/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.c | 55 * @plen: Pointer to variable to contain the returned payload length 62 * caller can just use the returned payload pointer (into *plen) for processing 67 const struct wpabuf *msg, size_t *plen) 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.c | 55 * @plen: Pointer to variable to contain the returned payload length 62 * caller can just use the returned payload pointer (into *plen) for processing 67 const struct wpabuf *msg, size_t *plen) 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_common.c | 55 * @plen: Pointer to variable to contain the returned payload length 62 * caller can just use the returned payload pointer (into *plen) for processing 67 const struct wpabuf *msg, size_t *plen) 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
/external/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 127 size_t plen = key->payload_length; local 129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; 132 if (plen==NO_PAYLOAD_LENGTH) plen = len; 137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && 155 MD5_Update(&key->md,in+md5_off,plen-md5_off); 157 if (plen!=len) { /* "TLS" mode of operation */ 159 memcpy(out+rc4_off,in+rc4_off,plen [all...] |
H A D | p5_crpt2.c | 177 int plen; local 190 plen = param->value.sequence->length; 191 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 236 int saltlen, iter, plen; local 260 plen = param->value.sequence->length; 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
|
H A D | e_aes_cbc_hmac_sha1.c | 177 size_t plen = key->payload_length, local 190 if (plen==NO_PAYLOAD_LENGTH) 191 plen = len; 192 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) 198 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { 214 SHA1_Update(&key->md,in+sha_off,plen-sha_off); 216 if (plen!=len) { /* "TLS" mode of operation */ 218 memcpy(out+aes_off,in+aes_off,plen-aes_off); 221 SHA1_Final(out+plen, [all...] |
/external/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 36 const unsigned char *param, int plen) 59 if (!EVP_Digest((void *)param, plen, db, NULL, EVP_sha1(), NULL)) 96 const unsigned char *param, int plen) 114 * for side-channel attacks (e.g. timing if 'plen' is huge 149 if (!EVP_Digest((void *)param, plen, phash, NULL, EVP_sha1(), NULL)) 34 RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen) argument 94 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) argument
|
H A D | rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | discovery.c | 250 UINT16_t plen; local 255 plen = TAG_HDR_SIZE + namelen; 256 CHECK_ROOM(cursor, packet.payload, plen); 287 plen += sizeof(pid) + TAG_HDR_SIZE; 290 packet.length = htons(plen); 292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE)); 421 UINT16_t plen; local 426 plen = TAG_HDR_SIZE + namelen; 427 CHECK_ROOM(cursor, packet.payload, plen); 455 plen [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 356 size_t plen; local 362 plen = in_len; 364 "data", out_data, plen); 380 if (plen < rl->iv_size) { 387 plen - rl->iv_size); 388 plen -= rl->iv_size; 392 if (plen == 0) { 398 padlen = out_data[plen - 1]; 399 if (padlen >= plen) { 401 "length (%u, plen [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 356 size_t plen; local 362 plen = in_len; 364 "data", out_data, plen); 380 if (plen < rl->iv_size) { 387 plen - rl->iv_size); 388 plen -= rl->iv_size; 392 if (plen == 0) { 398 padlen = out_data[plen - 1]; 399 if (padlen >= plen) { 401 "length (%u, plen [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 356 size_t plen; local 362 plen = in_len; 364 "data", out_data, plen); 380 if (plen < rl->iv_size) { 387 plen - rl->iv_size); 388 plen -= rl->iv_size; 392 if (plen == 0) { 398 padlen = out_data[plen - 1]; 399 if (padlen >= plen) { 401 "length (%u, plen [all...] |
/external/dbus/tools/ |
H A D | dbus-launch-x11.c | 57 int plen; local 59 plen = strlen (prefix); 61 if (strncmp (s, prefix, plen) == 0) 63 memmove (s, s + plen, strlen (s) - plen + 1);
|
/external/flac/libFLAC/ |
H A D | stream_encoder_framing.c | 499 const unsigned plen = is_extended? FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_PARAMETER_LEN : FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_PARAMETER_LEN; local 506 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[0], plen)) 513 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen)) 534 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[i], plen)) 540 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
|
/external/libppp/src/ |
H A D | mbuf.c | 305 size_t plen; local 308 plen = m_length(bp); 309 if (plen < m_len) 310 m_len = plen;
|
/external/openssh/ |
H A D | cipher.c | 412 int plen = 0; local 415 plen = EVP_X_STATE_LEN(cc->evp); 417 return (plen); 418 memcpy(dat, EVP_X_STATE(cc->evp), plen); 420 return (plen); 427 int plen; local 430 plen = EVP_X_STATE_LEN(cc->evp); 431 memcpy(EVP_X_STATE(cc->evp), dat, plen);
|
/external/openssl/crypto/rand/ |
H A D | rand_lib.c | 267 size_t plen; local 283 plen = drbg_get_adin(dctx, &p); 284 memcpy(pers + 16, p, plen);
|