/external/tcpdump/ |
print-bgp.c | 431 u_int plen; local 434 plen = pptr[0]; 435 if (32 < plen) 439 TCHECK2(pptr[1], (plen + 7) / 8); 440 memcpy(&addr, &pptr[1], (plen + 7) / 8); 441 if (plen % 8) { 442 ((u_char *)&addr)[(plen + 7) / 8 - 1] &= 443 ((0xff00 >> (plen % 8)) & 0xff); 445 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen); 446 return 1 + (plen + 7) / 8 456 u_int plen; local 541 u_int plen; local 578 u_int plen; local 635 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local 702 u_int plen; local 727 u_int plen; local 764 u_int plen; local 803 u_int plen; local 832 u_int plen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
sha1.c | 125 size_t pos, plen; local 140 plen = buf_len - pos; 141 if (plen >= SHA1_MAC_LEN) { 150 os_memcpy(&buf[pos], hash, plen);
|
sha256.c | 120 size_t pos, plen; local 138 plen = buf_len - pos; 140 if (plen >= SHA256_MAC_LEN) { 146 os_memcpy(&buf[pos], hash, plen);
|
/external/openssl/crypto/asn1/ |
bio_ndef.c | 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) 175 *plen = *ndef_aux->boundary - *pbuf; 180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) 194 *plen = 0; 198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) 201 if (!ndef_prefix_free(b, pbuf, plen, parg) [all...] |
/external/srec/srec/Nametag/src/ |
Nametag.c | 36 ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t* plen) 38 if (self == NULL || pvalue == NULL || plen == NULL) 43 return self->getValue(self, pvalue, plen);
|
/external/openssl/crypto/evp/ |
e_aes_cbc_hmac_sha1.c | 177 size_t plen = key->payload_length, local 190 if (plen==NO_PAYLOAD_LENGTH) 191 plen = len; 192 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) 198 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { 214 SHA1_Update(&key->md,in+sha_off,plen-sha_off); 216 if (plen!=len) { /* "TLS" mode of operation */ 218 memcpy(out+aes_off,in+aes_off,plen-aes_off); 221 SHA1_Final(out+plen,&key->md) [all...] |
e_rc4_hmac_md5.c | 127 size_t plen = key->payload_length; local 129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; 132 if (plen==NO_PAYLOAD_LENGTH) plen = len; 137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && 155 MD5_Update(&key->md,in+md5_off,plen-md5_off); 157 if (plen!=len) { /* "TLS" mode of operation */ 159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 356 size_t plen; local 362 plen = in_len; 364 "data", out_data, plen); 380 if (plen < rl->iv_size) { 387 plen - rl->iv_size); 388 plen -= rl->iv_size; 392 if (plen == 0) { 398 padlen = out_data[plen - 1]; 399 if (padlen >= plen) { 401 "length (%u, plen=%lu) in [all...] |
/external/bluetooth/bluez/attrib/ |
gatt.c | 73 guint16 plen; local 79 plen = enc_read_by_grp_req(start, end, &prim, pdu, len); 98 plen = enc_find_by_type_req(start, end, &prim, value, vlen, 102 return plen; 224 guint16 plen; local 226 plen = encode_discover_primary(0x0001, 0xffff, uuid, buf, buflen); 227 if (plen == 0) 244 return g_attrib_send(attrib, 0, buf[0], buf, plen, cb, dp, NULL); 333 guint16 plen; local 337 plen = enc_read_by_type_req(start, end, &type_uuid, buf, buflen) 361 guint16 plen; local 402 guint16 plen; local 449 guint16 plen; local 484 guint16 plen; local 525 guint16 plen; local 542 guint16 plen; local 555 guint16 plen; local 571 guint16 plen; local [all...] |
/external/qemu/ |
net-checksum.c | 58 int hlen, plen, proto, csum_offset; local 64 plen = (data[16] << 8 | data[17]) - hlen; 78 if (plen < csum_offset+2) 83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
eap_common.h | 21 const struct wpabuf *msg, size_t *plen);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
eap_common.h | 15 const struct wpabuf *msg, size_t *plen);
|
/external/srec/srec/Nametag/include/ |
SR_NametagDefs.h | 61 * @param plen pointer to the length of the transcription 64 ESR_ReturnCode (*getValue)(const struct SR_Nametag_t* self, const char** pvalue, size_t* plen);
|
SR_Nametag.h | 70 SREC_NAMETAG_API ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
|
SR_NametagImpl.h | 57 SREC_NAMETAG_API ESR_ReturnCode SR_Nametag_GetValue(const SR_Nametag* self, const char** pvalue, size_t *plen);
|
/external/bluetooth/hcidump/parser/ |
hcrp.c | 85 uint16_t pid, tid, plen, status; local 90 plen = get_u16(frm); 94 printf("HCRP %s %s: tid 0x%x plen %d", 95 pid2str(pid), frm->in ? "rsp" : "cmd", tid, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/bluetooth/bluez/tools/ |
hciattach_tialt.c | 81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ 82 "Error in response: plen is not >= 4, but 0x%02x!\n", 83 resp.hci_hdr.plen); 107 cmd.hci_hdr.plen = sizeof(uint32_t); 122 if (read_command_complete(fd, cmd.hci_hdr.opcode, cmd.hci_hdr.plen) < 0) { 155 FAILIF(read(fw, data, cmd->plen) != cmd->plen, 157 cmd->plen, 165 cmd->plen); [all...] |
/external/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 133 plen = 4; 137 plen = strlen (pfx); 138 if (plen > 5) 139 plen = 5; 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|