HomeSort by relevance Sort by last modified time
    Searched defs:plen (Results 1 - 25 of 144) sorted by null

1 2 3 4 5 6

  /external/bluetooth/hcidump/parser/
hcrp.c 85 uint16_t pid, tid, plen, status; local
90 plen = get_u16(frm);
94 printf("HCRP %s %s: tid 0x%x plen %d",
95 pid2str(pid), frm->in ? "rsp" : "cmd", tid, plen);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_peap_common.c 26 size_t pos, plen; local
77 plen = buf_len - pos;
79 if (plen >= SHA1_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
eap_sake_common.c 220 size_t pos, plen; local
237 plen = buf_len - pos;
238 if (plen >= SHA1_MAC_LEN) {
245 os_memcpy(&buf[pos], hash, plen);
  /external/wpa_supplicant_8/src/crypto/
sha1-tprf.c 39 size_t pos, plen; local
62 plen = buf_len - pos;
65 if (plen >= SHA1_MAC_LEN) {
69 os_memcpy(&buf[pos], hash, plen);
sha1-pbkdf2.c 85 size_t left = buflen, plen; local
93 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
94 os_memcpy(pos, digest, plen);
95 pos += plen;
96 left -= plen;
sha1.c 131 size_t pos, plen; local
146 plen = buf_len - pos;
147 if (plen >= SHA1_MAC_LEN) {
156 os_memcpy(&buf[pos], hash, plen);
sha256.c 126 size_t pos, plen; local
144 plen = buf_len - pos;
146 if (plen >= SHA256_MAC_LEN) {
152 os_memcpy(&buf[pos], hash, plen);
  /external/wpa_supplicant_8/src/eap_common/
eap_peap_common.c 26 size_t pos, plen; local
77 plen = buf_len - pos;
79 if (plen >= SHA1_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
eap_sake_common.c 220 size_t pos, plen; local
237 plen = buf_len - pos;
238 if (plen >= SHA1_MAC_LEN) {
245 os_memcpy(&buf[pos], hash, plen);
  /external/qemu/
net-checksum.c 58 int hlen, plen, proto, csum_offset; local
64 plen = (data[16] << 8 | data[17]) - hlen;
78 if (plen < csum_offset+2)
83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
  /external/wpa_supplicant/
eap_gtc.c 59 size_t password_len, identity_len, len, plen; local
107 plen = password_len;
112 plen += 9 + identity_len + 1;
114 plen, EAP_CODE_RESPONSE, req->identifier, &rpos);
126 (u8 *) (resp + 1) + 1, plen);
eap_sake_common.c 219 size_t pos, plen; local
236 plen = buf_len - pos;
237 if (plen >= SHA1_MAC_LEN) {
244 os_memcpy(&buf[pos], hash, plen);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gtc.c 57 size_t password_len, identity_len, len, plen; local
104 plen = password_len;
109 plen += 9 + identity_len + 1;
110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
122 1, plen);
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 57 size_t password_len, identity_len, len, plen; local
104 plen = password_len;
109 plen += 9 + identity_len + 1;
110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
122 1, plen);
  /external/flac/libFLAC/
stream_encoder_framing.c 499 const unsigned plen = is_extended? FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_PARAMETER_LEN : FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_PARAMETER_LEN; local
506 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[0], plen))
513 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
534 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[i], plen))
540 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
  /external/openssl/crypto/rsa/
rsa_test.c 219 int plen; local
230 plen = sizeof(ptext_ex) - 1;
248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_md5.c 108 size_t plen; local
119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
eap_tls_common.c 114 size_t send_len, plen; local
133 plen = 1 + send_len;
135 plen += 4;
137 req = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, plen,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_md5.c 109 size_t plen; local
120 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
121 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
eap_server_tls_common.c 117 size_t send_len, plen; local
136 plen = 1 + send_len;
138 plen += 4;
140 req = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, plen,
  /external/openssl/crypto/evp/
p5_crpt2.c 173 int saltlen, iter, plen; local
188 plen = param->value.sequence->length;
189 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) {
233 plen = pbe2->keyfunc->parameter->value.sequence->length;
234 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
  /external/ppp/pppd/plugins/rp-pppoe/
common.c 401 UINT16_t plen = 0; local
431 plen += sizeof(pid) + TAG_HDR_SIZE;
443 plen += elen + TAG_HDR_SIZE;
452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE;
460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE;
463 packet.length = htons(plen);
464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
discovery.c 250 UINT16_t plen; local
255 plen = TAG_HDR_SIZE + namelen;
256 CHECK_ROOM(cursor, packet.payload, plen);
287 plen += sizeof(pid) + TAG_HDR_SIZE;
290 packet.length = htons(plen);
292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
421 UINT16_t plen; local
426 plen = TAG_HDR_SIZE + namelen;
427 CHECK_ROOM(cursor, packet.payload, plen);
455 plen += sizeof(pid) + TAG_HDR_SIZE
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_cred.c 75 size_t i, plen; local
77 plen = os_strlen(tag);
78 if (len < plen)
81 for (i = 0; i < len - plen; i++) {
82 if (os_memcmp(buf + i, tag, plen) == 0)
  /external/wpa_supplicant_8/src/tls/
tlsv1_cred.c 81 size_t i, plen; local
83 plen = os_strlen(tag);
84 if (len < plen)
87 for (i = 0; i < len - plen; i++) {
88 if (os_memcmp(buf + i, tag, plen) == 0)

Completed in 86 milliseconds

1 2 3 4 5 6