Home
last modified time | relevance | path

Searched refs:plen (Results 51 - 75 of 848) sorted by relevance

12345678910>>...34

/third_party/toybox/porting/liteos_a/lib/
H A Ddirtree.c83 // Initial call can pass in NULL to plen, or point to an int initialized to 0
87 char *dirtree_path(struct dirtree *node, int *plen) in dirtree_path() argument
93 path = xmalloc(*plen); in dirtree_path()
94 *plen = 0; in dirtree_path()
98 len = (plen ? *plen : 0)+strlen(node->name)+1; in dirtree_path()
102 if (plen) *plen = len; in dirtree_path()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dsha1-prf.c34 size_t pos, plen; in sha1_prf() local
49 plen = buf_len - pos; in sha1_prf()
50 if (plen >= SHA1_MAC_LEN) { in sha1_prf()
59 os_memcpy(&buf[pos], hash, plen); in sha1_prf()
H A Dsha1-tprf.c33 size_t pos, plen; in sha1_t_prf() local
56 plen = buf_len - pos; in sha1_t_prf()
59 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf()
63 os_memcpy(&buf[pos], hash, plen); in sha1_t_prf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dsha1-prf.c34 size_t pos, plen; in sha1_prf() local
49 plen = buf_len - pos; in sha1_prf()
50 if (plen >= SHA1_MAC_LEN) { in sha1_prf()
59 os_memcpy(&buf[pos], hash, plen); in sha1_prf()
H A Dsha1-tprf.c33 size_t pos, plen; in sha1_t_prf() local
56 plen = buf_len - pos; in sha1_t_prf()
59 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf()
63 os_memcpy(&buf[pos], hash, plen); in sha1_t_prf()
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/
H A Dcipher_aes_cbc_hmac_sha1_hw.c379 size_t plen = ctx->payload_length; in aesni_cbc_hmac_sha1_cipher() local
390 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha1_cipher()
391 plen = len; in aesni_cbc_hmac_sha1_cipher()
393 ((plen + SHA_DIGEST_LENGTH + in aesni_cbc_hmac_sha1_cipher()
399 if (plen > (sha_off + iv) in aesni_cbc_hmac_sha1_cipher()
400 && (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { in aesni_cbc_hmac_sha1_cipher()
416 sha1_update(&sctx->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha1_cipher()
418 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha1_cipher()
420 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha1_cipher()
423 SHA1_Final(out + plen, in aesni_cbc_hmac_sha1_cipher()
[all...]
/third_party/openssl/providers/implementations/ciphers/
H A Dcipher_aes_cbc_hmac_sha1_hw.c379 size_t plen = ctx->payload_length; in aesni_cbc_hmac_sha1_cipher() local
390 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha1_cipher()
391 plen = len; in aesni_cbc_hmac_sha1_cipher()
393 ((plen + SHA_DIGEST_LENGTH + in aesni_cbc_hmac_sha1_cipher()
399 if (plen > (sha_off + iv) in aesni_cbc_hmac_sha1_cipher()
400 && (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { in aesni_cbc_hmac_sha1_cipher()
416 sha1_update(&sctx->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha1_cipher()
418 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha1_cipher()
420 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha1_cipher()
423 SHA1_Final(out + plen, in aesni_cbc_hmac_sha1_cipher()
[all...]
/third_party/node/deps/openssl/openssl/crypto/rsa/
H A Drsa_oaep.c41 const unsigned char *param, int plen) in RSA_padding_add_PKCS1_OAEP()
44 param, plen, NULL, NULL); in RSA_padding_add_PKCS1_OAEP()
58 int plen, const EVP_MD *md, in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex()
102 if (!EVP_Digest((void *)param, plen, db, NULL, md, NULL)) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex()
143 const unsigned char *param, int plen, in RSA_padding_add_PKCS1_OAEP_mgf1()
147 param, plen, md, mgf1md); in RSA_padding_add_PKCS1_OAEP_mgf1()
152 const unsigned char *param, int plen) in RSA_padding_check_PKCS1_OAEP()
155 param, plen, NULL, NULL); in RSA_padding_check_PKCS1_OAEP()
161 int plen, const EVP_MD *md, in RSA_padding_check_PKCS1_OAEP_mgf1()
250 if (!EVP_Digest((void *)param, plen, phas in RSA_padding_check_PKCS1_OAEP_mgf1()
39 RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen) RSA_padding_add_PKCS1_OAEP() argument
54 ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex(OSSL_LIB_CTX *libctx, unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() argument
141 RSA_padding_add_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) RSA_padding_add_PKCS1_OAEP_mgf1() argument
150 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) RSA_padding_check_PKCS1_OAEP() argument
158 RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) RSA_padding_check_PKCS1_OAEP_mgf1() argument
[all...]
