/external/wpa_supplicant_8/src/crypto/ |
aes-eax.c | 39 size_t buf_len; local 45 buf_len = nonce_len; 47 buf_len = data_len; 48 if (hdr_len > buf_len) 49 buf_len = hdr_len; 50 buf_len += 16; 52 buf = os_malloc(buf_len); 103 size_t buf_len; local 109 buf_len = nonce_len; 111 buf_len = data_len [all...] |
/external/chromium/base/ |
stringprintf_unittest.cc | 125 const int buf_len = string_util_buf_len + 1; local 126 char src[buf_len + 1]; // Need extra one for NULL-terminator. 127 for (int i = 0; i < buf_len; ++i) 129 src[buf_len] = 0;
|
/external/openssl/crypto/ec/ |
ec_print.c | 65 size_t buf_len=0; local 68 buf_len = EC_POINT_point2oct(group, point, form, 70 if (buf_len == 0) 73 if ((buf = OPENSSL_malloc(buf_len)) == NULL) 76 if (!EC_POINT_point2oct(group, point, form, buf, buf_len, ctx)) 82 ret = BN_bin2bn(buf, buf_len, ret); 94 size_t buf_len=0; local 98 if ((buf_len = BN_num_bytes(bn)) == 0) return NULL; 99 buf = OPENSSL_malloc(buf_len); 120 if (!EC_POINT_oct2point(group, ret, buf, buf_len, ctx) 141 size_t buf_len=0,i; local [all...] |
eck_prn.c | 150 size_t buf_len=0, i; local 249 buf_len = (size_t)BN_num_bytes(p); 250 if (buf_len < (i = (size_t)BN_num_bytes(a))) 251 buf_len = i; 252 if (buf_len < (i = (size_t)BN_num_bytes(b))) 253 buf_len = i; 254 if (buf_len < (i = (size_t)BN_num_bytes(gen))) 255 buf_len = i; 256 if (buf_len < (i = (size_t)BN_num_bytes(order))) 257 buf_len = i [all...] |
ec_ameth.c | 431 size_t buf_len=0, i; local 462 buf_len = (size_t)BN_num_bytes(pub_key); 468 if (priv_key && (i = (size_t)BN_num_bytes(priv_key)) > buf_len) 469 buf_len = i; 476 buf_len += 10; 477 if ((buffer = OPENSSL_malloc(buf_len)) == NULL)
|
/external/srtp/crypto/test/ |
stat_driver.c | 36 unsigned int buf_len = 2500; local 75 err_check(cipher_encrypt(c, buffer, &buf_len)); 90 err_check(cipher_encrypt(c, buffer, &buf_len));
|
/external/dhcpcd/ |
bpf.c | 57 int buf_len = 0; local 94 if (ioctl(fd, BIOCGBLEN, &buf_len) == -1) 96 if (iface->buffer_size != (size_t)buf_len) { 98 iface->buffer_size = buf_len; 99 iface->buffer = xmalloc(buf_len);
|
/external/chromium/net/base/ |
upload_data_stream.h | 32 size_t buf_len() const { return buf_len_; } function in class:net::UploadDataStream
|
listen_socket_unittest.cc | 163 const int buf_len = 200; local 164 char buf[buf_len+1]; 167 int r = HANDLE_EINTR(recv(test_socket_, buf, buf_len, 0));
|
/external/openssl/crypto/evp/ |
bio_enc.c | 78 int buf_len; member in struct:enc_struct 116 ctx->buf_len=0; 154 if (ctx->buf_len > 0) 156 i=ctx->buf_len-ctx->buf_off; 163 if (ctx->buf_len == ctx->buf_off) 165 ctx->buf_len=0; 189 &(ctx->buf_len)); 202 (unsigned char *)ctx->buf,&ctx->buf_len, 211 if(ctx->buf_len == 0) continue; 214 if (ctx->buf_len <= outl [all...] |
bio_b64.c | 82 int buf_len; member in struct:b64_struct 119 ctx->buf_len=0; 160 ctx->buf_len=0; 167 if (ctx->buf_len > 0) 169 OPENSSL_assert(ctx->buf_len >= ctx->buf_off); 170 i=ctx->buf_len-ctx->buf_off; 178 if (ctx->buf_len == ctx->buf_off) 180 ctx->buf_len=0; 330 ctx->buf_len=0; 333 ctx->buf_len=z [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 142 size_t buf_len; local 144 buf_len = 2 * ETH_ALEN + 1 + mdie_len + ftie_len + rsnie_len + ric_len; 145 buf = os_malloc(buf_len);
|
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 93 size_t buf_len; local 123 buf_len = kde.rsn_ie_len + 2 + RSN_SELECTOR_LEN + ETH_ALEN; 124 buf = os_malloc(buf_len); 158 size_t buf_len; local 167 buf_len = 2 + RSN_SELECTOR_LEN + ETH_ALEN + 171 pos = buf = os_malloc(buf_len); 211 size_t buf_len; local 220 buf_len = kde->rsn_ie_len + 225 pos = buf = os_malloc(buf_len);
|
/external/openssl/crypto/pkcs7/ |
