/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; local 62 dlen = 0; 64 dlen = (dlen << 8) | (unsigned long)in[x++]; 68 dlen = in[x++] & 0x7F; 72 if ((dlen == 0) || (dlen + x > inlen)) { 77 blen = ((dlen - 1) << 3) - (in[x++] & 7);
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/bionic/libc/string/ |
strlcat.c | 35 size_t dlen; local 40 dlen = d - dst; 41 n = siz - dlen; 44 return(dlen + strlen(s)); 54 return(dlen + (s - src)); /* count does not include NUL */
|
/bionic/libc/wchar/ |
wcslcat.c | 54 size_t dlen; local 59 dlen = d - dst; 60 n = siz - dlen; 63 return(dlen + wcslen(s)); 73 return(dlen + (s - src)); /* count does not include NUL */
|
/external/tcpdump/missing/ |
strlcat.c | 56 size_t dlen; local 61 dlen = d - dst; 62 n = siz - dlen; 65 return(dlen + strlen(s)); 75 return(dlen + (s - src)); /* count does not include NUL */
|
/external/openssl/crypto/ecdsa/ |
ecs_sign.c | 62 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) 64 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); 67 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, 73 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 76 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char 79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 82 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char 87 RAND_seed(dgst, dlen); 88 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
|
/bootable/bootloader/legacy/libc/ |
crypto.c | 33 void compute_digest(void *data, unsigned dlen, void *digest_out) 36 SHA(data, dlen, digest);
|
/external/openssl/crypto/dsa/ |
dsa_sign.c | 65 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) 67 return dsa->meth->dsa_do_sign(dgst, dlen, dsa); 70 int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, 74 RAND_seed(dgst, dlen); 75 s=DSA_do_sign(dgst,dlen,dsa);
|
dsa_ossl.c | 69 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 131 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) 167 if (dlen > BN_num_bytes(dsa->q)) 171 dlen = BN_num_bytes(dsa->q); 172 if (BN_bin2bn(dgst,dlen,&m) == NULL)
|
dsa.h | 117 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 182 DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa); 200 int DSA_sign(int type,const unsigned char *dgst,int dlen,
|
/external/dropbear/ |
compat.c | 135 size_t dlen; local 140 dlen = d - dst; 141 n = siz - dlen; 144 return(dlen + strlen(s)); 154 return(dlen + (s - src)); /* count does not include NUL */
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 165 dlen = strlen (dir); 166 while (dlen > 1 && dir[dlen - 1] == '/') 167 dlen--; /* remove trailing slashes */ 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/external/skia/src/effects/ |
SkDashPathEffect.cpp | 113 SkScalar dlen = SkScalarMul(fInitialDashLength, scale); local 116 SkASSERT(dlen >= 0); 118 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 120 meas.getSegment(distance, distance + dlen, dst, true); 122 distance += dlen; 134 // fetch our next dlen 135 dlen = SkScalarMul(intervals[index], scale);
|
/external/iproute2/tc/ |
tc_stab.c | 147 unsigned i, j, dlen; 149 dlen = RTA_PAYLOAD(tb[TCA_STAB_DATA]) / sizeof(__u16); 152 for (i = 0; i < dlen/12; i++) { 154 for (j = 0; i * 12 + j < dlen; j++)
|
m_ematch.c | 371 int dlen; local 378 dlen = RTA_PAYLOAD(tb[i]) - sizeof(*hdr); 381 if (dlen < 0) 392 if (dlen < sizeof(__u32)) 414 if (e->print_eopt(fd, hdr, data, dlen) < 0)
|
/external/wpa_supplicant/ |
crypto_cryptoapi.c | 182 DWORD dlen; local 229 dlen = 8; 230 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 318 DWORD dlen; local 321 dlen = 16; 322 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 350 DWORD dlen; local 353 dlen = 16; 355 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 618 DWORD dlen; local 635 DWORD dlen; local [all...] |
radius.c | 1097 size_t i, dlen; local 1109 dlen = attr->length - sizeof(*attr); 1111 os_memcpy(buf, (attr + 1), dlen > len ? len : dlen); 1112 return dlen; 1175 size_t dlen; local 1182 dlen = attr->length - sizeof(*attr); 1207 dlen--; 1209 if (dlen >= sizeof(buf)) 1211 os_memcpy(buf, data, dlen); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_cryptoapi.c | 167 DWORD dlen; local 214 dlen = 8; 215 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 303 DWORD dlen; local 306 dlen = 16; 307 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 335 DWORD dlen; local 338 dlen = 16; 340 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 603 DWORD dlen; local 620 DWORD dlen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 165 DWORD dlen; local 212 dlen = 8; 213 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 300 DWORD dlen; local 303 dlen = 16; 304 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 332 DWORD dlen; local 335 dlen = 16; 337 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 599 DWORD dlen; local 616 DWORD dlen; local [all...] |
/external/qemu/audio/ |
wavcapture.c | 35 uint8_t dlen[4]; local 41 le_store (dlen, datalen, 4); 47 qemu_put_buffer (wav->f, dlen, 4);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_ttls.c | 179 size_t pad, dlen; local 200 dlen = avp_length - sizeof(*avp); 202 if (dlen < 4) { 211 dlen -= 4; 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 219 parse->eap = os_malloc(dlen); 226 os_memcpy(parse->eap, dpos, dlen); 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 179 size_t pad, dlen; local 200 dlen = avp_length - sizeof(*avp); 202 if (dlen < 4) { 211 dlen -= 4; 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 219 parse->eap = os_malloc(dlen); 226 os_memcpy(parse->eap, dpos, dlen); 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/frameworks/base/core/java/android/text/method/ |
DigitsKeyListener.java | 141 int dlen = dest.length(); local 156 for (int i = dend; i < dlen; i++) {
|
/external/qemu/telephony/ |
sms.c | 501 int dlen, adjust = 0; local 520 for (dlen = 0; dlen < len; dlen+=1) 522 int c = cur[dlen]; 526 if (dlen >= sizeof(address->data)) { 536 address->data[dlen] = (byte_t) c; 543 address->len = 2*dlen + adjust; 582 int len, dlen; local 587 dlen = *cur++ 623 int dlen; local [all...] |
/external/openssl/include/openssl/ |
dsa.h | 117 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 182 DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa); 200 int DSA_sign(int type,const unsigned char *dgst,int dlen,
|