Searched defs:plen (Results 26 - 50 of 228) sorted by relevance

12345678910

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_common.c55 * @plen: Pointer to variable to contain the returned payload length
62 * caller can just use the returned payload pointer (into *plen) for processing
67 const struct wpabuf *msg, size_t *plen)
99 *plen = len - sizeof(*hdr) - 8;
106 *plen = len - sizeof(*hdr) - 1;
66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_md5.c103 size_t plen; local
114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
/external/wpa_supplicant_8/src/crypto/
H A Dsha1-pbkdf2.c77 size_t left = buflen, plen; local
85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
86 os_memcpy(pos, digest, plen);
87 pos += plen;
88 left -= plen;
/external/wpa_supplicant_8/src/eap_common/
H A Deap_common.c55 * @plen: Pointer to variable to contain the returned payload length
62 * caller can just use the returned payload pointer (into *plen) for processing
67 const struct wpabuf *msg, size_t *plen)
99 *plen = len - sizeof(*hdr) - 8;
106 *plen = len - sizeof(*hdr) - 1;
66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_md5.c103 size_t plen; local
114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1-pbkdf2.c77 size_t left = buflen, plen; local
85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
86 os_memcpy(pos, digest, plen);
87 pos += plen;
88 left -= plen;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_common.c55 * @plen: Pointer to variable to contain the returned payload length
62 * caller can just use the returned payload pointer (into *plen) for processing
67 const struct wpabuf *msg, size_t *plen)
99 *plen = len - sizeof(*hdr) - 8;
106 *plen = len - sizeof(*hdr) - 1;
66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_md5.c103 size_t plen; local
114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
/external/openssl/crypto/evp/
H A De_rc4_hmac_md5.c127 size_t plen = key->payload_length; local
129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0;
132 if (plen==NO_PAYLOAD_LENGTH) plen = len;
137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) &&
155 MD5_Update(&key->md,in+md5_off,plen-md5_off);
157 if (plen!=len) { /* "TLS" mode of operation */
159 memcpy(out+rc4_off,in+rc4_off,plen
[all...]
H A Dp5_crpt2.c177 int plen; local
190 plen = param->value.sequence->length;
191 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) {
236 int saltlen, iter, plen; local
260 plen = param->value.sequence->length;
262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
H A De_aes_cbc_hmac_sha1.c177 size_t plen = key->payload_length, local
190 if (plen==NO_PAYLOAD_LENGTH)
191 plen = len;
192 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE))
198 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) {
214 SHA1_Update(&key->md,in+sha_off,plen-sha_off);
216 if (plen!=len) { /* "TLS" mode of operation */
218 memcpy(out+aes_off,in+aes_off,plen-aes_off);
221 SHA1_Final(out+plen,
[all...]
/external/openssl/crypto/rsa/
H A Drsa_oaep.c36 const unsigned char *param, int plen)
59 if (!EVP_Digest((void *)param, plen, db, NULL, EVP_sha1(), NULL))
96 const unsigned char *param, int plen)
114 * for side-channel attacks (e.g. timing if 'plen' is huge
149 if (!EVP_Digest((void *)param, plen, phash, NULL, EVP_sha1(), NULL))
34 RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen) argument
94 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) argument
H A Drsa_test.c219 int plen; local
230 plen = sizeof(ptext_ex) - 1;
248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
/external/ppp/pppd/plugins/rp-pppoe/
H A Ddiscovery.c250 UINT16_t plen; local
255 plen = TAG_HDR_SIZE + namelen;
256 CHECK_ROOM(cursor, packet.payload, plen);
287 plen += sizeof(pid) + TAG_HDR_SIZE;
290 packet.length = htons(plen);
292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
421 UINT16_t plen; local
426 plen = TAG_HDR_SIZE + namelen;
427 CHECK_ROOM(cursor, packet.payload, plen);
455 plen
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.c356 size_t plen; local
362 plen = in_len;
364 "data", out_data, plen);
380 if (plen < rl->iv_size) {
387 plen - rl->iv_size);
388 plen -= rl->iv_size;
392 if (plen == 0) {
398 padlen = out_data[plen - 1];
399 if (padlen >= plen) {
401 "length (%u, plen
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_record.c356 size_t plen; local
362 plen = in_len;
364 "data", out_data, plen);
380 if (plen < rl->iv_size) {
387 plen - rl->iv_size);
388 plen -= rl->iv_size;
392 if (plen == 0) {
398 padlen = out_data[plen - 1];
399 if (padlen >= plen) {
401 "length (%u, plen
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_record.c356 size_t plen; local
362 plen = in_len;
364 "data", out_data, plen);
380 if (plen < rl->iv_size) {
387 plen - rl->iv_size);
388 plen -= rl->iv_size;
392 if (plen == 0) {
398 padlen = out_data[plen - 1];
399 if (padlen >= plen) {
401 "length (%u, plen
[all...]
/external/dbus/tools/
H A Ddbus-launch-x11.c57 int plen; local
59 plen = strlen (prefix);
61 if (strncmp (s, prefix, plen) == 0)
63 memmove (s, s + plen, strlen (s) - plen + 1);
/external/flac/libFLAC/
H A Dstream_encoder_framing.c499 const unsigned plen = is_extended? FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_PARAMETER_LEN : FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_PARAMETER_LEN; local
506 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[0], plen))
513 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
534 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[i], plen))
540 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
/external/libppp/src/
H A Dmbuf.c305 size_t plen; local
308 plen = m_length(bp);
309 if (plen < m_len)
310 m_len = plen;
/external/openssh/
H A Dcipher.c412 int plen = 0; local
415 plen = EVP_X_STATE_LEN(cc->evp);
417 return (plen);
418 memcpy(dat, EVP_X_STATE(cc->evp), plen);
420 return (plen);
427 int plen; local
430 plen = EVP_X_STATE_LEN(cc->evp);
431 memcpy(EVP_X_STATE(cc->evp), dat, plen);
/external/openssl/crypto/rand/
H A Drand_lib.c267 size_t plen; local
283 plen = drbg_get_adin(dctx, &p);
284 memcpy(pers + 16, p, plen);

Completed in 357 milliseconds

12345678910