Searched defs:plen (Results 1 - 25 of 202) sorted by relevance

123456789

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha1-prf.c34 size_t pos, plen; local
49 plen = buf_len - pos;
50 if (plen >= SHA1_MAC_LEN) {
59 os_memcpy(&buf[pos], hash, plen);
H A Dsha1-tprf.c33 size_t pos, plen; local
56 plen = buf_len - pos;
59 if (plen >= SHA1_MAC_LEN) {
63 os_memcpy(&buf[pos], hash, plen);
H A Dsha256-prf.c56 size_t pos, plen; local
75 plen = buf_len - pos;
77 if (plen >= SHA256_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
84 pos += plen;
H A Dsha1-pbkdf2.c77 size_t left = buflen, plen; local
85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
86 os_memcpy(pos, digest, plen);
87 pos += plen;
88 left -= plen;
/external/wpa_supplicant_8/src/crypto/
H A Dsha1-prf.c34 size_t pos, plen; local
49 plen = buf_len - pos;
50 if (plen >= SHA1_MAC_LEN) {
59 os_memcpy(&buf[pos], hash, plen);
H A Dsha1-tprf.c33 size_t pos, plen; local
56 plen = buf_len - pos;
59 if (plen >= SHA1_MAC_LEN) {
63 os_memcpy(&buf[pos], hash, plen);
H A Dsha256-prf.c56 size_t pos, plen; local
75 plen = buf_len - pos;
77 if (plen >= SHA256_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
84 pos += plen;
H A Dsha1-pbkdf2.c77 size_t left = buflen, plen; local
85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
86 os_memcpy(pos, digest, plen);
87 pos += plen;
88 left -= plen;
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha1-prf.c34 size_t pos, plen; local
49 plen = buf_len - pos;
50 if (plen >= SHA1_MAC_LEN) {
59 os_memcpy(&buf[pos], hash, plen);
H A Dsha1-tprf.c33 size_t pos, plen; local
56 plen = buf_len - pos;
59 if (plen >= SHA1_MAC_LEN) {
63 os_memcpy(&buf[pos], hash, plen);
H A Dsha256-prf.c56 size_t pos, plen; local
75 plen = buf_len - pos;
77 if (plen >= SHA256_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
84 pos += plen;
/external/openssh/
H A Dsshbuf-misc.c95 size_t len = sshbuf_len(buf), plen; local
102 plen = ((len + 2) / 3) * 4 + 1;
103 if (SIZE_MAX / 2 <= len || (ret = malloc(plen)) == NULL)
105 if ((r = b64_ntop(p, len, ret, plen)) == -1) {
106 bzero(ret, plen);
116 size_t plen = strlen(b64); local
120 if (plen == 0)
122 if ((p = malloc(plen)) == NULL)
124 if ((nlen = b64_pton(b64, p, plen)) < 0) {
125 bzero(p, plen);
[all...]
H A Dauth2-gss.c51 static int input_gssapi_token(int type, u_int32_t plen, void *ctxt);
52 static int input_gssapi_mic(int type, u_int32_t plen, void *ctxt);
53 static int input_gssapi_exchange_complete(int type, u_int32_t plen, void *ctxt);
130 input_gssapi_token(int type, u_int32_t plen, void *ctxt) argument
185 input_gssapi_errtok(int type, u_int32_t plen, void *ctxt) argument
226 input_gssapi_exchange_complete(int type, u_int32_t plen, void *ctxt) argument
253 input_gssapi_mic(int type, u_int32_t plen, void *ctxt) argument
/external/tcpdump/
H A Dsignature.c123 signature_verify (const u_char *pptr, u_int plen, u_char *sig_ptr) argument
139 signature_compute_hmac_md5(pptr, plen, (unsigned char *)sigsecret,
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; local
71 plen = buf_len - pos;
74 if (plen >= SHA1_MAC_LEN) {
78 os_memcpy(&buf[pos], hash, plen);
H A Deap_common.c55 * @plen: Pointer to variable to contain the returned payload length
62 * caller can just use the returned payload pointer (into *plen) for processing
67 const struct wpabuf *msg, size_t *plen)
99 *plen = len - sizeof(*hdr) - 8;
106 *plen = len - sizeof(*hdr) - 1;
66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; local
71 plen = buf_len - pos;
74 if (plen >= SHA1_MAC_LEN) {
78 os_memcpy(&buf[pos], hash, plen);
H A Deap_common.c55 * @plen: Pointer to variable to contain the returned payload length
62 * caller can just use the returned payload pointer (into *plen) for processing
67 const struct wpabuf *msg, size_t *plen)
99 *plen = len - sizeof(*hdr) - 8;
106 *plen = len - sizeof(*hdr) - 1;
66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; local
71 plen = buf_len - pos;
74 if (plen >= SHA1_MAC_LEN) {
78 os_memcpy(&buf[pos], hash, plen);
/external/boringssl/src/crypto/asn1/
H A Dbio_ndef.c101 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
102 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
103 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
104 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
160 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument
183 *plen = *ndef_aux->boundary - *pbuf;
188 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument
202 *plen = 0;
206 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument
209 if (!ndef_prefix_free(b, pbuf, plen, par
216 ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument
[all...]
/external/ppp/pppd/plugins/rp-pppoe/
H A Dcommon.c101 UINT16_t plen = 0; local
130 plen += sizeof(pid) + TAG_HDR_SIZE;
142 plen += elen + TAG_HDR_SIZE;
151 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE;
159 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE;
162 packet.length = htons(plen);
163 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
/external/toybox/lib/
H A Ddirtree.c73 // Initial call can pass in NULL to plen, or point to an int initialized to 0
77 char *dirtree_path(struct dirtree *node, int *plen) argument
83 path = xmalloc(*plen);
84 *plen = 0;
88 len = (plen ? *plen : 0)+strlen(node->name)+1;
92 if (plen) *plen = len;
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_md5.c103 size_t plen; local
114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);

Completed in 592 milliseconds

123456789