/third_party/openssl/crypto/rsa/
H A Drsa_oaep.c41 const unsigned char *param, int plen) in RSA_padding_add_PKCS1_OAEP()
44 param, plen, NULL, NULL); in RSA_padding_add_PKCS1_OAEP()
58 int plen, const EVP_MD *md, in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex()
102 if (!EVP_Digest((void *)param, plen, db, NULL, md, NULL)) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex()
143 const unsigned char *param, int plen, in RSA_padding_add_PKCS1_OAEP_mgf1()
147 param, plen, md, mgf1md); in RSA_padding_add_PKCS1_OAEP_mgf1()
152 const unsigned char *param, int plen) in RSA_padding_check_PKCS1_OAEP()
155 param, plen, NULL, NULL); in RSA_padding_check_PKCS1_OAEP()
161 int plen, const EVP_MD *md, in RSA_padding_check_PKCS1_OAEP_mgf1()
250 if (!EVP_Digest((void *)param, plen, phas in RSA_padding_check_PKCS1_OAEP_mgf1()
39 RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen) RSA_padding_add_PKCS1_OAEP() argument
54 ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex(OSSL_LIB_CTX *libctx, unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() argument
141 RSA_padding_add_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) RSA_padding_add_PKCS1_OAEP_mgf1() argument
150 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) RSA_padding_check_PKCS1_OAEP() argument
158 RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) RSA_padding_check_PKCS1_OAEP_mgf1() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; in peap_prfplus() local
71 plen = buf_len - pos; in peap_prfplus()
74 if (plen >= SHA1_MAC_LEN) { in peap_prfplus()
78 os_memcpy(&buf[pos], hash, plen); in peap_prfplus()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_peap_common.c20 size_t pos, plen; in peap_prfplus() local
71 plen = buf_len - pos; in peap_prfplus()
74 if (plen >= SHA1_MAC_LEN) { in peap_prfplus()
78 os_memcpy(&buf[pos], hash, plen); in peap_prfplus()
/third_party/node/deps/openssl/openssl/engines/
H A De_ossltest.c797 size_t plen = key->payload_length; in ossltest_aes128_cbc_hmac_sha1_cipher() local
805 if (plen == NO_PAYLOAD_LENGTH) in ossltest_aes128_cbc_hmac_sha1_cipher()
806 plen = len; in ossltest_aes128_cbc_hmac_sha1_cipher()
808 ((plen + SHA_DIGEST_LENGTH + in ossltest_aes128_cbc_hmac_sha1_cipher()
812 memmove(out, in, plen); in ossltest_aes128_cbc_hmac_sha1_cipher()
814 if (plen != len) { /* "TLS" mode of operation */ in ossltest_aes128_cbc_hmac_sha1_cipher()
816 fill_known_data(out + plen, SHA_DIGEST_LENGTH); in ossltest_aes128_cbc_hmac_sha1_cipher()
819 plen += SHA_DIGEST_LENGTH; in ossltest_aes128_cbc_hmac_sha1_cipher()
820 for (l = len - plen - 1; plen < le in ossltest_aes128_cbc_hmac_sha1_cipher()
[all...]
