HomeSort by relevance Sort by last modified time
    Searched refs:buflen (Results 1 - 25 of 264) sorted by null

1 2 3 4 5 6 7 8 91011

  /bionic/libc/unistd/
recv.c 31 ssize_t recv(int socket, void *buf, size_t buflen, unsigned int flags)
33 return recvfrom(socket, buf, buflen, flags, NULL, 0);
send.c 31 ssize_t send(int socket, const void *buf, size_t buflen, unsigned int flags)
33 return (ssize_t) sendto(socket, buf, buflen, flags, NULL, 0);
gethostname.c 33 int gethostname(char* buff, size_t buflen)
43 if ((int)buflen < namelen+1) {
ptsname_r.c 35 int ptsname_r( int fd, char* buf, size_t buflen)
52 if (len+1 > (int)buflen) {
  /external/tcpdump/
decode_prefix.h 36 extern int decode_prefix4(const u_char *pptr, char *buf, u_int buflen);
38 extern int decode_prefix6(const u_char *pd, char *buf, u_int buflen);
  /bionic/libc/netbsd/nameser/
ns_print.c 64 char **buf, size_t *buflen);
67 char **buf, size_t *buflen);
68 static void addlen(size_t len, char **buf, size_t *buflen);
70 char **buf, size_t *buflen);
72 char **buf, size_t *buflen);
86 * ns_sprintrr(handle, rr, name_ctx, origin, buf, buflen)
94 char *buf, size_t buflen)
101 name_ctx, origin, buf, buflen);
108 * name_ctx, origin, buf, buflen)
118 char *buf, size_t buflen)
170 addlen(strlen(buf), &buf, &buflen); local
338 addlen(strlen(buf), &buf, &buflen); local
429 addlen(strlen(buf), &buf, &buflen); local
671 addlen(strlen(buf), &buf, &buflen); local
694 addlen(strlen(buf), &buf, &buflen); local
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_add_aad.c 41 if (gcm->buflen > 16 || gcm->buflen < 0) {
52 if (gcm->ivmode || gcm->buflen != 12) {
53 for (x = 0; x < (unsigned long)gcm->buflen; x++) {
56 if (gcm->buflen) {
57 gcm->totlen += gcm->buflen * CONST64(8);
81 gcm->buflen = 0;
86 if (gcm->mode != GCM_MODE_AAD || gcm->buflen >= 16) {
92 if (gcm->buflen == 0) {
107 gcm->X[gcm->buflen++] ^= *adata++
    [all...]
gcm_add_iv.c 43 if (gcm->buflen >= 16 || gcm->buflen < 0) {
53 if (IVlen + gcm->buflen > 12) {
59 if (gcm->buflen == 0) {
73 gcm->buf[gcm->buflen++] = *IV++;
75 if (gcm->buflen == 16) {
81 gcm->buflen = 0;
gcm_process.c 44 if (gcm->buflen > 16 || gcm->buflen < 0) {
55 if (gcm->buflen) {
56 gcm->totlen += gcm->buflen * CONST64(8);
69 gcm->buflen = 0;
79 if (gcm->buflen == 0) {
122 if (gcm->buflen == 16) {
133 gcm->buflen = 0;
137 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen];
140 pt[x] = ct[x] ^ gcm->buf[gcm->buflen];
    [all...]
gcm_done.c 37 if (gcm->buflen > 16 || gcm->buflen < 0) {
51 if (gcm->buflen) {
52 gcm->pttotlen += gcm->buflen * CONST64(8);
gcm_reset.c 33 gcm->buflen = 0;
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_process.c 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) ||
40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) {
45 if (omac->buflen == 0 && inlen > 16) {
62 if (omac->buflen == omac->blklen) {
69 omac->buflen = 0;
73 n = MIN(inlen, (unsigned long)(omac->blklen - omac->buflen));
74 XMEMCPY(omac->block + omac->buflen, in, n);
75 omac->buflen += n;
omac_done.c 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) ||
40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) {
45 if (omac->buflen != omac->blklen) {
47 omac->block[omac->buflen++] = 0x80;
50 while (omac->buflen < omac->blklen) {
51 omac->block[omac->buflen++] = 0x00;
  /external/dropbear/libtomcrypt/src/mac/pmac/
pmac_process.c 40 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) ||
41 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) {
46 if (pmac->buflen == 0 && inlen > 16) {
67 if (pmac->buflen == pmac->block_len) {
78 pmac->buflen = 0;
82 n = MIN(inlen, (unsigned long)(pmac->block_len - pmac->buflen));
83 XMEMCPY(pmac->block + pmac->buflen, in, n);
