/external/tcpdump/ |
D | print-bgp.c | 431 u_int plen; in decode_prefix4() local 434 plen = pptr[0]; in decode_prefix4() 435 if (32 < plen) in decode_prefix4() 439 TCHECK2(pptr[1], (plen + 7) / 8); in decode_prefix4() 440 memcpy(&addr, &pptr[1], (plen + 7) / 8); in decode_prefix4() 441 if (plen % 8) { in decode_prefix4() 442 ((u_char *)&addr)[(plen + 7) / 8 - 1] &= in decode_prefix4() 443 ((0xff00 >> (plen % 8)) & 0xff); in decode_prefix4() 445 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen); in decode_prefix4() 446 return 1 + (plen + 7) / 8; in decode_prefix4() [all …]
|
D | print-icmp.c | 334 icmp_print(const u_char *bp, u_int plen, const u_char *bp2, int fragmented) in icmp_print() argument 560 (void)printf("ICMP %s, length %u", str, plen); in icmp_print() 563 if (TTEST2(*bp, plen)) { in icmp_print() 564 sum = in_cksum((u_short*)dp, plen, 0); in icmp_print() 591 if (vflag >= 1 && plen > ICMP_EXTD_MINLEN && ICMP_MPLS_EXT_TYPE(dp->icmp_type)) { in icmp_print() 603 plen - ICMP_EXTD_MINLEN, 0)) { in icmp_print() 619 hlen = plen - ICMP_EXTD_MINLEN; in icmp_print() 623 plen - ICMP_EXTD_MINLEN, 0) ? "in" : "", in icmp_print()
|
/external/openssl/crypto/asn1/ |
D | tasn_dec.c | 74 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen); 771 long plen; in asn1_d2i_ex_primitive() local 826 ret = asn1_check_tlen(&plen, NULL, NULL, &inf, &cst, in asn1_d2i_ex_primitive() 859 if (!asn1_find_end(&p, plen, inf)) in asn1_d2i_ex_primitive() 865 len = p - cont + plen; in asn1_d2i_ex_primitive() 866 p += plen; in asn1_d2i_ex_primitive() 881 if (!asn1_collect(&buf, &p, plen, inf, -1, V_ASN1_UNIVERSAL)) in asn1_d2i_ex_primitive() 901 len = plen; in asn1_d2i_ex_primitive() 902 p += plen; in asn1_d2i_ex_primitive() 1079 long plen; in asn1_find_end() local [all …]
|
/external/bluez/utils/tools/ |
D | hciattach_tialt.c | 81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ in read_command_complete() 83 resp.hci_hdr.plen); in read_command_complete() 111 cmd.hci_hdr.plen = sizeof(uint32_t); in texas_change_speed() 163 FAILIF(read(fw, &cmd[sizeof(hci_command_hdr) + 1], hci_cmd->plen) in texas_load_firmware() 164 != hci_cmd->plen, in texas_load_firmware() 166 hci_cmd->plen, hci_cmd->opcode); in texas_load_firmware() 170 n = write(fd, cmd, sizeof(hci_command_hdr) + 1 + hci_cmd->plen); in texas_load_firmware() 171 FAILIF(n != sizeof(hci_command_hdr) + 1 + hci_cmd->plen, in texas_load_firmware()
|
/external/openssl/crypto/rsa/ |
D | rsa_test.c | 219 int plen; in main() local 230 plen = sizeof(ptext_ex) - 1; in main() 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, in main() 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) in main() 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, in main() 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) in main() 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) in main()
|