/third_party/openssl/engines/
H A De_ossltest.c797 size_t plen = key->payload_length; in ossltest_aes128_cbc_hmac_sha1_cipher() local
805 if (plen == NO_PAYLOAD_LENGTH) in ossltest_aes128_cbc_hmac_sha1_cipher()
806 plen = len; in ossltest_aes128_cbc_hmac_sha1_cipher()
808 ((plen + SHA_DIGEST_LENGTH + in ossltest_aes128_cbc_hmac_sha1_cipher()
812 memmove(out, in, plen); in ossltest_aes128_cbc_hmac_sha1_cipher()
814 if (plen != len) { /* "TLS" mode of operation */ in ossltest_aes128_cbc_hmac_sha1_cipher()
816 fill_known_data(out + plen, SHA_DIGEST_LENGTH); in ossltest_aes128_cbc_hmac_sha1_cipher()
819 plen += SHA_DIGEST_LENGTH; in ossltest_aes128_cbc_hmac_sha1_cipher()
820 for (l = len - plen - 1; plen < le in ossltest_aes128_cbc_hmac_sha1_cipher()
[all...]
/third_party/backends/backend/
H A Dsnapscan-sources.c163 SANE_Int *plen) in SCSISource_get()
167 SANE_Int remaining = *plen; in SCSISource_get()
200 *plen -= remaining; in SCSISource_get()
244 static SANE_Status FDSource_get (Source *pself, SANE_Byte *pbuf, SANE_Int *plen) in FDSource_get() argument
248 SANE_Int remaining = *plen; in FDSource_get()
277 *plen -= remaining; in FDSource_get()
327 SANE_Int *plen) in BufSource_get()
331 SANE_Int to_move = MIN(*plen, pself->remaining(pself)); in BufSource_get()
340 *plen = to_move; in BufSource_get()
460 static SANE_Status TxSource_get (Source *pself, SANE_Byte *pbuf, SANE_Int *plen) in TxSource_get() argument
161 SCSISource_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) SCSISource_get() argument
325 BufSource_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) BufSource_get() argument
533 Expander_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) Expander_get() argument
702 Deinterlacer_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) Deinterlacer_get() argument
948 RGBRouter_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) RGBRouter_get() argument
1156 Inverter_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) Inverter_get() argument
[all...]
/kernel/linux/linux-5.10/drivers/mtd/parsers/
H A Dofpart.c160 int i, plen, nr_parts; in parse_ofoldpart_partitions() local
171 part = of_get_property(dp, "partitions", &plen); in parse_ofoldpart_partitions()
177 nr_parts = plen / sizeof(part[0]); in parse_ofoldpart_partitions()
183 names = of_get_property(dp, "partition-names", &plen); in parse_ofoldpart_partitions()
192 if (names && (plen > 0)) { in parse_ofoldpart_partitions()
196 plen -= len; in parse_ofoldpart_partitions()
/kernel/linux/linux-6.6/net/bluetooth/
H A Dhci_request.c212 struct sk_buff *hci_prepare_cmd(struct hci_dev *hdev, u16 opcode, u32 plen, in hci_prepare_cmd() argument
215 int len = HCI_COMMAND_HDR_SIZE + plen; in hci_prepare_cmd()
225 hdr->plen = plen; in hci_prepare_cmd()
227 if (plen) in hci_prepare_cmd()
228 skb_put_data(skb, param, plen); in hci_prepare_cmd()
239 void hci_req_add_ev(struct hci_request *req, u16 opcode, u32 plen, in hci_req_add_ev() argument
245 bt_dev_dbg(hdev, "opcode 0x%4.4x plen %d", opcode, plen); in hci_req_add_ev()
253 skb = hci_prepare_cmd(hdev, opcode, plen, para in hci_req_add_ev()
269 hci_req_add(struct hci_request *req, u16 opcode, u32 plen, const void *param) hci_req_add() argument
567 u32 plen; hci_req_start_scan() local
[all...]
/kernel/linux/linux-6.6/crypto/
H A Dtestmgr.h96 * @plen: Length of @ptext in bytes
116 unsigned int plen; member
15247 .plen = 64,
15273 .plen = 16,
15293 .plen = 64,
15319 .plen = 60,
15349 .plen = 60,
15461 .plen = 719,
15573 .plen = 64,
15600 .plen
[all...]
/kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
H A Dipsec_rxtx.c53 u8 plen; in mlx5e_ipsec_remove_trailer() local
56 ret = skb_copy_bits(skb, skb->len - alen - 2, &plen, 1); in mlx5e_ipsec_remove_trailer()
60 trailer_len = alen + plen + 2; in mlx5e_ipsec_remove_trailer()
192 esp_output_fill_trailer((u8 *)inlseg->data, 0, ipsec_st->plen, ipsec_st->xo->proto); in mlx5e_ipsec_handle_tx_wqe()
201 unsigned int blksize, clen, alen, plen; in mlx5e_ipsec_set_state() local
211 plen = max_t(u32, clen - skb->len, 4); in mlx5e_ipsec_set_state()
212 tailen = plen + alen; in mlx5e_ipsec_set_state()
213 ipsec_st->plen = plen; in mlx5e_ipsec_set_state()
/kernel/linux/linux-5.10/drivers/nfc/nfcmrvl/
H A Di2c.c52 if (nci_hdr.plen > NCI_MAX_PAYLOAD_SIZE) { in nfcmrvl_i2c_read()
58 nci_hdr.plen + NCI_CTRL_HDR_SIZE, GFP_KERNEL); in nfcmrvl_i2c_read()
65 if (nci_hdr.plen) { in nfcmrvl_i2c_read()
68 skb_put(*skb, nci_hdr.plen), in nfcmrvl_i2c_read()
69 nci_hdr.plen); in nfcmrvl_i2c_read()
71 if (ret != nci_hdr.plen) { in nfcmrvl_i2c_read()
74 ret, nci_hdr.plen); in nfcmrvl_i2c_read()
/third_party/libwebsockets/lib/core-net/client/
H A Dconnect4.c29 ssize_t plen) in lws_client_connect_4_established()
67 plen = lws_snprintf((char *)pt->serv_buf, 256, in lws_client_connect_4_established()
75 plen += lws_snprintf((char *)pt->serv_buf + plen, 256, in lws_client_connect_4_established()
80 plen += lws_snprintf((char *)pt->serv_buf + plen, 5, in lws_client_connect_4_established()
83 /* lwsl_hexdump_notice(pt->serv_buf, plen); */ in lws_client_connect_4_established()
99 (unsigned int)plen, in lws_client_connect_4_established()
28 lws_client_connect_4_established(struct lws *wsi, struct lws *wsi_piggyback, ssize_t plen) lws_client_connect_4_established() argument
/third_party/openssl/test/
H A Drsa_test.c243 int plen; in test_rsa_simple() local
247 plen = sizeof(ptext_ex) - 1; in test_rsa_simple()
252 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, en_pad_type); in test_rsa_simple()
258 if (!TEST_int_gt(num, 0) || !TEST_mem_eq(ptext, num, ptext_ex, plen)) in test_rsa_simple()
288 int plen; in test_rsa_oaep() local
297 plen = sizeof(ptext_ex) - 1; in test_rsa_oaep()
302 if (num <= 0 || !TEST_mem_eq(ptext, num, ptext_ex, plen)) in test_rsa_oaep()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local
98 plen = password_len; in eap_gtc_process()
103 plen += 9 + identity_len + 1; in eap_gtc_process()
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process()
116 1, plen); in eap_gtc_process()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local
98 plen = password_len; in eap_gtc_process()
103 plen += 9 + identity_len + 1; in eap_gtc_process()
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process()
116 1, plen); in eap_gtc_process()
/third_party/FreeBSD/sys/dev/usb/
H A Dusb_if.h21 /* pointer to the device request */ void **pptr, /* data pointer */ uint16_t *plen, /* maximum transfer length */ uint16_t offset, /* data offset */ uint8_t *pstate);
24 /* pointer to the device request */ void **pptr, /* data pointer */ uint16_t *plen, /* maximum transfer length */ uint16_t offset, /* data offset */ uint8_t *pstate) in USB_HANDLE_REQUEST()
28 return ((usb_handle_request_t *) _m)(dev, req, pptr, plen, offset, pstate); in USB_HANDLE_REQUEST()
23 USB_HANDLE_REQUEST(device_t dev, const void *req, void **pptr, uint16_t *plen, uint16_t offset, uint8_t *pstate) USB_HANDLE_REQUEST() argument
/third_party/musl/src/stdio/
H A Dfgetln.c5 char *fgetln(FILE *f, size_t *plen) in fgetln() argument
13 *plen = ++z - ret; in fgetln()
16 *plen = l; in fgetln()

Completed in 29 milliseconds

12345678910>>...34