/third_party/toybox/porting/liteos_a/lib/ |
H A D | dirtree.c | 83 // Initial call can pass in NULL to plen, or point to an int initialized to 0 87 char *dirtree_path(struct dirtree *node, int *plen) in dirtree_path() argument 93 path = xmalloc(*plen); in dirtree_path() 94 *plen = 0; in dirtree_path() 98 len = (plen ? *plen : 0)+strlen(node->name)+1; in dirtree_path() 102 if (plen) *plen = len; in dirtree_path()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | sha1-prf.c | 34 size_t pos, plen; in sha1_prf() local 49 plen = buf_len - pos; in sha1_prf() 50 if (plen >= SHA1_MAC_LEN) { in sha1_prf() 59 os_memcpy(&buf[pos], hash, plen); in sha1_prf()
|
H A D | sha1-tprf.c | 33 size_t pos, plen; in sha1_t_prf() local 56 plen = buf_len - pos; in sha1_t_prf() 59 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf() 63 os_memcpy(&buf[pos], hash, plen); in sha1_t_prf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha1-prf.c | 34 size_t pos, plen; in sha1_prf() local 49 plen = buf_len - pos; in sha1_prf() 50 if (plen >= SHA1_MAC_LEN) { in sha1_prf() 59 os_memcpy(&buf[pos], hash, plen); in sha1_prf()
|
H A D | sha1-tprf.c | 33 size_t pos, plen; in sha1_t_prf() local 56 plen = buf_len - pos; in sha1_t_prf() 59 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf() 63 os_memcpy(&buf[pos], hash, plen); in sha1_t_prf()
|
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha1_hw.c | 379 size_t plen = ctx->payload_length; in aesni_cbc_hmac_sha1_cipher() local 390 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha1_cipher() 391 plen = len; in aesni_cbc_hmac_sha1_cipher() 393 ((plen + SHA_DIGEST_LENGTH + in aesni_cbc_hmac_sha1_cipher() 399 if (plen > (sha_off + iv) in aesni_cbc_hmac_sha1_cipher() 400 && (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { in aesni_cbc_hmac_sha1_cipher() 416 sha1_update(&sctx->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha1_cipher() 418 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha1_cipher() 420 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha1_cipher() 423 SHA1_Final(out + plen, in aesni_cbc_hmac_sha1_cipher() [all...] |
/third_party/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha1_hw.c | 379 size_t plen = ctx->payload_length; in aesni_cbc_hmac_sha1_cipher() local 390 if (plen == NO_PAYLOAD_LENGTH) in aesni_cbc_hmac_sha1_cipher() 391 plen = len; in aesni_cbc_hmac_sha1_cipher() 393 ((plen + SHA_DIGEST_LENGTH + in aesni_cbc_hmac_sha1_cipher() 399 if (plen > (sha_off + iv) in aesni_cbc_hmac_sha1_cipher() 400 && (blocks = (plen - (sha_off + iv)) / SHA_CBLOCK)) { in aesni_cbc_hmac_sha1_cipher() 416 sha1_update(&sctx->md, in + sha_off, plen - sha_off); in aesni_cbc_hmac_sha1_cipher() 418 if (plen != len) { /* "TLS" mode of operation */ in aesni_cbc_hmac_sha1_cipher() 420 memcpy(out + aes_off, in + aes_off, plen - aes_off); in aesni_cbc_hmac_sha1_cipher() 423 SHA1_Final(out + plen, in aesni_cbc_hmac_sha1_cipher() [all...] |
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 41 const unsigned char *param, int plen) in RSA_padding_add_PKCS1_OAEP() 44 param, plen, NULL, NULL); in RSA_padding_add_PKCS1_OAEP() 58 int plen, const EVP_MD *md, in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 102 if (!EVP_Digest((void *)param, plen, db, NULL, md, NULL)) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 143 const unsigned char *param, int plen, in RSA_padding_add_PKCS1_OAEP_mgf1() 147 param, plen, md, mgf1md); in RSA_padding_add_PKCS1_OAEP_mgf1() 152 const unsigned char *param, int plen) in RSA_padding_check_PKCS1_OAEP() 155 param, plen, NULL, NULL); in RSA_padding_check_PKCS1_OAEP() 161 int