Searched defs:plen (Results 51 - 75 of 231) sorted by relevance

12345678910

/external/libedit/src/
H A Del.c542 size_t plen = sizeof(elpath); local
546 plen += strlen(ptr);
547 if ((path = el_malloc(plen * sizeof(*path))) == NULL)
549 (void)snprintf(path, plen, "%s%s", ptr, elpath);
/external/libopus/tests/
H A Dtest_opus_decode.c54 int err,skip,plen; local
302 plen=(fast_rand()%18+3)*8+skip+3;
307 for(t=0;t<5*2;t++)expected[t]=opus_decoder_get_nb_samples(dec[t],packet,plen);
308 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255;
310 if(opus_decode(decbak, packet, plen+1, outbuf, expected[0], 1)!=expected[0])test_failed();
318 out_samples = opus_decode(dec[t], packet, plen+1, outbuf, MAX_FRAME_SAMP, 0);
326 fprintf(stdout," dec[all] random packets, all mode pairs (4096), %d bytes/frame OK.\n",plen+1);
328 plen=(fast_rand()%18+3)*8+skip+3;
334 expected=opus_decoder_get_nb_samples(dec[t],packet,plen);
337 for(j=0;j<plen;
[all...]
/external/openssl/crypto/evp/
H A De_aes_cbc_hmac_sha1.c184 size_t plen = key->payload_length, local
199 if (plen==NO_PAYLOAD_LENGTH)
200 plen = len;
201 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE))
207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) {
223 SHA1_Update(&key->md,in+sha_off,plen-sha_off);
225 if (plen!=len) { /* "TLS" mode of operation */
227 memcpy(out+aes_off,in+aes_off,plen-aes_off);
230 SHA1_Final(out+plen,
[all...]
H A Dp5_crpt2.c199 int plen; local
212 plen = param->value.sequence->length;
213 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) {
258 int saltlen, iter, plen; local
282 plen = param->value.sequence->length;
284 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
/external/openssl/crypto/rand/
H A Drand_lib.c271 size_t plen; local
295 plen = drbg_get_adin(dctx, &p);
296 memcpy(pers + 16, p, plen);
/external/ppp/pppd/plugins/rp-pppoe/
H A Dcommon.c401 UINT16_t plen = 0; local
431 plen += sizeof(pid) + TAG_HDR_SIZE;
443 plen += elen + TAG_HDR_SIZE;
452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE;
460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE;
463 packet.length = htons(plen);
464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwnm_ap.c374 size_t plen; local
381 plen = len - IEEE80211_HDRLEN - 2;
386 plen);
390 plen);
393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sake_common.c214 size_t pos, plen; local
231 plen = buf_len - pos;
232 if (plen >= SHA1_MAC_LEN) {
239 os_memcpy(&buf[pos], hash, plen);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_ikev2.c141 size_t send_len, plen, icv_len = 0; local
158 plen = 1 + send_len;
160 plen += 4;
174 plen += icv_len;
176 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
H A Deap_pax.c94 u8 id, u8 op_code, size_t plen)
100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id);
123 size_t left, plen; local
189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN +
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
H A Deap_psk.c188 size_t buflen, left, data_len, len, plen; local
316 plen = sizeof(*hdr4) + 4 + 16 + data_len;
317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
H A Deap_sake.c120 size_t plen; local
122 plen = length + sizeof(struct eap_sake_hdr);
124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
H A Deap_tnc.c88 size_t send_len, plen; local
105 plen = 1 + send_len;
107 plen += 4;
108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
H A Deap_wsc.c306 size_t send_len, plen; local
322 plen = 2 + send_len;
324 plen += 2;
325 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ikev2.c138 size_t send_len, plen, icv_len = 0; local
153 plen = 1 + send_len;
155 plen += 4;
169 plen += icv_len;
171 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
H A Deap_server_sake.c95 size_t plen; local
97 plen = sizeof(struct eap_sake_hdr) + length;
99 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
121 size_t plen; local
125 plen = 4;
126 plen += 2 + sm->server_id_len;
127 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY);
149 size_t plen; local
161 plen = 2 + EAP_SAKE_RAND_LEN + 2 + sm->server_id_len;
162 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_CHALLENG
[all...]
H A Deap_server_tls_common.c148 size_t send_len, plen; local
167 plen = 1 + send_len;
169 plen += 4;
171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
H A Deap_server_wsc.c190 size_t send_len, plen; local
202 plen = 2 + send_len;
204 plen += 2;
205 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_cred.c87 size_t i, plen; local
89 plen = os_strlen(tag);
90 if (len < plen)
93 for (i = 0; i < len - plen; i++) {
94 if (os_memcmp(buf + i, tag, plen) == 0)
/external/wpa_supplicant_8/src/ap/
H A Dwnm_ap.c374 size_t plen; local
381 plen = len - IEEE80211_HDRLEN - 2;
386 plen);
390 plen);
393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sake_common.c214 size_t pos, plen; local
231 plen = buf_len - pos;
232 if (plen >= SHA1_MAC_LEN) {
239 os_memcpy(&buf[pos], hash, plen);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_ikev2.c141 size_t send_len, plen, icv_len = 0; local
158 plen = 1 + send_len;
160 plen += 4;
174 plen += icv_len;
176 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
H A Deap_pax.c94 u8 id, u8 op_code, size_t plen)
100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id);
123 size_t left, plen; local
189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN +
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
H A Deap_psk.c188 size_t buflen, left, data_len, len, plen; local
316 plen = sizeof(*hdr4) + 4 + 16 + data_len;
317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
H A Deap_sake.c120 size_t plen; local
122 plen = length + sizeof(struct eap_sake_hdr);
124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,

Completed in 1008 milliseconds

12345678910