HomeSort by relevance Sort by last modified time
    Searched refs:plen (Results 1 - 25 of 226) sorted by null

1 2 3 4 5 6 7 8 910

  /external/chromium_org/third_party/cld/encodings/compact_lang_det/win/
cld_htmlutils_google3.cc 20 int* tlen, int* plen) {
25 *plen = runetochar(dst, &entval);
29 *plen = 0;
31 // fprintf(stderr,"t%d p%d]\n", *tlen, *plen);
cld_htmlutils_windows.cc 10 int* tlen, int* plen) {
28 *plen = 1;
cld_htmlutils.h 11 int* tlen, int* plen);
  /external/wpa_supplicant_8/src/crypto/
sha1-prf.c 34 size_t pos, plen; local
49 plen = buf_len - pos;
50 if (plen >= SHA1_MAC_LEN) {
59 os_memcpy(&buf[pos], hash, plen);
sha1-pbkdf2.c 77 size_t left = buflen, plen; local
85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left;
86 os_memcpy(pos, digest, plen);
87 pos += plen;
88 left -= plen;
sha256-prf.c 56 size_t pos, plen; local
75 plen = buf_len - pos;
77 if (plen >= SHA256_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
84 pos += plen;
sha1-tprf.c 33 size_t pos, plen; local
56 plen = buf_len - pos;
59 if (plen >= SHA1_MAC_LEN) {
63 os_memcpy(&buf[pos], hash, plen);
  /external/tcpdump/
print-bgp.c 431 u_int plen; local
434 plen = pptr[0];
435 if (32 < plen)
439 TCHECK2(pptr[1], (plen + 7) / 8);
440 memcpy(&addr, &pptr[1], (plen + 7) / 8);
441 if (plen % 8) {
442 ((u_char *)&addr)[(plen + 7) / 8 - 1] &=
443 ((0xff00 >> (plen % 8)) & 0xff);
445 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen);
446 return 1 + (plen + 7) / 8
456 u_int plen; local
541 u_int plen; local
578 u_int plen; local
635 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local
702 u_int plen; local
727 u_int plen; local
764 u_int plen; local
803 u_int plen; local
832 u_int plen; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
bio_ndef.c 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg)
175 *plen = *ndef_aux->boundary - *pbuf;
180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg)
194 *plen = 0;
198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg)
201 if (!ndef_prefix_free(b, pbuf, plen, parg)
    [all...]
  /external/openssl/crypto/asn1/
bio_ndef.c 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg)
175 *plen = *ndef_aux->boundary - *pbuf;
180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg)
194 *plen = 0;
198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg)
201 if (!ndef_prefix_free(b, pbuf, plen, parg)
    [all...]
  /external/srec/srec/Nametag/src/
Nametag.c 36 ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t* plen)
38 if (self == NULL || pvalue == NULL || plen == NULL)
43 return self->getValue(self, pvalue, plen);
  /external/wpa_supplicant_8/src/tls/
tlsv1_record.c 356 size_t plen; local
362 plen = in_len;
364 "data", out_data, plen);
380 if (plen < rl->iv_size) {
387 plen - rl->iv_size);
388 plen -= rl->iv_size;
392 if (plen == 0) {
398 padlen = out_data[plen - 1];
399 if (padlen >= plen) {
401 "length (%u, plen=%lu) in
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
e_rc4_hmac_md5.c 127 size_t plen = key->payload_length; local
129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0;
132 if (plen==NO_PAYLOAD_LENGTH) plen = len;
137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) &&
155 MD5_Update(&key->md,in+md5_off,plen-md5_off);
157 if (plen!=len) { /* "TLS" mode of operation */
159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off)
    [all...]
  /external/openssl/crypto/evp/
e_rc4_hmac_md5.c 127 size_t plen = key->payload_length; local
129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0;
132 if (plen==NO_PAYLOAD_LENGTH) plen = len;
137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) &&
155 MD5_Update(&key->md,in+md5_off,plen-md5_off);
157 if (plen!=len) { /* "TLS" mode of operation */
159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off)
    [all...]
  /external/qemu/
net-checksum.c 58 int hlen, plen, proto, csum_offset; local
64 plen = (data[16] << 8 | data[17]) - hlen;
78 if (plen < csum_offset+2)
83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
  /external/wpa_supplicant_8/src/eap_common/
eap_peap_common.c 20 size_t pos, plen; local
71 plen = buf_len - pos;
74 if (plen >= SHA1_MAC_LEN) {
78 os_memcpy(&buf[pos], hash, plen);
eap_common.h 16 const struct wpabuf *msg, size_t *plen);
  /external/libppp/src/
tcpmss.c 147 size_t hlen, plen; local
153 plen = m_length(bp);
162 ntohs(pip->ip_len) == plen && hlen <= plen &&
163 plen >= sizeof(struct tcphdr) + hlen)
164 MSSFixup((struct tcphdr *)(MBUF_CTOP(bp) + hlen), plen - hlen,
  /prebuilts/gcc/darwin-x86/arm/arm-linux-androideabi-4.7/share/gdb/python/gdb/
prompt.py 114 plen = len(prompt)
116 while i < plen:
119 if i >= plen:
126 if i + 1 < plen and prompt[i + 1] == '{':
128 while j < plen and prompt[j] != '}':
131 if j >= plen or prompt[j] != '}':
  /prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.7/share/gdb/python/gdb/
prompt.py 114 plen = len(prompt)
116 while i < plen:
119 if i >= plen:
126 if i + 1 < plen and prompt[i + 1] == '{':
128 while j < plen and prompt[j] != '}':
131 if j >= plen or prompt[j] != '}':
  /external/srec/srec/Nametag/include/
SR_NametagDefs.h 61 * @param plen pointer to the length of the transcription
64 ESR_ReturnCode (*getValue)(const struct SR_Nametag_t* self, const char** pvalue, size_t* plen);
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
98 plen = password_len;
103 plen += 9 + identity_len + 1;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
116 1, plen);
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_test.c 219 int plen; local
230 plen = sizeof(ptext_ex) - 1;
248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
  /external/openssl/crypto/rsa/
rsa_test.c 219 int plen; local
230 plen = sizeof(ptext_ex) - 1;
248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
  /ndk/sources/host-tools/sed-4.2.1/lib/
tempname.c 128 size_t dlen, plen; local
133 plen = 4;
137 plen = strlen (pfx);
138 if (plen > 5)
139 plen = 5;
170 if (tmpl_len < dlen + 1 + plen + 6 + 1)
176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);

Completed in 1237 milliseconds

1 2 3 4 5 6 7 8 910