/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
H A D | eap_common.h | 16 const struct wpabuf *msg, size_t *plen);
|
H A D | eap_common.c | 55 * @plen: Pointer to variable to contain the returned payload length 62 * caller can just use the returned payload pointer (into *plen) for processing 67 const struct wpabuf *msg, size_t *plen) 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
/external/tcpdump/ |
H A D | print-bgp.c | 492 u_int plen, plenbytes; local 496 plen = pptr[0]; 497 if (32 < plen) 502 plenbytes = (plen + 7) / 8; 506 if (plen % 8) { 508 ((0xff00 >> (plen % 8)) & 0xff); 510 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen); 524 u_int plen, plenbytes; local 529 plen = pptr[0]; /* get prefix length */ 539 if (24 > plen) 713 u_int plen; local 750 u_int plen; local 960 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local 1054 u_int plen, plenbytes; local 1086 u_int plen, plenbytes; local 1130 u_int plen; local 1169 u_int plen; local 1198 u_int plen; local [all...] |
H A D | print-babel.c | 114 format_prefix(const u_char *prefix, unsigned char plen) argument 117 if(plen >= 96 && memcmp(prefix, v4prefix, 12) == 0) 118 snprintf(buf, 50, "%s/%u", ipaddr_string(prefix + 12), plen - 96); 121 snprintf(buf, 50, "%s/%u", ip6addr_string(prefix), plen); 162 network_prefix(int ae, int plen, unsigned int omitted, argument 170 if(plen >= 0) 171 pb = (plen + 7) / 8; 444 u_char plen; local 449 plen = message[4] + (message[2] == 1 ? 96 : 0); 462 format_prefix(prefix, plen), 482 u_char prefix[16], plen; local 502 u_char prefix[16], plen; local [all...] |
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/test/ |
H A D | NETEQTEST_DummyRTPpacket.cc | 30 uint16_t length, plen; local 44 if (fread(&plen, 2, 1, fp) == 0) 49 packetLen = ntohs(plen); 59 // Use length here because a plen of 0 specifies rtcp. 150 uint16_t length, plen; local 161 plen = htons(_datagramLen); 162 if (fwrite(&plen, 2, 1, fp) != 1)
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/tools/ |
H A D | rtp_file_source.cc | 58 uint16_t plen; local 59 if (fread(&plen, sizeof(plen), 1, in_file_) == 0) { 63 plen = ntohs(plen); 72 // Use length here because a plen of 0 specifies RTCP. 88 plen,
|
/external/srec/srec/Nametag/include/ |
H A D | SR_NametagDefs.h | 61 * @param plen pointer to the length of the transcription 64 ESR_ReturnCode (*getValue)(const struct SR_Nametag_t* self, const char** pvalue, size_t* plen);
|
H A D | SR_Nametag.h | 70 SREC_NAMETAG_API ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
|
H A D | SR_NametagImpl.h | 57 SREC_NAMETAG_API ESR_ReturnCode SR_Nametag_GetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.h | 16 const struct wpabuf *msg, size_t *plen);
|
H A D | eap_common.c | 55 * @plen: Pointer to variable to contain the returned payload length 62 * caller can just use the returned payload pointer (into *plen) for processing 67 const struct wpabuf *msg, size_t *plen) 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.h | 16 const struct wpabuf *msg, size_t *plen);
|
H A D | eap_common.c | 55 * @plen: Pointer to variable to contain the returned payload length 62 * caller can just use the returned payload pointer (into *plen) for processing 67 const struct wpabuf *msg, size_t *plen) 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/openssl/crypto/rsa/ |
H A D | rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/main/test/ |
H A D | RTPFile.cc | 188 uint16_t plen = htons(12 + payloadSize); local 196 if (fwrite(&plen, 2, 1, _rtpFile) != 1) { 213 uint16_t plen; local 221 EXPECT_EQ(1u, fread(&plen, 2, 1, _rtpFile)); 224 plen = ntohs(plen); 226 EXPECT_GT(plen, 11); 232 EXPECT_EQ(lengthBytes, plen + 8); 234 if (plen == 0) {
|
/external/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 184 size_t plen = key->payload_length, local 199 if (plen==NO_PAYLOAD_LENGTH) 200 plen = len; 201 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) 207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { 223 SHA1_Update(&key->md,in+sha_off,plen-sha_off); 225 if (plen!=len) { /* "TLS" mode of operation */ 227 memcpy(out+aes_off,in+aes_off,plen-aes_off); 230 SHA1_Final(out+plen, [all...] |
/external/ppp/pppd/ |
H A D | ecp.c | 165 ecp_printpkt(p, plen, printer, arg) 167 int plen;
|
/external/chromium_org/third_party/boringssl/src/crypto/asn1/ |
H A D | tasn_dec.c | 71 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen); 742 long plen; local 794 ret = asn1_check_tlen(&plen, NULL, NULL, &inf, &cst, 826 if (!asn1_find_end(&p, plen, inf)) 832 len = p - cont + plen; 833 p += plen; 848 if (!asn1_collect(&buf, &p, plen, inf, -1, V_ASN1_UNIVERSAL, 0)) 867 len = plen; 868 p += plen; 1051 long plen; local 1117 long plen; local 1177 collect_data(BUF_MEM *buf, const unsigned char **p, long plen) argument 1224 long plen; local [all...] |
/external/openssl/crypto/asn1/ |
H A D | tasn_dec.c | 74 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen); 772 long plen; local 827 ret = asn1_check_tlen(&plen, NULL, NULL, &inf, &cst, 860 if (!asn1_find_end(&p, plen, inf)) 866 len = p - cont + plen; 867 p += plen; 882 if (!asn1_collect(&buf, &p, plen, inf, -1, V_ASN1_UNIVERSAL, 0)) 902 len = plen; 903 p += plen; 1092 long plen; local 1158 long plen; local 1220 collect_data(BUF_MEM *buf, const unsigned char **p, long plen) argument 1267 long plen; local [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
H A D | rsa_test.c | 393 int plen; local 400 plen = sizeof(ptext_ex) - 1; 425 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, RSA_PKCS1_PADDING); 433 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) { 443 RSA_public_encrypt(plen, ptext_ex, ctext, key, RSA_PKCS1_OAEP_PADDING); 455 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) { 468 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) {
|
/external/dnsmasq/src/ |
H A D | rfc1035.c | 24 #define CHECK_LEN(header, pp, plen, len) \ 25 ((size_t)((pp) - (unsigned char *)(header) + (len)) <= (plen)) 27 #define ADD_RDLEN(header, pp, plen, len) \ 28 (!CHECK_LEN(header, pp, plen, len) ? 0 : (long)((pp) += (len)), 1) 30 static int extract_name(HEADER *header, size_t plen, unsigned char **pp, argument 44 if (!CHECK_LEN(header, p, plen, 1)) 51 if (!CHECK_LEN(header, p, plen, extrabytes)) 75 if (!CHECK_LEN(header, p, plen, 1)) 111 if (!CHECK_LEN(header, p, plen, (count-1)>>3)) 135 if (!CHECK_LEN(header, p, plen, 281 skip_name(unsigned char *ansp, HEADER *header, size_t plen, int extrabytes) argument 336 skip_questions(HEADER *header, size_t plen) argument 351 skip_section(unsigned char *ansp, int count, HEADER *header, size_t plen) argument 374 questions_crc(HEADER *header, size_t plen, char *name) argument 416 resize_packet(HEADER *header, size_t plen, unsigned char *pheader, size_t hlen) argument 440 find_pseudoheader(HEADER *header, size_t plen, size_t *len, unsigned char **p, int *is_sign) argument [all...] |