plen, const EVP_MD *md, in RSA_padding_check_PKCS1_OAEP_mgf1() 250 if (!EVP_Digest((void *)param, plen, phas in RSA_padding_check_PKCS1_OAEP_mgf1() 39 RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen) RSA_padding_add_PKCS1_OAEP() argument 54 ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex(OSSL_LIB_CTX *libctx, unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() argument 141 RSA_padding_add_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) RSA_padding_add_PKCS1_OAEP_mgf1() argument 150 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) RSA_padding_check_PKCS1_OAEP() argument 158 RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) RSA_padding_check_PKCS1_OAEP_mgf1() argument [all...] |
/third_party/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 41 const unsigned char *param, int plen) in RSA_padding_add_PKCS1_OAEP() 44 param, plen, NULL, NULL); in RSA_padding_add_PKCS1_OAEP() 58 int plen, const EVP_MD *md, in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 102 if (!EVP_Digest((void *)param, plen, db, NULL, md, NULL)) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 143 const unsigned char *param, int plen, in RSA_padding_add_PKCS1_OAEP_mgf1() 147 param, plen, md, mgf1md); in RSA_padding_add_PKCS1_OAEP_mgf1() 152 const unsigned char *param, int plen) in RSA_padding_check_PKCS1_OAEP() 155 param, plen, NULL, NULL); in RSA_padding_check_PKCS1_OAEP() 161 int plen, const EVP_MD *md, in RSA_padding_check_PKCS1_OAEP_mgf1() 250 if (!EVP_Digest((void *)param, plen, phas in RSA_padding_check_PKCS1_OAEP_mgf1() 39 RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen) RSA_padding_add_PKCS1_OAEP() argument 54 ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex(OSSL_LIB_CTX *libctx, unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() argument 141 RSA_padding_add_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, const unsigned char *from, int flen, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) RSA_padding_add_PKCS1_OAEP_mgf1() argument 150 RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen) RSA_padding_check_PKCS1_OAEP() argument 158 RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen, const unsigned char *from, int flen, int num, const unsigned char *param, int plen, const EVP_MD *md, const EVP_MD *mgf1md) RSA_padding_check_PKCS1_OAEP_mgf1() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_peap_common.c | 20 size_t pos, plen; in peap_prfplus() local 71 plen = buf_len - pos; in peap_prfplus() 74 if (plen >= SHA1_MAC_LEN) { in peap_prfplus() 78 os_memcpy(&buf[pos], hash, plen); in peap_prfplus()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_peap_common.c | 20 size_t pos, plen; in peap_prfplus() local 71 plen = buf_len - pos; in peap_prfplus() 74 if (plen >= SHA1_MAC_LEN) { in peap_prfplus() 78 os_memcpy(&buf[pos], hash, plen); in peap_prfplus()
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_ossltest.c | 797 size_t plen = key->payload_length; in ossltest_aes128_cbc_hmac_sha1_cipher() local 805 if (plen == NO_PAYLOAD_LENGTH) in ossltest_aes128_cbc_hmac_sha1_cipher() 806 plen = len; in ossltest_aes128_cbc_hmac_sha1_cipher() 808 ((plen + SHA_DIGEST_LENGTH + in ossltest_aes128_cbc_hmac_sha1_cipher() 812 memmove(out, in, plen); in ossltest_aes128_cbc_hmac_sha1_cipher() 814 if (plen != len) { /* "TLS" mode of operation */ in ossltest_aes128_cbc_hmac_sha1_cipher() 816 fill_known_data(out + plen, SHA_DIGEST_LENGTH); in ossltest_aes128_cbc_hmac_sha1_cipher() 819 plen += SHA_DIGEST_LENGTH; in ossltest_aes128_cbc_hmac_sha1_cipher() 820 for (l = len - plen - 1; plen < le in ossltest_aes128_cbc_hmac_sha1_cipher() [all...] |
