HomeSort by relevance Sort by last modified time
    Searched defs:plen (Results 26 - 50 of 137) sorted by null

12 3 4 5 6

  /ndk/sources/host-tools/sed-4.2.1/lib/
tempname.c 128 size_t dlen, plen; local
133 plen = 4;
137 plen = strlen (pfx);
138 if (plen > 5)
139 plen = 5;
170 if (tmpl_len < dlen + 1 + plen + 6 + 1)
176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
  /external/bluetooth/bluedroid/stack/avdt/
avdt_api.c 1353 UINT8 *p, *plen, *pm1, *p_end; local
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/evp/
p_rsa_asn1.c 264 int plen; local
273 plen = alg->parameter->value.sequence->length;
274 return d2i_X509_ALGOR(NULL, &p, plen);
280 int plen; local
289 plen = alg->parameter->value.sequence->length;
290 pss = d2i_RSA_PSS_PARAMS(NULL, &p, plen);
  /external/chromium_org/third_party/boringssl/src/ssl/
s3_pkt.c 642 unsigned char *p,*plen; local
751 plen=p;
810 s2n(wr->length,plen);
813 s->msg_callback(1, 0, SSL3_RT_HEADER, plen - 5, 5, s, s->msg_callback_arg);
    [all...]
  /external/chromium_org/third_party/cld/encodings/compact_lang_det/
getonescriptspan.cc 290 int tlen, plen; local
323 temp, &tlen, &plen);
365 int tlen, plen; local
411 script_buffer_ + put, &tlen, &plen);
417 tlen = plen = cld_UniLib::OneCharLen(next_byte_ + take);
424 memcpy(script_buffer_ + put, next_byte_ + take, plen);
429 // char xtmp[8]; memcpy(xtmp,script_buffer_ + put, plen);
430 // xtmp[plen] = '\0'; printf("'%s'{%d} ", xtmp, sc);
463 put += plen; // Advance
499 script_buffer_ + put, &tlen, &plen);
    [all...]
  /external/chromium_org/third_party/opus/src/tests/
test_opus_decode.c 54 int err,skip,plen; local
302 plen=(fast_rand()%18+3)*8+skip+3;
307 for(t=0;t<5*2;t++)expected[t]=opus_decoder_get_nb_samples(dec[t],packet,plen);
308 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255;
310 if(opus_decode(decbak, packet, plen+1, outbuf, expected[0], 1)!=expected[0])test_failed();
318 out_samples = opus_decode(dec[t], packet, plen+1, outbuf, MAX_FRAME_SAMP, 0);
326 fprintf(stdout," dec[all] random packets, all mode pairs (4096), %d bytes/frame OK.\n",plen+1);
328 plen=(fast_rand()%18+3)*8+skip+3;
334 expected=opus_decoder_get_nb_samples(dec[t],packet,plen);
337 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255
    [all...]
  /external/iputils/
tracepath.c 80 int plen; local
81 plen = printf("%s", a);
83 plen += printf(" (%s)", b);
84 if (plen >= HOST_COLUMN_SIZE)
85 plen = HOST_COLUMN_SIZE - 1;
86 printf("%*s", HOST_COLUMN_SIZE - plen, "");
  /external/libedit/src/
el.c 542 size_t plen = sizeof(elpath); local
546 plen += strlen(ptr);
547 if ((path = el_malloc(plen * sizeof(*path))) == NULL)
549 (void)snprintf(path, plen, "%s%s", ptr, elpath);
  /external/libopus/tests/
test_opus_decode.c 54 int err,skip,plen; local
302 plen=(fast_rand()%18+3)*8+skip+3;
307 for(t=0;t<5*2;t++)expected[t]=opus_decoder_get_nb_samples(dec[t],packet,plen);
308 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255;
310 if(opus_decode(decbak, packet, plen+1, outbuf, expected[0], 1)!=expected[0])test_failed();
318 out_samples = opus_decode(dec[t], packet, plen+1, outbuf, MAX_FRAME_SAMP, 0);
326 fprintf(stdout," dec[all] random packets, all mode pairs (4096), %d bytes/frame OK.\n",plen+1);
328 plen=(fast_rand()%18+3)*8+skip+3;
334 expected=opus_decoder_get_nb_samples(dec[t],packet,plen);
337 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255
    [all...]
  /external/mdnsresponder/mDNSPosix/
mDNSUNP.c 68 void plen_to_mask(int plen, char *addr) {
74 if (plen>bits_in_block) ones_in_block=bits_in_block;
75 else ones_in_block=plen;
78 plen -= ones_in_block;
88 int flags, myflags, index, plen, scope; local
112 &index, &plen, &scope, &flags, ifname) != EOF) {
151 plen_to_mask(plen, ipv6addr);
  /external/openssl/crypto/evp/
e_aes_cbc_hmac_sha1.c 184 size_t plen = key->payload_length, local
