Searched refs:plen (Results 26 - 50 of 279) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; local
71 plen = buf_len - pos;
74 if (plen >= SHA1_MAC_LEN) {
78 os_memcpy(&buf[pos], hash, plen);
H A Deap_common.h16 const struct wpabuf *msg, size_t *plen);
H A Deap_common.c55 * @plen: Pointer to variable to contain the returned payload length
62 * caller can just use the returned payload pointer (into *plen) for processing
67 const struct wpabuf *msg, size_t *plen)
99 *plen = len - sizeof(*hdr) - 8;
106 *plen = len - sizeof(*hdr) - 1;
66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
/external/tcpdump/
H A Dprint-bgp.c492 u_int plen, plenbytes; local
496 plen = pptr[0];
497 if (32 < plen)
502 plenbytes = (plen + 7) / 8;
506 if (plen % 8) {
508 ((0xff00 >> (plen % 8)) & 0xff);
510 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen);
524 u_int plen, plenbytes; local
529 plen = pptr[0]; /* get prefix length */
539 if (24 > plen)
713 u_int plen; local
750 u_int plen; local
960 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local
1054 u_int plen, plenbytes; local
1086 u_int plen, plenbytes; local
1130 u_int plen; local
1169 u_int plen; local
1198 u_int plen; local
[all...]
H A Dprint-babel.c114 format_prefix(const u_char *prefix, unsigned char plen) argument
117 if(plen >= 96 && memcmp(prefix, v4prefix, 12) == 0)
118 snprintf(buf, 50, "%s/%u", ipaddr_string(prefix + 12), plen - 96);
121 snprintf(buf, 50, "%s/%u", ip6addr_string(prefix), plen);
162 network_prefix(int ae, int plen, unsigned int omitted, argument
170 if(plen >= 0)
171 pb = (plen + 7) / 8;
444 u_char plen; local
449 plen = message[4] + (message[2] == 1 ? 96 : 0);
462 format_prefix(prefix, plen),
482 u_char prefix[16], plen; local
502 u_char prefix[16], plen; local
[all...]
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/test/
H A DNETEQTEST_DummyRTPpacket.cc30 uint16_t length, plen; local
44 if (fread(&plen, 2, 1, fp) == 0)
49 packetLen = ntohs(plen);
59 // Use length here because a plen of 0 specifies rtcp.
150 uint16_t length, plen; local
161 plen = htons(_datagramLen);
162 if (fwrite(&plen, 2, 1, fp) != 1)
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/tools/
H A Drtp_file_source.cc58 uint16_t plen; local
59 if (fread(&plen, sizeof(plen), 1, in_file_) == 0) {
63 plen = ntohs(plen);
72 // Use length here because a plen of 0 specifies RTCP.
88 plen,
/external/srec/srec/Nametag/include/
H A DSR_NametagDefs.h61 * @param plen pointer to the length of the transcription
64 ESR_ReturnCode (*getValue)(const struct SR_Nametag_t* self, const char** pvalue, size_t* plen);
H A DSR_Nametag.h70 SREC_NAMETAG_API ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
H A DSR_NametagImpl.h57 SREC_NAMETAG_API ESR_ReturnCode SR_Nametag_GetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_common.h16 const struct wpabuf *msg, size_t *plen);
H A Deap_common.c55 * @plen: Pointer to variable to contain the returned payload length
62 * caller can just use the returned payload pointer (into *plen) for processing
67 const struct wpabuf *msg, size_t *plen)
99 *plen = len - sizeof(*hdr) - 8;
106 *plen = len - sizeof(*hdr) - 1;
66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_common.h16 const struct wpabuf *msg, size_t *plen);
H A Deap_common.c55 * @plen: Pointer to variable to contain the returned payload length
62 * caller can just use the returned payload pointer (into *plen) for processing
67 const struct wpabuf *msg, size_t *plen)
99 *plen = len - sizeof(*hdr) - 8;
106 *plen = len - sizeof(*hdr) - 1;
66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
/external/openssl/crypto/rsa/
H A Drsa_test.c219 int plen; local
230 plen = sizeof(ptext_ex) - 1;
248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
/external/chromium_org/third_party/webrtc/modules/audio_coding/main/test/
H A DRTPFile.cc188 uint16_t plen = htons(12 + payloadSize); local
196 if (fwrite(&plen, 2, 1, _rtpFile) != 1) {
213 uint16_t plen; local
221 EXPECT_EQ(1u, fread(&plen, 2, 1, _rtpFile));
224 plen = ntohs(plen);
226 EXPECT_GT(plen, 11);
232 EXPECT_EQ(lengthBytes, plen + 8);
234 if (plen == 0) {
/external/openssl/crypto/evp/
H A De_aes_cbc_hmac_sha1.c184 size_t plen = key->payload_length, local
199 if (plen==NO_PAYLOAD_LENGTH)
200 plen = len;
201 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE))
207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) {
223 SHA1_Update(&key->md,in+sha_off,plen-sha_off);
225 if (plen!=len) { /* "TLS" mode of operation */
227 memcpy(out+aes_off,in+aes_off,plen-aes_off);
230 SHA1_Final(out+plen,
[all...]