/third_party/openssl/engines/ |
H A D | e_ossltest.c | 797 size_t plen = key->payload_length; in ossltest_aes128_cbc_hmac_sha1_cipher() local 805 if (plen == NO_PAYLOAD_LENGTH) in ossltest_aes128_cbc_hmac_sha1_cipher() 806 plen = len; in ossltest_aes128_cbc_hmac_sha1_cipher() 808 ((plen + SHA_DIGEST_LENGTH + in ossltest_aes128_cbc_hmac_sha1_cipher() 812 memmove(out, in, plen); in ossltest_aes128_cbc_hmac_sha1_cipher() 814 if (plen != len) { /* "TLS" mode of operation */ in ossltest_aes128_cbc_hmac_sha1_cipher() 816 fill_known_data(out + plen, SHA_DIGEST_LENGTH); in ossltest_aes128_cbc_hmac_sha1_cipher() 819 plen += SHA_DIGEST_LENGTH; in ossltest_aes128_cbc_hmac_sha1_cipher() 820 for (l = len - plen - 1; plen < le in ossltest_aes128_cbc_hmac_sha1_cipher() [all...] |
/third_party/backends/backend/ |
H A D | snapscan-sources.c | 163 SANE_Int *plen) in SCSISource_get() 167 SANE_Int remaining = *plen; in SCSISource_get() 200 *plen -= remaining; in SCSISource_get() 244 static SANE_Status FDSource_get (Source *pself, SANE_Byte *pbuf, SANE_Int *plen) in FDSource_get() argument 248 SANE_Int remaining = *plen; in FDSource_get() 277 *plen -= remaining; in FDSource_get() 327 SANE_Int *plen) in BufSource_get() 331 SANE_Int to_move = MIN(*plen, pself->remaining(pself)); in BufSource_get() 340 *plen = to_move; in BufSource_get() 460 static SANE_Status TxSource_get (Source *pself, SANE_Byte *pbuf, SANE_Int *plen) in TxSource_get() argument 161 SCSISource_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) SCSISource_get() argument 325 BufSource_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) BufSource_get() argument 533 Expander_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) Expander_get() argument 702 Deinterlacer_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) Deinterlacer_get() argument 948 RGBRouter_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) RGBRouter_get() argument 1156 Inverter_get(Source *pself, SANE_Byte *pbuf, SANE_Int *plen) Inverter_get() argument [all...] |
/kernel/linux/linux-5.10/drivers/mtd/parsers/ |
H A D | ofpart.c | 160 int i, plen, nr_parts; in parse_ofoldpart_partitions() local 171 part = of_get_property(dp, "partitions", &plen); in parse_ofoldpart_partitions() 177 nr_parts = plen / sizeof(part[0]); in parse_ofoldpart_partitions() 183 names = of_get_property(dp, "partition-names", &plen); in parse_ofoldpart_partitions() 192 if (names && (plen > 0)) { in parse_ofoldpart_partitions() 196 plen -= len; in parse_ofoldpart_partitions()
|
/kernel/linux/linux-6.6/net/bluetooth/ |
H A D | hci_request.c | 212 struct sk_buff *hci_prepare_cmd(struct hci_dev *hdev, u16 opcode, u32 plen, in hci_prepare_cmd() argument 215 int len = HCI_COMMAND_HDR_SIZE + plen; in hci_prepare_cmd() 225 hdr->plen = plen; in hci_prepare_cmd() 227 if (plen) in hci_prepare_cmd() 228 skb_put_data(skb, param, plen); in hci_prepare_cmd() 239 void hci_req_add_ev(struct hci_request *req, u16 opcode, u32 plen, in hci_req_add_ev() argument 245 bt_dev_dbg(hdev, "opcode 0x%4.4x plen %d", opcode, plen); in hci_req_add_ev() 253 skb = hci_prepare_cmd(hdev, opcode, plen, para in hci_req_add_ev() 269 hci_req_add(struct hci_request *req, u16 opcode, u32 plen, const void *param) hci_req_add() argument 567 u32 plen; hci_req_start_scan() local [all...] |
/kernel/linux/linux-6.6/crypto/ |
H A D | testmgr.h | 96 * @plen: Length of @ptext in bytes 116 unsigned int plen; member 15247 .plen = 64, 15273 .plen = 16, 15293 .plen = 64, 15319 .plen = 60, 15349 .plen = 60, 15461 .plen = 719, 15573 .plen = 64, 15600 .plen [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