bio_ber.c | 104 int buf_len; member in struct:bio_ber_struct 174 n=ctx->buf_len-j; 180 ctx->buf_len-j; 185 i=BER_BUF_SIZE-ctx->buf_len; 188 i=BIO_read(bio->next_bio,&(ctx->buf[ctx->buf_len]),i); 195 ctx->buf_len+=i; 198 max=ctx->buf_len; 204 if ((ctx->buf_len < BER_BUF_SIZE) && 282 n=ctx->buf_len-ctx->buf_off; 303 (unsigned char *)ctx->buf,&ctx->buf_len, [all...] |
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 189 size_t buf_len=0; local 191 update_buflen(x->n, &buf_len); 192 update_buflen(x->e, &buf_len); 196 update_buflen(x->d, &buf_len); 197 update_buflen(x->p, &buf_len); 198 update_buflen(x->q, &buf_len); 199 update_buflen(x->dmp1, &buf_len); 200 update_buflen(x->dmq1, &buf_len); 201 update_buflen(x->iqmp, &buf_len); 204 m=(unsigned char *)OPENSSL_malloc(buf_len+10) [all...] |
/external/wpa_supplicant/ |
aes_wrap.c | 345 size_t buf_len; local 350 buf_len = nonce_len; 352 buf_len = data_len; 353 if (hdr_len > buf_len) 354 buf_len = hdr_len; 355 buf_len += 16; 357 buf = os_malloc(buf_len); 402 size_t buf_len; local 407 buf_len = nonce_len; 409 buf_len = data_len [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
aes_wrap.c | 350 size_t buf_len; local 355 buf_len = nonce_len; 357 buf_len = data_len; 358 if (hdr_len > buf_len) 359 buf_len = hdr_len; 360 buf_len += 16; 362 buf = os_malloc(buf_len); 413 size_t buf_len; local 418 buf_len = nonce_len; 420 buf_len = data_len [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_tls_common.c | 344 size_t buf_len; local 347 buf_len = plain_len + 300; 348 buf = wpabuf_alloc(buf_len); 353 buf_len);
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 144 size_t buf_len; local 146 buf_len = 2 * ETH_ALEN + 1 + mdie_len + ftie_len + rsnie_len + ric_len; 147 buf = os_malloc(buf_len);
|
/external/zlib/ |
minigzip.c | 208 off_t buf_len; /* length of the input file */ local 213 buf_len = sb.st_size; 214 if (buf_len <= 0) return Z_ERRNO; 217 buf = mmap((caddr_t) 0, buf_len, PROT_READ, MAP_SHARED, ifd, (off_t)0); 221 len = gzwrite(out, (char *)buf, (unsigned)buf_len); 223 if (len != (int)buf_len) error(gzerror(out, &err)); 225 munmap(buf, buf_len);
|
/external/chromium/chrome/browser/debugger/ |
devtools_remote_listen_socket_unittest.cc | 345 const int buf_len = 200; local 346 char buf[buf_len+1]; 347 int recv_len = HANDLE_EINTR(recv(test_socket_, buf, buf_len, 0));
|
/external/chromium/net/spdy/ |
spdy_http_stream.cc | 105 IOBuffer* buf, int buf_len, CompletionCallback* callback) { 108 CHECK(buf_len); 114 while (!response_body_.empty() && buf_len > 0) { 116 const int bytes_to_copy = std::min(buf_len, data->size()); 118 buf_len -= bytes_to_copy; 144 user_buffer_len_ = buf_len; 278 int buf_len = static_cast<int>(request_body_stream_->buf_len()); local 279 if (!buf_len) 289 request_body_stream_->buf(), buf_len, [all...] |
/external/openssl/apps/ |
ecparam.c | 479 size_t buf_len = 0, tmp_len = 0; local 525 if ((tmp_len = (size_t)BN_num_bytes(ec_p)) > buf_len) 526 buf_len = tmp_len; 527 if ((tmp_len = (size_t)BN_num_bytes(ec_a)) > buf_len) 528 buf_len = tmp_len; 529 if ((tmp_len = (size_t)BN_num_bytes(ec_b)) > buf_len) 530 buf_len = tmp_len; 531 if ((tmp_len = (size_t)BN_num_bytes(ec_gen)) > buf_len) 532 buf_len = tmp_len; 533 if ((tmp_len = (size_t)BN_num_bytes(ec_order)) > buf_len) [all...] |
/external/openssl/crypto/dh/ |
dh_ameth.c | 321 size_t buf_len=0; local 337 update_buflen(x->p, &buf_len); 339 if (buf_len == 0) 345 update_buflen(x->g, &buf_len); 346 update_buflen(pub_key, &buf_len); 347 update_buflen(priv_key, &buf_len); 356 m= OPENSSL_malloc(buf_len+10);
|
/external/openssl/crypto/dsa/ |
dsa_ameth.c | 434 size_t buf_len=0; local 456 update_buflen(x->p, &buf_len); 457 update_buflen(x->q, &buf_len); 458 update_buflen(x->g, &buf_len); 459 update_buflen(priv_key, &buf_len); 460 update_buflen(pub_key, &buf_len); 462 m=(unsigned char *)OPENSSL_malloc(buf_len+10);
|