D | rsa_oaep.c | 36 const unsigned char *param, int plen) in RSA_padding_add_PKCS1_OAEP() argument 66 EVP_Digest((void *)param, plen, db, NULL, EVP_sha1(), NULL); in RSA_padding_add_PKCS1_OAEP() 93 const unsigned char *param, int plen) in RSA_padding_check_PKCS1_OAEP() argument 144 EVP_Digest((void *)param, plen, phash, NULL, EVP_sha1(), NULL); in RSA_padding_check_PKCS1_OAEP()
|
/external/ppp/pppd/plugins/rp-pppoe/ |
D | discovery.c | 250 UINT16_t plen; in sendPADI() local 255 plen = TAG_HDR_SIZE + namelen; in sendPADI() 256 CHECK_ROOM(cursor, packet.payload, plen); in sendPADI() 287 plen += sizeof(pid) + TAG_HDR_SIZE; in sendPADI() 290 packet.length = htons(plen); in sendPADI() 292 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE)); in sendPADI() 421 UINT16_t plen; in sendPADR() local 426 plen = TAG_HDR_SIZE + namelen; in sendPADR() 427 CHECK_ROOM(cursor, packet.payload, plen); in sendPADR() 455 plen += sizeof(pid) + TAG_HDR_SIZE; in sendPADR() [all …]
|
D | common.c | 401 UINT16_t plen = 0; in sendPADT() local 431 plen += sizeof(pid) + TAG_HDR_SIZE; in sendPADT() 443 plen += elen + TAG_HDR_SIZE; in sendPADT() 452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADT() 460 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; in sendPADT() 463 packet.length = htons(plen); in sendPADT() 464 sendPacket(conn, conn->discoverySocket, &packet, (int) (plen + HDR_SIZE)); in sendPADT()
|
/external/wpa_supplicant/ |
D | eap_gtc.c | 59 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 107 plen = password_len; in eap_gtc_process() 112 plen += 9 + identity_len + 1; in eap_gtc_process() 114 plen, EAP_CODE_RESPONSE, req->identifier, &rpos); in eap_gtc_process() 126 (u8 *) (resp + 1) + 1, plen); in eap_gtc_process()
|
D | sha1.c | 127 size_t pos, plen; in sha1_prf() local 144 plen = buf_len - pos; in sha1_prf() 145 if (plen >= SHA1_MAC_LEN) { in sha1_prf() 152 os_memcpy(&buf[pos], hash, plen); in sha1_prf() 178 size_t pos, plen; in sha1_t_prf() local 201 plen = buf_len - pos; in sha1_t_prf() 203 if (plen >= SHA1_MAC_LEN) { in sha1_t_prf() 207 os_memcpy(&buf[pos], hash, plen); in sha1_t_prf() 358 size_t left = buflen, plen; in pbkdf2_sha1() local 365 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; in pbkdf2_sha1() [all …]
|
D | eap_sim_common.c | 236 size_t alen, plen, i, list_len; in eap_sim_parse_attr() local 483 plen = apos[0] * 256 + apos[1]; in eap_sim_parse_attr() 484 if (plen > alen - 2) { in eap_sim_parse_attr() 488 (unsigned long) plen, in eap_sim_parse_attr() 493 attr->next_pseudonym_len = plen; in eap_sim_parse_attr() 503 plen = apos[0] * 256 + apos[1]; in eap_sim_parse_attr() 504 if (plen > alen - 2) { in eap_sim_parse_attr() 508 (unsigned long) plen, in eap_sim_parse_attr() 513 attr->next_reauth_id_len = plen; in eap_sim_parse_attr()
|
/external/bluez/utils/sdpd/ |
