HomeSort by relevance Sort by last modified time
    Searched defs:plen (Results 1 - 25 of 138) sorted by null

1 2 3 4 5 6

  /external/wpa_supplicant_8/src/crypto/
sha1-prf.c 34 size_t pos, plen; local
49 plen = buf_len - pos;
50 if (plen >= SHA1_MAC_LEN) {
59 os_memcpy(&buf[pos], hash, plen);
sha1-tprf.c 33 size_t pos, plen; local
56 plen = buf_len - pos;
59 if (plen >= SHA1_MAC_LEN) {
63 os_memcpy(&buf[pos], hash, plen);
sha1-pbkdf2.c 77 size_t left = buflen, plen; local
85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
86 os_memcpy(pos, digest, plen);
87 pos += plen;
88 left -= plen;
sha256-prf.c 56 size_t pos, plen; local
75 plen = buf_len - pos;
77 if (plen >= SHA256_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
84 pos += plen;
  /external/wpa_supplicant_8/src/eap_common/
eap_peap_common.c 20 size_t pos, plen; local
71 plen = buf_len - pos;
74 if (plen >= SHA1_MAC_LEN) {
78 os_memcpy(&buf[pos], hash, plen);
eap_sake_common.c 214 size_t pos, plen; local
231 plen = buf_len - pos;
232 if (plen >= SHA1_MAC_LEN) {
239 os_memcpy(&buf[pos], hash, plen);
  /external/libppp/src/
tcpmss.c 147 size_t hlen, plen; local
153 plen = m_length(bp);
162 ntohs(pip->ip_len) == plen && hlen <= plen &&
163 plen >= sizeof(struct tcphdr) + hlen)
164 MSSFixup((struct tcphdr *)(MBUF_CTOP(bp) + hlen), plen - hlen,
pap.c 89 int namelen, keylen, plen; local
93 plen = namelen + keylen + 2;
100 lh.length = htons(plen + sizeof(struct fsmheader));
101 bp = m_get(plen + sizeof(struct fsmheader), MB_PAPOUT);
119 int plen, mlen; local
124 plen = mlen + 1;
125 lh.length = htons(plen + sizeof(struct fsmheader));
126 bp = m_get(plen + sizeof(struct fsmheader), MB_PAPOUT);
  /external/qemu/
net-checksum.c 58 int hlen, plen, proto, csum_offset; local
64 plen = (data[16] << 8 | data[17]) - hlen;
78 if (plen < csum_offset+2)
83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
  /external/wpa_supplicant_8/wpa_supplicant/
wifi_display.c 39 size_t len, plen; local
145 plen = buf->used;
162 buf->used = plen;
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_test.c 219 int plen; local
230 plen = sizeof(ptext_ex) - 1;
248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
  /external/flac/libFLAC/
stream_encoder_framing.c 499 const unsigned plen = is_extended? FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_PARAMETER_LEN : FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_PARAMETER_LEN; local
506 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[0], plen))
513 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
534 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[i], plen))
540 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
  /external/openssl/crypto/rsa/
rsa_test.c 219 int plen; local
230 plen = sizeof(ptext_ex) - 1;
248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
  /external/wpa_supplicant_8/src/eap_server/
eap_server_md5.c 103 size_t plen; local
114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
eap_server_tls_common.c 123 size_t send_len, plen; local
142 plen = 1 + send_len;
144 plen += 4;
146 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 356 size_t plen; local
362 plen = in_len;
364 "data", out_data, plen);
380 if (plen < rl->iv_size) {
387 plen - rl->iv_size);
388 plen -= rl->iv_size;
392 if (plen == 0) {
398 padlen = out_data[plen - 1];
399 if (padlen >= plen) {
401 "length (%u, plen=%lu) in
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
e_rc4_hmac_md5.c 127 size_t plen = key->payload_length; local
129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0;
132 if (plen==NO_PAYLOAD_LENGTH) plen = len;
137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) &&
155 MD5_Update(&key->md,in+md5_off,plen-md5_off);
157 if (plen!=len) { /* "TLS" mode of operation */
159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off)
    [all...]
p5_crpt2.c 177 int plen; local
190 plen = param->value.sequence->length;
191 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) {
236 int saltlen, iter, plen; local
260 plen = param->value.sequence->length;
262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
  /external/chromium_org/third_party/openssl/openssl/crypto/rand/
rand_lib.c 270 size_t plen; local
286 plen = drbg_get_adin(dctx, &p);
287 memcpy(pers + 16, p, plen);
  /external/openssl/crypto/evp/
e_rc4_hmac_md5.c 127 size_t plen = key->payload_length; local
129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0;
132 if (plen==NO_PAYLOAD_LENGTH) plen = len;
137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) &&
155 MD5_Update(&key->md,in+md5_off,plen-md5_off);
157 if (plen!=len) { /* "TLS" mode of operation */
159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off)
    [all...]
p5_crpt2.c 177 int plen; local
190 plen = param->value.sequence->length;
191 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) {
236 int saltlen, iter, plen; local
260 plen = param->value.sequence->length;
262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
  /external/openssl/crypto/rand/
rand_lib.c 270 size_t plen; local
286 plen = drbg_get_adin(dctx, &p);
287 memcpy(pers + 16, p, plen);
  /external/ppp/pppd/plugins/rp-pppoe/
common.c 401 UINT16_t plen = 0; local
431 plen += sizeof(pid) + TAG_HDR_SIZE;
443 plen += elen + TAG_HDR_SIZE;
452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE;
460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE;
463 packet.length = htons(plen);
464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
discovery.c 250 UINT16_t plen; local
255 plen = TAG_HDR_SIZE + namelen;
256 CHECK_ROOM(cursor, packet.payload, plen);
287 plen += sizeof(pid) + TAG_HDR_SIZE;
290 packet.length = htons(plen);
292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
421 UINT16_t plen; local
426 plen = TAG_HDR_SIZE + namelen;
427 CHECK_ROOM(cursor, packet.payload, plen);
455 plen += sizeof(pid) + TAG_HDR_SIZE
    [all...]

Completed in 520 milliseconds

1 2 3 4 5 6