/external/tcpdump/ |
print-bgp.c | 431 u_int plen; local 434 plen = pptr[0]; 435 if (32 < plen) 439 TCHECK2(pptr[1], (plen + 7) / 8); 440 memcpy(&addr, &pptr[1], (plen + 7) / 8); 441 if (plen % 8) { 442 ((u_char *)&addr)[(plen + 7) / 8 - 1] &= 443 ((0xff00 >> (plen % 8)) & 0xff); 445 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen); 446 return 1 + (plen + 7) / 8 456 u_int plen; local 541 u_int plen; local 578 u_int plen; local 635 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local 702 u_int plen; local 727 u_int plen; local 764 u_int plen; local 803 u_int plen; local 832 u_int plen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 85 size_t left = buflen, plen; local 93 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 94 os_memcpy(pos, digest, plen); 95 pos += plen; 96 left -= plen;
|
sha1-tprf.c | 39 size_t pos, plen; local 62 plen = buf_len - pos; 65 if (plen >= SHA1_MAC_LEN) { 69 os_memcpy(&buf[pos], hash, plen);
|
sha1.c | 131 size_t pos, plen; local 146 plen = buf_len - pos; 147 if (plen >= SHA1_MAC_LEN) { 156 os_memcpy(&buf[pos], hash, plen);
|
sha256.c | 126 size_t pos, plen; local 144 plen = buf_len - pos; 146 if (plen >= SHA256_MAC_LEN) { 152 os_memcpy(&buf[pos], hash, plen);
|
/external/openssl/crypto/asn1/ |
bio_ndef.c | 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) 175 *plen = *ndef_aux->boundary - *pbuf; 180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) 194 *plen = 0; 198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) 201 if (!ndef_prefix_free(b, pbuf, plen, parg) [all...] |
/external/srec/srec/Nametag/src/ |
Nametag.c | 36 ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t* plen) 38 if (self == NULL || pvalue == NULL || plen == NULL) 43 return self->getValue(self, pvalue, plen);
|
/external/bluetooth/bluez/attrib/ |
gatt.c | 73 guint16 plen; local 79 plen = enc_read_by_grp_req(start, end, &prim, pdu, len); 98 plen = enc_find_by_type_req(start, end, &prim, value, vlen, 102 return plen; 224 guint16 plen; local 226 plen = encode_discover_primary(0x0001, 0xffff, uuid, buf, buflen); 227 if (plen == 0) 244 return g_attrib_send(attrib, 0, buf[0], buf, plen, cb, dp, NULL); 333 guint16 plen; local 337 plen = enc_read_by_type_req(start, end, &type_uuid, buf, buflen) 361 guint16 plen; local 402 guint16 plen; local 449 guint16 plen; local 484 guint16 plen; local 525 guint16 plen; local 542 guint16 plen; local 555 guint16 plen; local 571 guint16 plen; local [all...] |
/external/qemu/ |
net-checksum.c | 58 int hlen, plen, proto, csum_offset; local 64 plen = (data[16] << 8 | data[17]) - hlen; 78 if (plen < csum_offset+2) 83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
eap_common.h | 21 const struct wpabuf *msg, size_t *plen);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
eap_common.h | 21 const struct wpabuf *msg, size_t *plen);
|
/external/srec/srec/Nametag/include/ |
SR_NametagDefs.h | 61 * @param plen pointer to the length of the transcription 64 ESR_ReturnCode (*getValue)(const struct SR_Nametag_t* self, const char** pvalue, size_t* plen);
|
SR_Nametag.h | 70 SREC_NAMETAG_API ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
|
SR_NametagImpl.h | 57 SREC_NAMETAG_API ESR_ReturnCode SR_Nametag_GetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
|
/external/bluetooth/hcidump/parser/ |
hcrp.c | 85 uint16_t pid, tid, plen, status; local 90 plen = get_u16(frm); 94 printf("HCRP %s %s: tid 0x%x plen %d", 95 pid2str(pid), frm->in ? "rsp" : "cmd", tid, plen);
|
/external/wpa_supplicant/ |
eap_gtc.c | 59 size_t password_len, identity_len, len, plen; local 107 plen = password_len; 112 plen += 9 + identity_len + 1; 114 plen, EAP_CODE_RESPONSE, req->identifier, &rpos); 126 (u8 *) (resp + 1) + 1, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
/external/bluetooth/bluez/tools/ |
hciattach_tialt.c | 81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ 82 "Error in response: plen is not >= 4, but 0x%02x!\n", 83 resp.hci_hdr.plen); 107 cmd.hci_hdr.plen = sizeof(uint32_t); 122 if (read_command_complete(fd, cmd.hci_hdr.opcode, cmd.hci_hdr.plen) < 0) { 155 FAILIF(read(fw, data, cmd->plen) != cmd->plen, 157 cmd->plen, 165 cmd->plen); [all...] |
hciattach_qualcomm.c | 89 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ 90 "Error in response: plen is not >= 4, but 0x%02x!\n", 91 resp.hci_hdr.plen); 129 FAILIF(read(fw, data, cmd->plen) != cmd->plen, 132 cmd->plen, cmd->opcode); 148 iov_cmd[1].iov_len = cmd->plen; 150 FAILIF(nw != (int) sizeof(cmdp) + cmd->plen, 157 if (read_command_complete(fd, cmd->opcode, cmd->plen) < 0 [all...] |
/external/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 133 plen = 4; 137 plen = strlen (pfx); 138 if (plen > 5) 139 plen = 5; 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/external/ppp/pppd/ |
ecp.c | 165 ecp_printpkt(p, plen, printer, arg) 167 int plen;
|