84 pmac->buflen += n;
pmac_done.c 30 if ((state->buflen > (int)sizeof(state->block)) || (state->buflen < 0) ||
31 (state->block_len > (int)sizeof(state->block)) || (state->buflen > state->block_len)) {
38 if (state->buflen == state->block_len) {
45 for (x = 0; x < state->buflen; x++) {
  /bionic/libc/string/
strerror_r.c 93 strerror_r(int errnum, char *strerrbuf, size_t buflen)
102 len = strlcpy(strerrbuf, msg, buflen);
103 if ((size_t)len >= buflen)
106 len = strlcpy(strerrbuf, "Unknown error: ", buflen);
107 if ((size_t)len >= buflen)
110 int ret = __itoa(errnum, 1, strerrbuf, len, buflen);
128 __num2string(int num, int sign, int setid, char *buf, size_t buflen,
135 len = strlcpy(buf, def, buflen);
136 if (len >= buflen)
139 len = strlcpy(buf, def, buflen);
    [all...]
  /bionic/libc/netbsd/resolv/
__res_send.c 31 res_send(const u_char *buf, int buflen, u_char *ans, int anssiz)
34 return __res_send(buf, buflen, ans, anssiz);
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_process.c 39 (f9->buflen > f9->blocksize) || (f9->buflen < 0)) {
44 if (f9->buflen == 0) {
60 if (f9->buflen == f9->blocksize) {
65 f9->buflen = 0;
67 f9->IV[f9->buflen++] ^= *in++;
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_process.c 42 (xcbc->buflen > xcbc->blocksize) || (xcbc->buflen < 0)) {
47 if (xcbc->buflen == 0) {
60 if (xcbc->buflen == xcbc->blocksize) {
62 xcbc->buflen = 0;
64 xcbc->IV[xcbc->buflen++] ^= *in++;
  /external/openssl/crypto/ecdh/
ech_ossl.c 118 size_t buflen, len; local
169 buflen = (EC_GROUP_get_degree(group) + 7)/8;
171 if (len > buflen)
176 if ((buf = OPENSSL_malloc(buflen)) == NULL)
182 memset(buf, 0, buflen - len);
183 if (len != (size_t)BN_bn2bin(x, buf + buflen - len))
191 if (KDF(buf, buflen, out, &outlen) == NULL)
201 if (outlen > buflen)
202 outlen = buflen;
  /hardware/ril/mock-ril/src/cpp/
node_util.cpp 97 size_t buflen,
118 str->WriteUtf8(buf, buflen);
119 return buflen;
123 str->WriteAscii(buf, 0, buflen);
124 return buflen;
131 uint16_t * twobytebuf = new uint16_t[buflen];
133 str->Write(twobytebuf, 0, buflen);
135 for (size_t i = 0; i < buflen; i++) {
143 return buflen;
  /external/wpa_supplicant_6/wpa_supplicant/
main_winsvc.c 73 DWORD buflen, val; local
87 buflen = sizeof(ctrl_interface);
89 (LPBYTE) ctrl_interface, &buflen);
94 (int) buflen, (char *) ctrl_interface);
98 buflen = sizeof(adapter);
100 (LPBYTE) adapter, &buflen);
105 (int) buflen, (char *) adapter);
109 buflen = sizeof(config);
111 (LPBYTE) config, &buflen);
116 (int) buflen, (char *) config)
146 DWORD val, buflen, i; local
    [all...]
  /external/ipsec-tools/src/racoon/
privsep.c 290 size_t *buflen; local
301 "corrupted privsep message (short buflen)\n");
309 data += combuf->bufs.buflen[i];
310 totallen += combuf->bufs.buflen[i];
345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0';
361 reply->bufs.buflen[0] = privkey->l;
392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0';
398 if (combuf->bufs.buflen[count] == 0)
401 [combuf->bufs.buflen[count] - 1] = '\0';
433 if (combuf->bufs.buflen[count] != sizeof(name))
    [all...]
  /external/dropbear/libtomcrypt/src/mac/pelican/
pelican.c 50 pelmac->buflen = 0;
107 if (pelmac->buflen < 0 || pelmac->buflen > 15) {
112 if (pelmac->buflen == 0) {
126 pelmac->state[pelmac->buflen++] ^= *in++;
127 if (pelmac->buflen == 16) {
129 pelmac->buflen = 0;
147 if (pelmac->buflen < 0 || pelmac->buflen > 16) {
151 if (pelmac->buflen == 16)
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_decrypt_verify_memory.c 49 unsigned long buflen; local
81 buflen = taglen;
82 if ((err = eax_done(eax, buf, &buflen)) != CRYPT_OK) {
87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) {

Completed in 165 milliseconds

1 2 3 4 5 6 7 8 91011