H A D | ipsec_rxtx.c | 53 u8 plen; in mlx5e_ipsec_remove_trailer() local 56 ret = skb_copy_bits(skb, skb->len - alen - 2, &plen, 1); in mlx5e_ipsec_remove_trailer() 60 trailer_len = alen + plen + 2; in mlx5e_ipsec_remove_trailer() 192 esp_output_fill_trailer((u8 *)inlseg->data, 0, ipsec_st->plen, ipsec_st->xo->proto); in mlx5e_ipsec_handle_tx_wqe() 201 unsigned int blksize, clen, alen, plen; in mlx5e_ipsec_set_state() local 211 plen = max_t(u32, clen - skb->len, 4); in mlx5e_ipsec_set_state() 212 tailen = plen + alen; in mlx5e_ipsec_set_state() 213 ipsec_st->plen = plen; in mlx5e_ipsec_set_state()
|
/kernel/linux/linux-5.10/drivers/nfc/nfcmrvl/ |
H A D | i2c.c | 52 if (nci_hdr.plen > NCI_MAX_PAYLOAD_SIZE) { in nfcmrvl_i2c_read() 58 nci_hdr.plen + NCI_CTRL_HDR_SIZE, GFP_KERNEL); in nfcmrvl_i2c_read() 65 if (nci_hdr.plen) { in nfcmrvl_i2c_read() 68 skb_put(*skb, nci_hdr.plen), in nfcmrvl_i2c_read() 69 nci_hdr.plen); in nfcmrvl_i2c_read() 71 if (ret != nci_hdr.plen) { in nfcmrvl_i2c_read() 74 ret, nci_hdr.plen); in nfcmrvl_i2c_read()
|
/third_party/libwebsockets/lib/core-net/client/ |
H A D | connect4.c | 29 ssize_t plen) in lws_client_connect_4_established() 67 plen = lws_snprintf((char *)pt->serv_buf, 256, in lws_client_connect_4_established() 75 plen += lws_snprintf((char *)pt->serv_buf + plen, 256, in lws_client_connect_4_established() 80 plen += lws_snprintf((char *)pt->serv_buf + plen, 5, in lws_client_connect_4_established() 83 /* lwsl_hexdump_notice(pt->serv_buf, plen); */ in lws_client_connect_4_established() 99 (unsigned int)plen, in lws_client_connect_4_established() 28 lws_client_connect_4_established(struct lws *wsi, struct lws *wsi_piggyback, ssize_t plen) lws_client_connect_4_established() argument
|
/third_party/openssl/test/ |
H A D | rsa_test.c | 243 int plen; in test_rsa_simple() local 247 plen = sizeof(ptext_ex) - 1; in test_rsa_simple() 252 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, en_pad_type); in test_rsa_simple() 258 if (!TEST_int_gt(num, 0) || !TEST_mem_eq(ptext, num, ptext_ex, plen)) in test_rsa_simple() 288 int plen; in test_rsa_oaep() local 297 plen = sizeof(ptext_ex) - 1; in test_rsa_oaep() 302 if (num <= 0 || !TEST_mem_eq(ptext, num, ptext_ex, plen)) in test_rsa_oaep()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 98 plen = password_len; in eap_gtc_process() 103 plen += 9 + identity_len + 1; in eap_gtc_process() 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process() 116 1, plen); in eap_gtc_process()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 98 plen = password_len; in eap_gtc_process() 103 plen += 9 + identity_len + 1; in eap_gtc_process() 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process() 116 1, plen); in eap_gtc_process()
|
/third_party/FreeBSD/sys/dev/usb/ |
H A D | usb_if.h | 21 /* pointer to the device request */ void **pptr, /* data pointer */ uint16_t *plen, /* maximum transfer length */ uint16_t offset, /* data offset */ uint8_t *pstate); 24 /* pointer to the device request */ void **pptr, /* data pointer */ uint16_t *plen, /* maximum transfer length */ uint16_t offset, /* data offset */ uint8_t *pstate) in USB_HANDLE_REQUEST() 28 return ((usb_handle_request_t *) _m)(dev, req, pptr, plen, offset, pstate); in USB_HANDLE_REQUEST() 23 USB_HANDLE_REQUEST(device_t dev, const void *req, void **pptr, uint16_t *plen, uint16_t offset, uint8_t *pstate) USB_HANDLE_REQUEST() argument
|
/third_party/musl/src/stdio/ |
H A D | fgetln.c | 5 char *fgetln(FILE *f, size_t *plen) in fgetln() argument 13 *plen = ++z - ret; in fgetln() 16 *plen = l; in fgetln()
|