/external/ppp/pppd/
H A Decp.c165 ecp_printpkt(p, plen, printer, arg)
167 int plen;
/external/chromium_org/third_party/boringssl/src/crypto/asn1/
H A Dtasn_dec.c71 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen);
742 long plen; local
794 ret = asn1_check_tlen(&plen, NULL, NULL, &inf, &cst,
826 if (!asn1_find_end(&p, plen, inf))
832 len = p - cont + plen;
833 p += plen;
848 if (!asn1_collect(&buf, &p, plen, inf, -1, V_ASN1_UNIVERSAL, 0))
867 len = plen;
868 p += plen;
1051 long plen; local
1117 long plen; local
1177 collect_data(BUF_MEM *buf, const unsigned char **p, long plen) argument
1224 long plen; local
[all...]
/external/openssl/crypto/asn1/
H A Dtasn_dec.c74 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen);
772 long plen; local
827 ret = asn1_check_tlen(&plen, NULL, NULL, &inf, &cst,
860 if (!asn1_find_end(&p, plen, inf))
866 len = p - cont + plen;
867 p += plen;
882 if (!asn1_collect(&buf, &p, plen, inf, -1, V_ASN1_UNIVERSAL, 0))
902 len = plen;
903 p += plen;
1092 long plen; local
1158 long plen; local
1220 collect_data(BUF_MEM *buf, const unsigned char **p, long plen) argument
1267 long plen; local
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/rsa/
H A Drsa_test.c393 int plen; local
400 plen = sizeof(ptext_ex) - 1;
425 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, RSA_PKCS1_PADDING);
433 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) {
443 RSA_public_encrypt(plen, ptext_ex, ctext, key, RSA_PKCS1_OAEP_PADDING);
455 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) {
468 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) {
/external/dnsmasq/src/
H A Drfc1035.c24 #define CHECK_LEN(header, pp, plen, len) \
25 ((size_t)((pp) - (unsigned char *)(header) + (len)) <= (plen))
27 #define ADD_RDLEN(header, pp, plen, len) \
28 (!CHECK_LEN(header, pp, plen, len) ? 0 : (long)((pp) += (len)), 1)
30 static int extract_name(HEADER *header, size_t plen, unsigned char **pp, argument
44 if (!CHECK_LEN(header, p, plen, 1))
51 if (!CHECK_LEN(header, p, plen, extrabytes))
75 if (!CHECK_LEN(header, p, plen, 1))
111 if (!CHECK_LEN(header, p, plen, (count-1)>>3))
135 if (!CHECK_LEN(header, p, plen,
281 skip_name(unsigned char *ansp, HEADER *header, size_t plen, int extrabytes) argument
336 skip_questions(HEADER *header, size_t plen) argument
351 skip_section(unsigned char *ansp, int count, HEADER *header, size_t plen) argument
374 questions_crc(HEADER *header, size_t plen, char *name) argument
416 resize_packet(HEADER *header, size_t plen, unsigned char *pheader, size_t hlen) argument
440 find_pseudoheader(HEADER *header, size_t plen, size_t *len, unsigned char **p, int *is_sign) argument
[all...]

Completed in 1279 milliseconds

1234567891011>>