HomeSort by relevance Sort by last modified time
    Searched refs:plen (Results 1 - 25 of 224) sorted by null

1 2 3 4 5 6 7 8 9

  /external/tcpdump/
print-bgp.c 431 u_int plen; local
434 plen = pptr[0];
435 if (32 < plen)
439 TCHECK2(pptr[1], (plen + 7) / 8);
440 memcpy(&addr, &pptr[1], (plen + 7) / 8);
441 if (plen % 8) {
442 ((u_char *)&addr)[(plen + 7) / 8 - 1] &=
443 ((0xff00 >> (plen % 8)) & 0xff);
445 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen);
446 return 1 + (plen + 7) / 8
456 u_int plen; local
541 u_int plen; local
578 u_int plen; local
635 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local
702 u_int plen; local
727 u_int plen; local
764 u_int plen; local
803 u_int plen; local
832 u_int plen; local
    [all...]
  /external/wpa_supplicant_8/src/crypto/
sha1-pbkdf2.c 77 size_t left = buflen, plen; local
85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
86 os_memcpy(pos, digest, plen);
87 pos += plen;
88 left -= plen;
sha1-tprf.c 33 size_t pos, plen; local
56 plen = buf_len - pos;
59 if (plen >= SHA1_MAC_LEN) {
63 os_memcpy(&buf[pos], hash, plen);
sha1.c 125 size_t pos, plen; local
140 plen = buf_len - pos;
141 if (plen >= SHA1_MAC_LEN) {
150 os_memcpy(&buf[pos], hash, plen);
sha256.c 120 size_t pos, plen; local
138 plen = buf_len - pos;
140 if (plen >= SHA256_MAC_LEN) {
146 os_memcpy(&buf[pos], hash, plen);
  /external/openssl/crypto/asn1/
bio_ndef.c 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg)
175 *plen = *ndef_aux->boundary - *pbuf;
180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg)
194 *plen = 0;
198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg)
201 if (!ndef_prefix_free(b, pbuf, plen, parg)
    [all...]
  /external/srec/srec/Nametag/src/
Nametag.c 36 ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t* plen)
38 if (self == NULL || pvalue == NULL || plen == NULL)
43 return self->getValue(self, pvalue, plen);
  /external/openssl/crypto/evp/
e_aes_cbc_hmac_sha1.c 177 size_t plen = key->payload_length, local
190 if (plen==NO_PAYLOAD_LENGTH)
191 plen = len;
192 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE))
198 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) {
214 SHA1_Update(&key->md,in+sha_off,plen-sha_off);
216 if (plen!=len) { /* "TLS" mode of operation */
218 memcpy(out+aes_off,in+aes_off,plen-aes_off);
221 SHA1_Final(out+plen,&key->md)
    [all...]
e_rc4_hmac_md5.c 127 size_t plen = key->payload_length; local
129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0;
132 if (plen==NO_PAYLOAD_LENGTH) plen = len;
137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) &&
155 MD5_Update(&key->md,in+md5_off,plen-md5_off);
157 if (plen!=len) { /* "TLS" mode of operation */
159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off)
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 356 size_t plen; local
362 plen = in_len;
364 "data", out_data, plen);
380 if (plen < rl->iv_size) {
387 plen - rl->iv_size);
388 plen -= rl->iv_size;
392 if (plen == 0) {
398 padlen = out_data[plen - 1];
399 if (padlen >= plen) {
401 "length (%u, plen=%lu) in
    [all...]
  /external/bluetooth/bluez/attrib/
gatt.c 73 guint16 plen; local
79 plen = enc_read_by_grp_req(start, end, &prim, pdu, len);
98 plen = enc_find_by_type_req(start, end, &prim, value, vlen,
102 return plen;
224 guint16 plen; local
226 plen = encode_discover_primary(0x0001, 0xffff, uuid, buf, buflen);
227 if (plen == 0)
244 return g_attrib_send(attrib, 0, buf[0], buf, plen, cb, dp, NULL);
333 guint16 plen; local
337 plen = enc_read_by_type_req(start, end, &type_uuid, buf, buflen)
361 guint16 plen; local
402 guint16 plen; local
449 guint16 plen; local
484 guint16 plen; local
525 guint16 plen; local
542 guint16 plen; local
555 guint16 plen; local
571 guint16 plen; local
    [all...]
  /external/qemu/
net-checksum.c 58 int hlen, plen, proto, csum_offset; local
64 plen = (data[16] << 8 | data[17]) - hlen;
78 if (plen < csum_offset+2)
83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_peap_common.c 26 size_t pos, plen; local
77 plen = buf_len - pos;
79 if (plen >= SHA1_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
eap_common.h 21 const struct wpabuf *msg, size_t *plen);
  /external/wpa_supplicant_8/src/eap_common/
eap_peap_common.c 20 size_t pos, plen; local
71 plen = buf_len - pos;
74 if (plen >= SHA1_MAC_LEN) {
78 os_memcpy(&buf[pos], hash, plen);
eap_common.h 15 const struct wpabuf *msg, size_t *plen);
  /external/srec/srec/Nametag/include/
SR_NametagDefs.h 61 * @param plen pointer to the length of the transcription
64 ESR_ReturnCode (*getValue)(const struct SR_Nametag_t* self, const char** pvalue, size_t* plen);
SR_Nametag.h 70 SREC_NAMETAG_API ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
SR_NametagImpl.h 57 SREC_NAMETAG_API ESR_ReturnCode SR_Nametag_GetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
  /external/bluetooth/hcidump/parser/
hcrp.c 85 uint16_t pid, tid, plen, status; local
90 plen = get_u16(frm);
94 printf("HCRP %s %s: tid 0x%x plen %d",
95 pid2str(pid), frm->in ? "rsp" : "cmd", tid, plen);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gtc.c 57 size_t password_len, identity_len, len, plen; local
104 plen = password_len;
109 plen += 9 + identity_len + 1;
110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
122 1, plen);
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
  /external/bluetooth/bluez/tools/
hciattach_tialt.c 81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */
82 "Error in response: plen is not >= 4, but 0x%02x!\n",
83 resp.hci_hdr.plen);
107 cmd.hci_hdr.plen = sizeof(uint32_t);
122 if (read_command_complete(fd, cmd.hci_hdr.opcode, cmd.hci_hdr.plen) < 0) {
155 FAILIF(read(fw, data, cmd->plen) != cmd->plen,
157 cmd->plen,
165 cmd->plen);
    [all...]
  /external/openssl/crypto/rsa/
rsa_test.c 219 int plen; local
230 plen = sizeof(ptext_ex) - 1;
248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
  /ndk/sources/host-tools/sed-4.2.1/lib/
tempname.c 128 size_t dlen, plen; local
133 plen = 4;
137 plen = strlen (pfx);
138 if (plen > 5)
139 plen = 5;
170 if (tmpl_len < dlen + 1 + plen + 6 + 1)
176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);

Completed in 6255 milliseconds

1 2 3 4 5 6 7 8 9