D | request.c | 261 int status = 0, i, plen, mlen, mtu, scanned; in service_search_req() local 281 plen = ntohs(((sdp_pdu_hdr_t *)(req->buf))->plen); in service_search_req() 284 if (plen < mlen || plen != mlen + *(uint8_t *)(pdata+sizeof(uint16_t))) { in service_search_req() 527 int status = 0, plen, mlen; in service_attr_req() local 544 plen = ntohs(((sdp_pdu_hdr_t *)(req->buf))->plen); in service_attr_req() 547 if (plen < mlen || plen != mlen + *(uint8_t *)pdata) { in service_attr_req() 640 int status = 0, plen, totscanned; in service_search_attr_req() local 677 plen = ntohs(((sdp_pdu_hdr_t *)(req->buf))->plen); in service_search_attr_req() 678 if (plen < totscanned || plen != totscanned + *(uint8_t *)pdata) { in service_search_attr_req() 816 if (ntohs(reqhdr->plen) != req->len - sizeof(sdp_pdu_hdr_t)) { in process_request() [all …]
|
/external/opencore/protocols/rtp_payload_parser/rfc_2429/src/ |
D | h263_payload_parser.cpp | 99 uint16 plen = (((uint16)plenHI << 8) + plenLow) >> 3; in Parse() local 105 if (plen > 0) // If extra picture header presents in the midlle of the frame in Parse() 108 vb += plen; in Parse() 110 input += plen; in Parse()
|
/external/libxml2/ |
D | dict.c | 184 int plen; in xmlDictAddQString() local 187 plen = xmlStrlen(prefix); in xmlDictAddQString() 216 memcpy(pool->free, prefix, plen); in xmlDictAddQString() 217 pool->free += plen; in xmlDictAddQString() 219 namelen -= plen + 1; in xmlDictAddQString() 264 int plen; in xmlDictComputeQKey() local 269 plen = xmlStrlen(prefix); in xmlDictComputeQKey() 270 if (plen == 0) in xmlDictComputeQKey() 276 value += name[len - (plen + 1 + 1)]; in xmlDictComputeQKey() 278 if (plen > 10) in xmlDictComputeQKey() [all …]
|
/external/bluez/hcidump/parser/ |
D | hcrp.c | 85 uint16_t pid, tid, plen, status; in hcrp_dump() local 90 plen = get_u16(frm); in hcrp_dump() 95 pid2str(pid), frm->in ? "rsp" : "cmd", tid, plen); in hcrp_dump()
|
/external/srec/srec/Nametag/src/ |
D | Nametag.c | 36 ESR_ReturnCode SR_NametagGetValue(const SR_Nametag* self, const char** pvalue, size_t* plen) in SR_NametagGetValue() argument 38 if (self == NULL || pvalue == NULL || plen == NULL) in SR_NametagGetValue() 43 return self->getValue(self, pvalue, plen); in SR_NametagGetValue()
|
/external/clearsilver/util/ |
D | wdb.c | 591 #define PACK_UB4(pdata, plen, pmax, pn) \ argument 593 if (plen + 4 > pmax) \ 599 pdata[plen++] = (0x0ff & (pn >> 0)); \ 600 pdata[plen++] = (0x0ff & (pn >> 8)); \ 601 pdata[plen++] = (0x0ff & (pn >> 16)); \ 602 pdata[plen++] = (0x0ff & (pn >> 24)); \ 605 #define UNPACK_UB4(pdata, plen, pn, pd) \ argument 607 if (pn + 4 > plen) \ 614 #define PACK_BYTE(pdata, plen, pmax, pn) \ argument 616 if (plen + 1 > pmax) \ [all …]
|
/external/openssl/crypto/evp/ |
D | p5_crpt2.c | 153 int saltlen, iter, plen; in PKCS5_v2_PBE_keyivgen() local 166 plen = param->value.sequence->length; in PKCS5_v2_PBE_keyivgen() 167 if(!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { in PKCS5_v2_PBE_keyivgen() 212 plen = pbe2->keyfunc->parameter->value.sequence->length; in PKCS5_v2_PBE_keyivgen() 213 if(!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { in PKCS5_v2_PBE_keyivgen()
|
/external/bluez/utils/test/ |
