/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-prf.c | 34 size_t pos, plen; local 49 plen = buf_len - pos; 50 if (plen >= SHA1_MAC_LEN) { 59 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha256-prf.c | 56 size_t pos, plen; local 75 plen = buf_len - pos; 77 if (plen >= SHA256_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen); 84 pos += plen;
|
H A D | sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-prf.c | 34 size_t pos, plen; local 49 plen = buf_len - pos; 50 if (plen >= SHA1_MAC_LEN) { 59 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha256-prf.c | 56 size_t pos, plen; local 75 plen = buf_len - pos; 77 if (plen >= SHA256_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen); 84 pos += plen;
|
H A D | sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-prf.c | 34 size_t pos, plen; local 49 plen = buf_len - pos; 50 if (plen >= SHA1_MAC_LEN) { 59 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha256-prf.c | 56 size_t pos, plen; local 75 plen = buf_len - pos; 77 if (plen >= SHA256_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen); 84 pos += plen;
|
/external/openssh/ |
H A D | sshbuf-misc.c | 95 size_t len = sshbuf_len(buf), plen; local 102 plen = ((len + 2) / 3) * 4 + 1; 103 if (SIZE_MAX / 2 <= len || (ret = malloc(plen)) == NULL) 105 if ((r = b64_ntop(p, len, ret, plen)) == -1) { 106 bzero(ret, plen); 116 size_t plen = strlen(b64); local 120 if (plen == 0) 122 if ((p = malloc(plen)) == NULL) 124 if ((nlen = b64_pton(b64, p, plen)) < 0) { 125 bzero(p, plen); [all...] |
H A D | auth2-gss.c | 51 static int input_gssapi_token(int type, u_int32_t plen, void *ctxt); 52 static int input_gssapi_mic(int type, u_int32_t plen, void *ctxt); 53 static int input_gssapi_exchange_complete(int type, u_int32_t plen, void *ctxt); 130 input_gssapi_token(int type, u_int32_t plen, void *ctxt) argument 185 input_gssapi_errtok(int type, u_int32_t plen, void *ctxt) argument 226 input_gssapi_exchange_complete(int type, u_int32_t plen, void *ctxt) argument 253 input_gssapi_mic(int type, u_int32_t plen, void *ctxt) argument
|
/external/tcpdump/ |
H A D | signature.c | 123 signature_verify (const u_char *pptr, u_int plen, u_char *sig_ptr) argument 139 signature_compute_hmac_md5(pptr, plen, (unsigned char *)sigsecret,
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
H A D | eap_common.c | 55 * @plen: Pointer to variable to contain the returned payload length 62 * caller can just use the returned payload pointer (into *plen) for processing 67 const struct wpabuf *msg, size_t *plen) 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
H A D | eap_common.c | 55 * @plen: Pointer to variable to contain the returned payload length 62 * caller can just use the returned payload pointer (into *plen) for processing 67 const struct wpabuf *msg, size_t *plen) 99 *plen = len - sizeof(*hdr) - 8; 106 *plen = len - sizeof(*hdr) - 1; 66 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
/external/boringssl/src/crypto/asn1/ |
H A D | bio_ndef.c | 101 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 102 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 103 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 104 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 160 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 183 *plen = *ndef_aux->boundary - *pbuf; 188 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 202 *plen = 0; 206 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 209 if (!ndef_prefix_free(b, pbuf, plen, par 216 ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument [all...] |
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | common.c | 101 UINT16_t plen = 0; local 130 plen += sizeof(pid) + TAG_HDR_SIZE; 142 plen += elen + TAG_HDR_SIZE; 151 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; 159 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; 162 packet.length = htons(plen); 163 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
|
/external/toybox/lib/ |
H A D | dirtree.c | 73 // Initial call can pass in NULL to plen, or point to an int initialized to 0 77 char *dirtree_path(struct dirtree *node, int *plen) argument 83 path = xmalloc(*plen); 84 *plen = 0; 88 len = (plen ? *plen : 0)+strlen(node->name)+1; 92 if (plen) *plen = len;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|