/external/libedit/src/ |
H A D | el.c | 542 size_t plen = sizeof(elpath); local 546 plen += strlen(ptr); 547 if ((path = el_malloc(plen * sizeof(*path))) == NULL) 549 (void)snprintf(path, plen, "%s%s", ptr, elpath);
|
/external/libopus/tests/ |
H A D | test_opus_decode.c | 54 int err,skip,plen; local 302 plen=(fast_rand()%18+3)*8+skip+3; 307 for(t=0;t<5*2;t++)expected[t]=opus_decoder_get_nb_samples(dec[t],packet,plen); 308 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255; 310 if(opus_decode(decbak, packet, plen+1, outbuf, expected[0], 1)!=expected[0])test_failed(); 318 out_samples = opus_decode(dec[t], packet, plen+1, outbuf, MAX_FRAME_SAMP, 0); 326 fprintf(stdout," dec[all] random packets, all mode pairs (4096), %d bytes/frame OK.\n",plen+1); 328 plen=(fast_rand()%18+3)*8+skip+3; 334 expected=opus_decoder_get_nb_samples(dec[t],packet,plen); 337 for(j=0;j<plen; [all...] |
/external/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 184 size_t plen = key->payload_length, local 199 if (plen==NO_PAYLOAD_LENGTH) 200 plen = len; 201 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) 207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { 223 SHA1_Update(&key->md,in+sha_off,plen-sha_off); 225 if (plen!=len) { /* "TLS" mode of operation */ 227 memcpy(out+aes_off,in+aes_off,plen-aes_off); 230 SHA1_Final(out+plen, [all...] |
H A D | p5_crpt2.c | 199 int plen; local 212 plen = param->value.sequence->length; 213 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 258 int saltlen, iter, plen; local 282 plen = param->value.sequence->length; 284 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
|
/external/openssl/crypto/rand/ |
H A D | rand_lib.c | 271 size_t plen; local 295 plen = drbg_get_adin(dctx, &p); 296 memcpy(pers + 16, p, plen);
|
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | common.c | 401 UINT16_t plen = 0; local 431 plen += sizeof(pid) + TAG_HDR_SIZE; 443 plen += elen + TAG_HDR_SIZE; 452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; 460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; 463 packet.length = htons(plen); 464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wnm_ap.c | 374 size_t plen; local 381 plen = len - IEEE80211_HDRLEN - 2; 386 plen); 390 plen); 393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.c | 214 size_t pos, plen; local 231 plen = buf_len - pos; 232 if (plen >= SHA1_MAC_LEN) { 239 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ikev2.c | 141 size_t send_len, plen, icv_len = 0; local 158 plen = 1 + send_len; 160 plen += 4; 174 plen += icv_len; 176 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
|
H A D | eap_pax.c | 94 u8 id, u8 op_code, size_t plen) 100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 123 size_t left, plen; local 189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
|
H A D | eap_psk.c | 188 size_t buflen, left, data_len, len, plen; local 316 plen = sizeof(*hdr4) + 4 + 16 + data_len; 317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
H A D | eap_tnc.c | 88 size_t send_len, plen; local 105 plen = 1 + send_len; 107 plen += 4; 108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
|
H A D | eap_wsc.c | 306 size_t send_len, plen; local 322 plen = 2 + send_len; 324 plen += 2; 325 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ikev2.c | 138 size_t send_len, plen, icv_len = 0; local 153 plen = 1 + send_len; 155 plen += 4; 169 plen += icv_len; 171 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
|
H A D | eap_server_sake.c | 95 size_t plen; local 97 plen = sizeof(struct eap_sake_hdr) + length; 99 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen, 121 size_t plen; local 125 plen = 4; 126 plen += 2 + sm->server_id_len; 127 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY); 149 size_t plen; local 161 plen = 2 + EAP_SAKE_RAND_LEN + 2 + sm->server_id_len; 162 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_CHALLENG [all...] |
H A D | eap_server_tls_common.c | 148 size_t send_len, plen; local 167 plen = 1 + send_len; 169 plen += 4; 171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
|
H A D | eap_server_wsc.c | 190 size_t send_len, plen; local 202 plen = 2 + send_len; 204 plen += 2; 205 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_cred.c | 87 size_t i, plen; local 89 plen = os_strlen(tag); 90 if (len < plen) 93 for (i = 0; i < len - plen; i++) { 94 if (os_memcmp(buf + i, tag, plen) == 0)
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wnm_ap.c | 374 size_t plen; local 381 plen = len - IEEE80211_HDRLEN - 2; 386 plen); 390 plen); 393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sake_common.c | 214 size_t pos, plen; local 231 plen = buf_len - pos; 232 if (plen >= SHA1_MAC_LEN) { 239 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ikev2.c | 141 size_t send_len, plen, icv_len = 0; local 158 plen = 1 + send_len; 160 plen += 4; 174 plen += icv_len; 176 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
|
H A D | eap_pax.c | 94 u8 id, u8 op_code, size_t plen) 100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 123 size_t left, plen; local 189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
|
H A D | eap_psk.c | 188 size_t buflen, left, data_len, len, plen; local 316 plen = sizeof(*hdr4) + 4 + 16 + data_len; 317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|