D | hciemu.c | 270 he->plen = EVT_CMD_STATUS_SIZE; in command_status() 285 static void command_complete(uint16_t ogf, uint16_t ocf, int plen, void *data) in command_complete() argument 298 he->plen = EVT_CMD_COMPLETE_SIZE + plen; in command_complete() 305 if (plen) { in command_complete() 306 memcpy(ptr, data, plen); in command_complete() 307 ptr += plen; in command_complete() 330 he->plen = EVT_CONN_REQUEST_SIZE; in connect_request() 358 he->plen = EVT_CONN_COMPLETE_SIZE; in connect_complete() 388 he->plen = EVT_DISCONN_COMPLETE_SIZE; in disconn_complete() 418 he->plen = EVT_NUM_COMP_PKTS_SIZE; in num_completed_pkts() [all …]
|
/external/ipsec-tools/src/libipsec/ |
D | pfkey.c | 388 int plen; local 405 plen = sizeof(struct in_addr) << 3; 408 plen = sizeof(struct in6_addr) << 3; 448 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, (u_int)plen, 456 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, (u_int)plen, 578 int plen; local 592 plen = sizeof(struct in_addr) << 3; 595 plen = sizeof(struct in6_addr) << 3; 621 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, (u_int)plen, 627 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, (u_int)plen, [all …]
|
/external/grub/stage2/ |
D | char_io.c | 313 int plen; in real_get_cmdline() local 341 if (section == 1 && plen + lpos < CMDLINE_WIDTH) in real_get_cmdline() 401 if (lpos + plen < CMDLINE_WIDTH) in real_get_cmdline() 404 section = ((lpos + plen - CMDLINE_WIDTH) in real_get_cmdline() 417 len -= plen; in real_get_cmdline() 418 pos += plen; in real_get_cmdline() 435 offset = xpos - plen; in real_get_cmdline() 438 xpos = lpos + plen; in real_get_cmdline() 449 + CMDLINE_WIDTH - plen - CMDLINE_MARGIN); in real_get_cmdline() 542 plen = grub_strlen (prompt); in real_get_cmdline()
|
/external/bluez/hcidump/src/ |
D | bpasniff.c | 181 uint16_t plen; in decode() local 233 …plen = ((hdr & 0x10) >> 4) | ((hdr & 0x08) >> 2) | (hdr & 0x04) | ((hdr & 0x02) << 2) | ((hdr & 0… in decode() 237 plen = plen | ((hdr & 0x80) >> 2) | (hdr & 0x40) | ((hdr & 0x20) << 2) | ((hdr & 0x08) << 4); in decode() 242 type2str(type), addr, flow, arqn, seqn, hec, llid, pflow, plen); in decode() 247 frm.data_len = plen; in decode()
|
/external/svox/pico/lib/ |
D | picosa.c | 734 picoos_uint8 plen; in saLexIndLookup() local 738 PICOKLEX_IND_SIZE, &pos, &phones, &plen)) { in saLexIndLookup() 742 if (plen > (sa->cbuf2BufSize - sa->cbuf2Len)) { in saLexIndLookup() 743 plen = sa->cbuf2BufSize - sa->cbuf2Len; in saLexIndLookup() 747 if (plen == 0) { in saLexIndLookup() 754 sa->headx[ind].head.len = plen; in saLexIndLookup() 756 for (i = 0; i < plen; i++) { in saLexIndLookup() 762 PICODATA_ITEM_WORDPHON, pos, plen)); in saLexIndLookup() 831 picoos_uint16 *plen) { in saDoG2P() argument 846 *plen = 0; in saDoG2P() [all …]
|
/external/dbus/tools/ |
D | dbus-launch-x11.c | 55 int plen; in remove_prefix() local 57 plen = strlen (prefix); in remove_prefix() 59 if (strncmp (s, prefix, plen) == 0) in remove_prefix() 61 memmove (s, s + plen, strlen (s) - plen + 1); in remove_prefix()
|
/external/bluez/utils/cups/ |
D | hcrp.c | 54 uint16_t plen; member 90 hdr.plen = htons(HCRP_CREDIT_GRANT_CP_SIZE); in hcrp_credit_grant() 117 hdr.plen = htons(0); in hcrp_credit_request() 145 hdr.plen = htons(0); in hcrp_get_lpt_status()
|