/external/bluetooth/hcidump/parser/ |
hcrp.c | 85 uint16_t pid, tid, plen, status; local 90 plen = get_u16(frm); 94 printf("HCRP %s %s: tid 0x%x plen %d", 95 pid2str(pid), frm->in ? "rsp" : "cmd", tid, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
eap_sake_common.c | 220 size_t pos, plen; local 237 plen = buf_len - pos; 238 if (plen >= SHA1_MAC_LEN) { 245 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/src/crypto/ |
sha1-tprf.c | 39 size_t pos, plen; local 62 plen = buf_len - pos; 65 if (plen >= SHA1_MAC_LEN) { 69 os_memcpy(&buf[pos], hash, plen);
|
sha1-pbkdf2.c | 85 size_t left = buflen, plen; local 93 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 94 os_memcpy(pos, digest, plen); 95 pos += plen; 96 left -= plen;
|
sha1.c | 131 size_t pos, plen; local 146 plen = buf_len - pos; 147 if (plen >= SHA1_MAC_LEN) { 156 os_memcpy(&buf[pos], hash, plen);
|
sha256.c | 126 size_t pos, plen; local 144 plen = buf_len - pos; 146 if (plen >= SHA256_MAC_LEN) { 152 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
eap_sake_common.c | 220 size_t pos, plen; local 237 plen = buf_len - pos; 238 if (plen >= SHA1_MAC_LEN) { 245 os_memcpy(&buf[pos], hash, plen);
|
/external/qemu/ |
net-checksum.c | 58 int hlen, plen, proto, csum_offset; local 64 plen = (data[16] << 8 | data[17]) - hlen; 78 if (plen < csum_offset+2) 83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
|
/external/wpa_supplicant/ |
eap_gtc.c | 59 size_t password_len, identity_len, len, plen; local 107 plen = password_len; 112 plen += 9 + identity_len + 1; 114 plen, EAP_CODE_RESPONSE, req->identifier, &rpos); 126 (u8 *) (resp + 1) + 1, plen);
|
eap_sake_common.c | 219 size_t pos, plen; local 236 plen = buf_len - pos; 237 if (plen >= SHA1_MAC_LEN) { 244 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
/external/flac/libFLAC/ |
stream_encoder_framing.c | 499 const unsigned plen = is_extended? FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_PARAMETER_LEN : FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_PARAMETER_LEN; local 506 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[0], plen)) 513 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen)) 534 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[i], plen)) 540 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
|
/external/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_md5.c | 108 size_t plen; local 119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
eap_tls_common.c | 114 size_t send_len, plen; local 133 plen = 1 + send_len; 135 plen += 4; 137 req = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, plen,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 109 size_t plen; local 120 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 121 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
eap_server_tls_common.c | 117 size_t send_len, plen; local 136 plen = 1 + send_len; 138 plen += 4; 140 req = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, plen,
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 173 int saltlen, iter, plen; local 188 plen = param->value.sequence->length; 189 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 233 plen = pbe2->keyfunc->parameter->value.sequence->length; 234 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
|
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 401 UINT16_t plen = 0; local 431 plen += sizeof(pid) + TAG_HDR_SIZE; 443 plen += elen + TAG_HDR_SIZE; 452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; 460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; 463 packet.length = htons(plen); 464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
|
discovery.c | 250 UINT16_t plen; local 255 plen = TAG_HDR_SIZE + namelen; 256 CHECK_ROOM(cursor, packet.payload, plen); 287 plen += sizeof(pid) + TAG_HDR_SIZE; 290 packet.length = htons(plen); 292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE)); 421 UINT16_t plen; local 426 plen = TAG_HDR_SIZE + namelen; 427 CHECK_ROOM(cursor, packet.payload, plen); 455 plen += sizeof(pid) + TAG_HDR_SIZE [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_cred.c | 75 size_t i, plen; local 77 plen = os_strlen(tag); 78 if (len < plen) 81 for (i = 0; i < len - plen; i++) { 82 if (os_memcmp(buf + i, tag, plen) == 0)
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.c | 81 size_t i, plen; local 83 plen = os_strlen(tag); 84 if (len < plen) 87 for (i = 0; i < len - plen; i++) { 88 if (os_memcmp(buf + i, tag, plen) == 0)
|