/external/openssl/ssl/ |
t1_lib.c | 911 int slen, mlen, renew_ticket = 0; local 965 EVP_DecryptUpdate(&ctx, sdec, &slen, p, eticklen); 966 if (EVP_DecryptFinal(&ctx, sdec + slen, &mlen) <= 0) 968 slen += mlen; 972 sess = d2i_SSL_SESSION(NULL, &p, slen);
|
t1_enc.c | 176 const unsigned char *sec, int slen, unsigned char *out1, 182 len=slen/2; 185 len+=(slen&1); /* add for odd, make longer */ 696 const char *str, int slen, unsigned char *out) 704 memcpy(q,str,slen); 705 q+=slen;
|
kssl.h | 168 int slen, const char *svc, int hlen, const char *host);
|
d1_srvr.c | 1225 int len, slen; local 1234 slen = i2d_SSL_SESSION(s->session, NULL); 1238 if (slen > 0xFF00) 1249 EVP_MAX_BLOCK_LENGTH + EVP_MAX_MD_SIZE + slen)) 1251 senc = OPENSSL_malloc(slen); [all...] |
ssl_locl.h | 797 int ssl3_send_finished(SSL *s, int a, int b, const char *sender,int slen); 806 const char *sender, int slen,unsigned char *p); 859 int dtls1_send_finished(SSL *s, int a, int b, const char *sender, int slen); [all...] |
s3_pkt.c | 1293 int slen; local [all...] |
/build/tools/droiddoc/src/ |
MethodInfo.java | 537 int slen = s.length(); local 540 ((slen+1)<qnlen && qn.charAt(qnlen-slen-1)=='.'
|
/external/grub/stage2/ |
disk_io.c | 142 int slen, sectors_per_vtrack; local 176 slen = ((byte_offset + byte_len + buf_geom.sector_size - 1) 201 if (slen > num_sect) 222 if (slen > num_sect 224 sector, slen, BUFFERSEG)) 240 if (buf_track == 0 || slen >= 2) [all...] |
/external/libpcap/ |
pcap-dag.c | 491 * snaplen is now also ignored, until we get per-stream slen support. Set 492 * slen with approprite DAG tool BEFORE pcap_open_live(). 606 /* XXX Not calling dag_configure() to set slen; this is unsafe in 608 * Once the firmware provides 'per-stream slen' this can be supported 613 * valid slen ranges. Should fix in Config API. */ 620 snprintf(conf, 30, "varlen slen=%d", (snaplen + 3) & ~3);
|
optimize.c | 2068 int slen; local [all...] |
/external/openssl/include/openssl/ |
kssl.h | 168 int slen, const char *svc, int hlen, const char *host);
|
rsa.h | 382 const EVP_MD *Hash, const unsigned char *EM, int sLen); 385 const EVP_MD *Hash, int sLen);
|
/external/oprofile/libpopt/ |
popthelp.c | 189 size_t slen = 4*lineLength - (le - l) - sizeof("\"...\")"); local 191 strncpy(le, s, slen); le[slen] = '\0'; le += strlen(le); 192 if (slen < strlen(s)) {
|
/hardware/broadcom/wlan/bcm4329/src/dhd/sys/ |
dhd_cdc.c | 296 int slen, val = 0; local 298 slen = strlen("wme_dp") + 1; 299 if (len >= (int)(slen + sizeof(int))) 300 bcopy(((char *)buf + slen), &val, sizeof(int));
|
/bionic/libc/netbsd/resolv/ |
res_send.c | 169 socklen_t slen; local 177 slen = sizeof u.sin; 181 slen = sizeof u.sin6; 197 if ( !bind( s, &u.sa, slen ) ) 208 return bind( s, &u.sa, slen );
|
/external/openssl/crypto/rsa/ |
rsa.h | 382 const EVP_MD *Hash, const unsigned char *EM, int sLen); 385 const EVP_MD *Hash, int sLen);
|
/external/bluetooth/glib/glib/ |
gdate.h | 241 gsize slen,
|
/external/iproute2/ip/ |
xfrm_state.c | 121 int slen = strlen(key); local 130 if (slen > 2 && strncmp(key, "0x", 2) == 0) { 133 int plen = slen - 2; 161 len = slen;
|
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 102 int slen, BIGNUM *s); 702 cryptodev_asym(struct crypt_kop *kop, int rlen, BIGNUM *r, int slen, BIGNUM *s) 715 kop->crk_param[kop->crk_iparams+1].crp_p = calloc(slen, sizeof(char)); 716 kop->crk_param[kop->crk_iparams+1].crp_nbits = slen * 8;
|
/external/dhcpcd/ |
dhcpcd.c | 214 parse_string_hwaddr(char *sbuf, ssize_t slen, char *str, int clid) 231 if (l > slen) { 250 if (++l > slen) {
|
/external/tcpdump/ |
print-domain.c | 91 int bitlen, slen, b; local 99 slen = (bitlen + 3) / 4; 100 lim = cp + 1 + slen;
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_read.c | 761 u16 slen; local 866 slen = WPA_GET_BE16(pos); 868 if (end - pos < slen) {
|
/external/icu4c/i18n/ |
ucol.cpp | [all...] |
/hardware/broadcom/wlan/bcm4329/src/dhd/exe/ |
dhdu.c | 1323 int buf_len, slen; local [all...] |
/external/openssl/apps/ |
req.c | 1680 int elen, slen; local [all...] |