/external/wpa_supplicant_8/src/crypto/ |
sha1-prf.c | 34 size_t pos, plen; local 49 plen = buf_len - pos; 50 if (plen >= SHA1_MAC_LEN) { 59 os_memcpy(&buf[pos], hash, plen);
|
sha1-tprf.c | 33 size_t pos, plen; local 56 plen = buf_len - pos; 59 if (plen >= SHA1_MAC_LEN) { 63 os_memcpy(&buf[pos], hash, plen);
|
sha1-pbkdf2.c | 77 size_t left = buflen, plen; local 85 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 86 os_memcpy(pos, digest, plen); 87 pos += plen; 88 left -= plen;
|
sha256-prf.c | 56 size_t pos, plen; local 75 plen = buf_len - pos; 77 if (plen >= SHA256_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen); 84 pos += plen;
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.c | 20 size_t pos, plen; local 71 plen = buf_len - pos; 74 if (plen >= SHA1_MAC_LEN) { 78 os_memcpy(&buf[pos], hash, plen);
|
eap_sake_common.c | 214 size_t pos, plen; local 231 plen = buf_len - pos; 232 if (plen >= SHA1_MAC_LEN) { 239 os_memcpy(&buf[pos], hash, plen);
|
/external/qemu/net/ |
checksum.c | 58 int hlen, plen, proto, csum_offset; local 64 plen = (data[16] << 8 | data[17]) - hlen; 78 if (plen < csum_offset+2) 83 csum = net_checksum_tcpudp(plen, proto, data+14+12, data+14+hlen);
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/test/ |
NETEQTEST_DummyRTPpacket.cc | 30 uint16_t length, plen; local 44 if (fread(&plen, 2, 1, fp) == 0) 49 packetLen = ntohs(plen); 59 // Use length here because a plen of 0 specifies rtcp. 150 uint16_t length, plen; local 161 plen = htons(_datagramLen); 162 if (fwrite(&plen, 2, 1, fp) != 1)
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/tools/ |
rtp_file_source.cc | 58 uint16_t plen; local 59 if (fread(&plen, sizeof(plen), 1, in_file_) == 0) { 63 plen = ntohs(plen); 72 // Use length here because a plen of 0 specifies RTCP. 88 plen,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 98 plen = password_len; 103 plen += 9 + identity_len + 1; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 116 1, plen);
|
/external/flac/libFLAC/ |
stream_encoder_framing.c | 499 const unsigned plen = is_extended? FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE2_PARAMETER_LEN : FLAC__ENTROPY_CODING_METHOD_PARTITIONED_RICE_PARAMETER_LEN; local 506 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[0], plen)) 513 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen)) 534 if(!FLAC__bitwriter_write_raw_uint32(bw, rice_parameters[i], plen)) 540 if(!FLAC__bitwriter_write_raw_uint32(bw, pesc, plen))
|
/external/openssl/crypto/cms/ |
cms_pwri.c | 329 int plen; local 359 plen = algtmp->parameter->value.sequence->length; 360 kekalg = d2i_X509_ALGOR(NULL, &p, plen);
|
/external/openssl/crypto/rsa/ |
rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_md5.c | 103 size_t plen; local 114 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 115 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
eap_server_tls_common.c | 148 size_t send_len, plen; local 167 plen = 1 + send_len; 169 plen += 4; 171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 356 size_t plen; local 362 plen = in_len; 364 "data", out_data, plen); 380 if (plen < rl->iv_size) { 387 plen - rl->iv_size); 388 plen -= rl->iv_size; 392 if (plen == 0) { 398 padlen = out_data[plen - 1]; 399 if (padlen >= plen) { 401 "length (%u, plen=%lu) in [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wifi_display.c | 70 size_t len, plen; local 179 plen = buf->used; 196 buf->used = plen;
|
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
rsa_test.c | 393 int plen; local 400 plen = sizeof(ptext_ex) - 1; 425 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, RSA_PKCS1_PADDING); 433 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) { 443 RSA_public_encrypt(plen, ptext_ex, ctext, key, RSA_PKCS1_OAEP_PADDING); 455 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) { 468 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) {
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/main/test/ |
RTPFile.cc | 188 uint16_t plen = htons(12 + payloadSize); local 196 if (fwrite(&plen, 2, 1, _rtpFile) != 1) { 213 uint16_t plen; local 221 EXPECT_EQ(1u, fread(&plen, 2, 1, _rtpFile)); 224 plen = ntohs(plen); 226 EXPECT_GT(plen, 11); 232 EXPECT_EQ(lengthBytes, plen + 8); 234 if (plen == 0) {
|
/external/chromium_org/third_party/webrtc/modules/utility/source/ |
rtp_dump_impl.cc | 50 // Length of packet, including this header (may be smaller than plen if not 54 uint16_t plen; member in struct:webrtc::__anon20659 187 hdr.plen = 0; 191 hdr.plen = RtpDumpHtons((uint16_t)packetLength);
|
/external/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 127 size_t plen = key->payload_length; local 129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; 132 if (plen==NO_PAYLOAD_LENGTH) plen = len; 137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && 155 MD5_Update(&key->md,in+md5_off,plen-md5_off); 157 if (plen!=len) { /* "TLS" mode of operation */ 159 memcpy(out+rc4_off,in+rc4_off,plen-rc4_off) [all...] |
p5_crpt2.c | 199 int plen; local 212 plen = param->value.sequence->length; 213 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 258 int saltlen, iter, plen; local 282 plen = param->value.sequence->length; 284 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
|
/external/openssl/crypto/rand/ |
rand_lib.c | 271 size_t plen; local 295 plen = drbg_get_adin(dctx, &p); 296 memcpy(pers + 16, p, plen);
|
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 401 UINT16_t plen = 0; local 431 plen += sizeof(pid) + TAG_HDR_SIZE; 443 plen += elen + TAG_HDR_SIZE; 452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; 460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; 463 packet.length = htons(plen); 464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE));
|
discovery.c | 250 UINT16_t plen; local 255 plen = TAG_HDR_SIZE + namelen; 256 CHECK_ROOM(cursor, packet.payload, plen); 287 plen += sizeof(pid) + TAG_HDR_SIZE; 290 packet.length = htons(plen); 292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE)); 421 UINT16_t plen; local 426 plen = TAG_HDR_SIZE + namelen; 427 CHECK_ROOM(cursor, packet.payload, plen); 455 plen += sizeof(pid) + TAG_HDR_SIZE [all...] |