/external/wpa_supplicant_8/src/crypto/ |
sha1-prf.c | 34 size_t pos, plen; local 49 plen = buf_len - pos; 50 if (plen >= SHA1_MAC_LEN) { 59 os_memcpy(&buf[pos], hash, plen);
|
sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
sha256-prf.c | 56 size_t pos, plen; local 75 plen = buf_len - pos; 77 if (plen >= SHA256_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen); 84 pos += plen;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
eap_sake_common.c | 214 size_t pos, plen; local 231 plen = buf_len - pos; 232 if (plen >= SHA1_MAC_LEN) { 239 os_memcpy(&buf[pos], hash, plen);
|
/external/libppp/src/ |
tcpmss.c | 147 size_t hlen, plen; local 153 plen = m_length(bp); 162 ntohs(pip->ip_len) == plen && hlen <= plen && 163 plen >= sizeof(struct tcphdr) + hlen) 164 MSSFixup((struct tcphdr *)(MBUF_CTOP(bp) + hlen), plen - hlen,
|
pap.c | 89 int namelen, keylen, plen; local 93 plen = namelen + keylen + 2; 100 lh.length = htons(plen + sizeof(struct fsmheader)); 101 bp = m_get(plen + sizeof(struct fsmheader), MB_PAPOUT); 119 int plen, mlen; local 124 plen = mlen + 1; 125 lh.length = htons(plen + sizeof(struct fsmheader)); 126 bp = m_get(plen + sizeof(struct fsmheader), MB_PAPOUT);
|
/external/qemu/ |
net-checksum.c | 58 int hlen, plen, proto, csum_offset; local 64 plen = (data[16] << 8 | data[17]) - hlen; 78 if (plen < csum_offset+2) 83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wifi_display.c | 39 size_t len, plen; local 145 plen = buf->used; 162 buf->used = plen;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/external/flac/libFLAC/ |
stream_encoder_framing.c | 499 const unsigned plen = is_extended? FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_PARAMETER_LEN : FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_PARAMETER_LEN; local 506 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[0], plen)) 513 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen)) 534 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[i], plen)) 540 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
|
/external/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
eap_server_tls_common.c | 123 size_t send_len, plen; local 142 plen = 1 + send_len; 144 plen += 4; 146 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 356 size_t plen; local 362 plen = in_len; 364 "data", out_data, plen); 380 if (plen < rl->iv_size) { 387 plen - rl->iv_size); 388 plen -= rl->iv_size; 392 if (plen == 0) { 398 padlen = out_data[plen - 1]; 399 if (padlen >= plen) { 401 "length (%u, plen=%lu) in [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 127 size_t plen = key->payload_length; local 129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; 132 if (plen==NO_PAYLOAD_LENGTH) plen = len; 137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && 155 MD5_Update(&key->md,in+md5_off,plen-md5_off); 157 if (plen!=len) { /* "TLS" mode of operation */ 159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off) [all...] |
p5_crpt2.c | 177 int plen; local 190 plen = param->value.sequence->length; 191 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 236 int saltlen, iter, plen; local 260 plen = param->value.sequence->length; 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/rand/ |
rand_lib.c | 270 size_t plen; local 286 plen = drbg_get_adin(dctx, &p); 287 memcpy(pers + 16, p, plen);
|
/external/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 127 size_t plen = key->payload_length; local 129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; 132 if (plen==NO_PAYLOAD_LENGTH) plen = len; 137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && 155 MD5_Update(&key->md,in+md5_off,plen-md5_off); 157 if (plen!=len) { /* "TLS" mode of operation */ 159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off) [all...] |
p5_crpt2.c | 177 int plen; local 190 plen = param->value.sequence->length; 191 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 236 int saltlen, iter, plen; local 260 plen = param->value.sequence->length; 262 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
|
/external/openssl/crypto/rand/ |
rand_lib.c | 270 size_t plen; local 286 plen = drbg_get_adin(dctx, &p); 287 memcpy(pers + 16, p, plen);
|
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 401 UINT16_t plen = 0; local 431 plen += sizeof(pid) + TAG_HDR_SIZE; 443 plen += elen + TAG_HDR_SIZE; 452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; 460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; 463 packet.length = htons(plen); 464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
|
discovery.c | 250 UINT16_t plen; local 255 plen = TAG_HDR_SIZE + namelen; 256 CHECK_ROOM(cursor, packet.payload, plen); 287 plen += sizeof(pid) + TAG_HDR_SIZE; 290 packet.length = htons(plen); 292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE)); 421 UINT16_t plen; local 426 plen = TAG_HDR_SIZE + namelen; 427 CHECK_ROOM(cursor, packet.payload, plen); 455 plen += sizeof(pid) + TAG_HDR_SIZE [all...] |