199 if (plen==NO_PAYLOAD_LENGTH)
200 plen = len;
201 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE))
207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) {
223 SHA1_Update(&key->md,in+sha_off,plen-sha_off);
225 if (plen!=len) { /* "TLS" mode of operation */
227 memcpy(out+aes_off,in+aes_off,plen-aes_off);
230 SHA1_Final(out+plen,&key->md)
    [all...]
  /external/openssl/crypto/rsa/
rsa_ameth.c 272 int plen; local
280 plen = alg->parameter->value.sequence->length;
281 pss = d2i_RSA_PSS_PARAMS(NULL, &p, plen);
293 plen = param->value.sequence->length;
294 *pmaskHash = d2i_X509_ALGOR(NULL, &p, plen);
  /external/openssl/ssl/
s3_pkt.c 696 unsigned char *p,*plen; local
806 plen=p;
875 s2n(wr->length,plen);
    [all...]
  /external/tcpdump/
print-babel.c 114 format_prefix(const u_char *prefix, unsigned char plen)
117 if(plen >= 96 && memcmp(prefix, v4prefix, 12) == 0)
118 snprintf(buf, 50, "%s/%u", ipaddr_string(prefix + 12), plen - 96);
121 snprintf(buf, 50, "%s/%u", ip6addr_string(prefix), plen);
162 network_prefix(int ae, int plen, unsigned int omitted,
170 if(plen >= 0)
171 pb = (plen + 7) / 8;
444 u_char plen; local
449 plen = message[4] + (message[2] == 1 ? 96 : 0);
462 format_prefix(prefix, plen),
482 u_char prefix[16], plen; local
502 u_char prefix[16], plen; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
vlan_init.c 681 int len, plen; local
684 plen = len - sizeof(*h);
685 if (len > left || plen < 0) {
687 "message: len=%d left=%d plen=%d",
688 len, left, plen);
694 vlan_read_ifnames(h, plen, 0, hapd);
697 vlan_read_ifnames(h, plen, 1, hapd);
wnm_ap.c 374 size_t plen; local
381 plen = len - IEEE80211_HDRLEN - 2;
386 plen);
390 plen);
393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 501 size_t alen, plen, i, list_len; local
622 plen = WPA_GET_BE16(apos);
625 if (plen > alen) {
629 (unsigned long) plen,
635 attr->identity_len = plen;
760 plen = apos[0] * 256 + apos[1];
761 if (plen > alen - 2) {
765 (unsigned long) plen,
770 attr->next_pseudonym_len = plen;
780 plen = apos[0] * 256 + apos[1]
    [all...]
ikev2_common.c 254 int plen, pdatalen; local
264 plen = WPA_GET_BE16(phdr->payload_length);
265 if (plen < (int) sizeof(*phdr) || pos + plen > end) {
267 "length %d", plen);
273 phdr->next_payload, phdr->flags, plen);
276 pdatalen = plen - sizeof(*phdr);
342 pos + plen == end) {
353 pos += plen;
532 size_t plen; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_ikev2.c 141 size_t send_len, plen, icv_len = 0; local
158 plen = 1 + send_len;
160 plen += 4;
174 plen += icv_len;
176 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
eap_pax.c 94 u8 id, u8 op_code, size_t plen)
100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id);
123 size_t left, plen; local
189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN +
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
eap_psk.c 188 size_t buflen, left, data_len, len, plen; local
316 plen = sizeof(*hdr4) + 4 + 16 + data_len;
317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
eap_sake.c 120 size_t plen; local
122 plen = length + sizeof(struct eap_sake_hdr);
124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
eap_tnc.c 88 size_t send_len, plen; local
105 plen = 1 + send_len;
107 plen += 4;
108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
eap_wsc.c 306 size_t send_len, plen; local
322 plen = 2 + send_len;
324 plen += 2;
325 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
  /external/wpa_supplicant_8/src/eap_server/
eap_server.c 928 size_t plen; local
945 plen = be_to_host16(hdr->length);
946 if (plen > wpabuf_len(resp)) {
948 "(len=%lu plen=%lu)",
950 (unsigned long) plen);
959 if (plen > sizeof(*hdr)) {
963 if (plen < sizeof(*hdr) + 8) {
965 "expanded EAP-Packet (plen=%lu)",
966 (unsigned long) plen);
    [all...]

Completed in 3117 milliseconds

12 3 4 5 6