/external/chromium_org/third_party/cld/encodings/compact_lang_det/win/ |
cld_htmlutils_google3.cc | 20 int* tlen, int* plen) { 25 *plen = runetochar(dst, &entval); 29 *plen = 0; 31 // fprintf(stderr,"t%d p%d]\n", *tlen, *plen);
|
cld_htmlutils_windows.cc | 10 int* tlen, int* plen) { 28 *plen = 1;
|
cld_htmlutils.h | 11 int* tlen, int* plen);
|
/external/wpa_supplicant_8/src/crypto/ |
sha1-prf.c | 34 size_t pos, plen; local 49 plen = buf_len - pos; 50 if (plen >= SHA1_MAC_LEN) { 59 os_memcpy(&buf[pos], hash, plen);
|
sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
sha256-prf.c | 56 size_t pos, plen; local 75 plen = buf_len - pos; 77 if (plen >= SHA256_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen); 84 pos += plen;
|
sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
/external/tcpdump/ |
print-bgp.c | 431 u_int plen; local 434 plen = pptr[0]; 435 if (32 < plen) 439 TCHECK2(pptr[1], (plen + 7) / 8); 440 memcpy(&addr, &pptr[1], (plen + 7) / 8); 441 if (plen % 8) { 442 ((u_char *)&addr)[(plen + 7) / 8 - 1] &= 443 ((0xff00 >> (plen % 8)) & 0xff); 445 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen); 446 return 1 + (plen + 7) / 8 456 u_int plen; local 541 u_int plen; local 578 u_int plen; local 635 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local 702 u_int plen; local 727 u_int plen; local 764 u_int plen; local 803 u_int plen; local 832 u_int plen; local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
bio_ndef.c | 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) 175 *plen = *ndef_aux->boundary - *pbuf; 180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) 194 *plen = 0; 198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) 201 if (!ndef_prefix_free(b, pbuf, plen, parg) [all...] |
/external/openssl/crypto/asn1/ |
bio_ndef.c | 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) 175 *plen = *ndef_aux->boundary - *pbuf; 180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) 194 *plen = 0; 198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) 201 if (!ndef_prefix_free(b, pbuf, plen, parg) [all...] |
/external/srec/srec/Nametag/src/ |
Nametag.c | 36 ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t* plen) 38 if (self == NULL || pvalue == NULL || plen == NULL) 43 return self->getValue(self, pvalue, plen);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 356 size_t plen; local 362 plen = in_len; 364 "data", out_data, plen); 380 if (plen < rl->iv_size) { 387 plen - rl->iv_size); 388 plen -= rl->iv_size; 392 if (plen == 0) { 398 padlen = out_data[plen - 1]; 399 if (padlen >= plen) { 401 "length (%u, plen=%lu) in [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 127 size_t plen = key->payload_length; local 129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; 132 if (plen==NO_PAYLOAD_LENGTH) plen = len; 137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && 155 MD5_Update(&key->md,in+md5_off,plen-md5_off); 157 if (plen!=len) { /* "TLS" mode of operation */ 159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off) [all...] |
/external/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 127 size_t plen = key->payload_length; local 129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; 132 if (plen==NO_PAYLOAD_LENGTH) plen = len; 137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && 155 MD5_Update(&key->md,in+md5_off,plen-md5_off); 157 if (plen!=len) { /* "TLS" mode of operation */ 159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off) [all...] |
/external/qemu/ |
net-checksum.c | 58 int hlen, plen, proto, csum_offset; local 64 plen = (data[16] << 8 | data[17]) - hlen; 78 if (plen < csum_offset+2) 83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
eap_common.h | 16 const struct wpabuf *msg, size_t *plen);
|
/external/libppp/src/ |
tcpmss.c | 147 size_t hlen, plen; local 153 plen = m_length(bp); 162 ntohs(pip->ip_len) == plen && hlen <= plen && 163 plen >= sizeof(struct tcphdr) + hlen) 164 MSSFixup((struct tcphdr *)(MBUF_CTOP(bp) + hlen), plen - hlen,
|
/prebuilts/gcc/darwin-x86/arm/arm-linux-androideabi-4.7/share/gdb/python/gdb/ |
prompt.py | 114 plen = len(prompt) 116 while i < plen: 119 if i >= plen: 126 if i + 1 < plen and prompt[i + 1] == '{': 128 while j < plen and prompt[j] != '}': 131 if j >= plen or prompt[j] != '}':
|
/prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.7/share/gdb/python/gdb/ |
prompt.py | 114 plen = len(prompt) 116 while i < plen: 119 if i >= plen: 126 if i + 1 < plen and prompt[i + 1] == '{': 128 while j < plen and prompt[j] != '}': 131 if j >= plen or prompt[j] != '}':
|
/external/srec/srec/Nametag/include/ |
SR_NametagDefs.h | 61 * @param plen pointer to the length of the transcription 64 ESR_ReturnCode (*getValue)(const struct SR_Nametag_t* self, const char** pvalue, size_t* plen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/external/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 133 plen = 4; 137 plen = strlen (pfx); 138 if (plen > 5) 139 plen = 5; 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|