 opcode, u32 plen, 36 int __hci_cmd_sync_status(struct hci_dev *hdev, u16 opcode, u32 plen, 38 int __hci_cmd_sync_status_sk(struct hci_dev *hdev, u16 opcode, u32 plen,
|
/kernel/linux/linux-6.6/drivers/nfc/nfcmrvl/ |
H A D | i2c.c | 39 nci_hdr.plen + NCI_CTRL_HDR_SIZE, GFP_KERNEL); in nfcmrvl_i2c_read() 46 if (nci_hdr.plen) { in nfcmrvl_i2c_read() 49 skb_put(*skb, nci_hdr.plen), in nfcmrvl_i2c_read() 50 nci_hdr.plen); in nfcmrvl_i2c_read() 52 if (ret != nci_hdr.plen) { in nfcmrvl_i2c_read() 55 ret, nci_hdr.plen); in nfcmrvl_i2c_read()
|
/kernel/linux/linux-5.10/drivers/scsi/libfc/ |
H A D | fc_disc.c | 384 size_t plen; in fc_disc_gpn_ft_parse() local 397 plen = len; in fc_disc_gpn_ft_parse() 403 plen = sizeof(*np) - tlen; in fc_disc_gpn_ft_parse() 404 WARN_ON(plen <= 0); in fc_disc_gpn_ft_parse() 405 WARN_ON(plen >= sizeof(*np)); in fc_disc_gpn_ft_parse() 406 if (plen > len) in fc_disc_gpn_ft_parse() 407 plen = len; in fc_disc_gpn_ft_parse() 409 memcpy((char *)np + tlen, bp, plen); in fc_disc_gpn_ft_parse() 417 plen += tlen; in fc_disc_gpn_ft_parse() 418 disc->buf_len = (unsigned char) plen; in fc_disc_gpn_ft_parse() [all...] |
/kernel/linux/linux-6.6/drivers/scsi/libfc/ |
H A D | fc_disc.c | 381 size_t plen; in fc_disc_gpn_ft_parse() local 394 plen = len; in fc_disc_gpn_ft_parse() 400 plen = sizeof(*np) - tlen; in fc_disc_gpn_ft_parse() 401 WARN_ON(plen <= 0); in fc_disc_gpn_ft_parse() 402 WARN_ON(plen >= sizeof(*np)); in fc_disc_gpn_ft_parse() 403 if (plen > len) in fc_disc_gpn_ft_parse() 404 plen = len; in fc_disc_gpn_ft_parse() 406 memcpy((char *)np + tlen, bp, plen); in fc_disc_gpn_ft_parse() 414 plen += tlen; in fc_disc_gpn_ft_parse() 415 disc->buf_len = (unsigned char) plen; in fc_disc_gpn_ft_parse() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha256_hw.c | 402 size_t plen = ctx->payload_length; in aesni_cbc_hmac_sha256_cipher() local 413 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha256_cipher() 414 plen = len; in aesni_cbc_hmac_sha256_cipher() 416 ((plen + SHA256_DIGEST_LENGTH + in aesni_cbc_hmac_sha256_cipher() 436 plen > (sha_off + iv) && in aesni_cbc_hmac_sha256_cipher() 437 (blocks = (plen - (sha_off + iv)) / SHA256_CBLOCK)) { in aesni_cbc_hmac_sha256_cipher() 454 sha256_update(&sctx->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha256_cipher() 456 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha256_cipher() 458 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha256_cipher() 461 SHA256_Final(out + plen, in aesni_cbc_hmac_sha256_cipher() [all...] |
/third_party/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha256_hw.c | 402 size_t plen = ctx->payload_length; in aesni_cbc_hmac_sha256_cipher() local 413 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha256_cipher() 414 plen = len; in aesni_cbc_hmac_sha256_cipher() 416 ((plen + SHA256_DIGEST_LENGTH + in aesni_cbc_hmac_sha256_cipher() 436 plen > (sha_off + iv) && in aesni_cbc_hmac_sha256_cipher() 437 (blocks = (plen - (sha_off + iv)) / SHA256_CBLOCK)) { in aesni_cbc_hmac_sha256_cipher() 454 sha256_update(&sctx->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha256_cipher() 456 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha256_cipher() 458 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha256_cipher() 461 SHA256_Final(out + plen, in aesni_cbc_hmac_sha256_cipher() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | ikev2.c | 323 int plen; in ikev2_process_sar1() local 329 plen = ikev2_parse_proposal(data, &prop, pos, end); in ikev2_process_sar1() 330 if (plen < 0) in ikev2_process_sar1() 338 pos += plen; in ikev2_process_sar1() 907 size_t plen; in ikev2_build_sai() local 933 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; in ikev2_build_sai() 934 WPA_PUT_BE16(t->transform_length, plen); in ikev2_build_sai() 953 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; in ikev2_build_sai() 954 WPA_PUT_BE16(p->proposal_length, plen); in ikev2_build_sai() 956 plen in ikev2_build_sai() 967 size_t plen; ikev2_build_kei() local 1004 size_t plen; ikev2_build_ni() local 1023 size_t plen; ikev2_build_idi() local 1049 size_t plen; ikev2_build_auth() local [all...] |