HomeSort by relevance Sort by last modified time
    Searched refs:dlen (Results 1 - 25 of 96) sorted by null

1 2 3 4

  /external/dropbear/libtomcrypt/src/pk/asn1/der/bit/
der_decode_bit_string.c 32 unsigned long dlen, blen, x, y; local
62 dlen = 0;
64 dlen = (dlen << 8) | (unsigned long)in[x++];
68 dlen = in[x++] & 0x7F;
72 if ((dlen == 0) || (dlen + x > inlen)) {
77 blen = ((dlen - 1) << 3) - (in[x++] & 7);
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
pg.h 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr
57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
pg.h 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr
57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
pg.h 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr
57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
  /bionic/libc/string/
strlcat.c 35 size_t dlen; local
40 dlen = d - dst;
41 n = siz - dlen;
44 return(dlen + strlen(s));
54 return(dlen + (s - src)); /* count does not include NUL */
  /bionic/libc/wchar/
wcslcat.c 54 size_t dlen; local
59 dlen = d - dst;
60 n = siz - dlen;
63 return(dlen + wcslen(s));
73 return(dlen + (s - src)); /* count does not include NUL */
  /external/openssh/openbsd-compat/
strlcat.c 40 size_t dlen; local
45 dlen = d - dst;
46 n = siz - dlen;
49 return(dlen + strlen(s));
59 return(dlen + (s - src)); /* count does not include NUL */
  /external/tcpdump/missing/
strlcat.c 56 size_t dlen; local
61 dlen = d - dst;
62 n = siz - dlen;
65 return(dlen + strlen(s));
75 return(dlen + (s - src)); /* count does not include NUL */
  /external/openssl/crypto/ecdsa/
ecs_sign.c 62 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey)
64 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey);
67 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen,
73 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey);
76 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char
79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey);
82 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char
87 RAND_seed(dgst, dlen);
88 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
  /bootable/bootloader/legacy/libc/
crypto.c 33 void compute_digest(void *data, unsigned dlen, void *digest_out)
36 SHA(data, dlen, digest);
  /external/dropbear/
compat.c 135 size_t dlen; local
140 dlen = d - dst;
141 n = siz - dlen;
144 return(dlen + strlen(s));
154 return(dlen + (s - src)); /* count does not include NUL */
  /external/openssl/crypto/cmac/
cmac.c 215 int CMAC_Update(CMAC_CTX *ctx, const void *in, size_t dlen)
221 return FIPS_cmac_update(ctx, in, dlen);
225 if (dlen == 0)
233 if (dlen < nleft)
234 nleft = dlen;
236 dlen -= nleft;
239 if (dlen == 0)
247 while(dlen > bl)
251 dlen -= bl;
255 memcpy(ctx->last_block, data, dlen);
    [all...]
cmac.h 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
  /ndk/sources/host-tools/sed-4.2.1/lib/
tempname.c 128 size_t dlen, plen; local
165 dlen = strlen (dir);
166 while (dlen > 1 && dir[dlen - 1] == '/')
167 dlen--; /* remove trailing slashes */
170 if (tmpl_len < dlen + 1 + plen + 6 + 1)
176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
  /external/linux-tools-perf/util/
strbuf.c 54 const void *data, size_t dlen)
63 if (dlen >= len)
64 strbuf_grow(sb, dlen - len);
65 memmove(sb->buf + pos + dlen,
68 memcpy(sb->buf + pos, data, dlen);
69 strbuf_setlen(sb, sb->len + dlen - len);
  /external/openssh/
ssh-dss.c 53 u_int rlen, slen, len, dlen; local
63 EVP_DigestFinal(&md, digest, &dlen);
65 sig = DSA_do_sign(digest, dlen, key->dsa);
116 u_int len, dlen; local
177 EVP_DigestFinal(&md, digest, &dlen);
179 ret = DSA_do_verify(digest, dlen, sig, key->dsa);
ssh-ecdsa.c 54 u_int len, dlen; local
65 EVP_DigestFinal(&md, digest, &dlen);
67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa);
103 u_int len, dlen; local
156 EVP_DigestFinal(&md, digest, &dlen);
158 ret = ECDSA_do_verify(digest, dlen, sig, key->ecdsa);
auth1.c 119 u_int dlen; local
126 password = packet_get_string(&dlen);
138 memset(password, 0, dlen);
226 u_int dlen; local
228 response = packet_get_string(&dlen);
231 memset(response, 'r', dlen);
ssh-rsa.c 46 u_int slen, dlen, len; local
62 EVP_DigestFinal(&md, digest, &dlen);
67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa);
115 u_int len, dlen, modlen; local
169 EVP_DigestFinal(&md, digest, &dlen);
171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa);
  /external/skia/src/effects/
SkDashPathEffect.cpp 105 SkScalar dlen = SkScalarMul(fInitialDashLength, scale); local
108 SkASSERT(dlen >= 0);
110 if (is_even(index) && dlen > 0 && !skipFirstSegment) {
112 meas.getSegment(distance, distance + dlen, dst, true);
114 distance += dlen;
126 // fetch our next dlen
127 dlen = SkScalarMul(intervals[index], scale);
  /external/openssl/include/openssl/
cmac.h 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
  /external/openssl/crypto/dsa/
dsa_sign.c 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa)
76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa);
  /external/iproute2/tc/
tc_stab.c 147 unsigned i, j, dlen;
149 dlen = RTA_PAYLOAD(tb[TCA_STAB_DATA]) / sizeof(__u16);
152 for (i = 0; i < dlen/12; i++) {
154 for (j = 0; i * 12 + j < dlen; j++)
  /external/wpa_supplicant_8/src/eap_server/
eap_server_ttls.c 161 size_t pad, dlen; local
182 dlen = avp_length - sizeof(*avp);
184 if (dlen < 4) {
193 dlen -= 4;
196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
201 parse->eap = os_malloc(dlen);
208 os_memcpy(parse->eap, dpos, dlen);
209 parse->eap_len = dlen;
212 parse->eap_len + dlen);
219 os_memcpy(neweap + parse->eap_len, dpos, dlen);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_cryptoapi.c 167 DWORD dlen; local
214 dlen = 8;
215 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) {
303 DWORD dlen; local
306 dlen = 16;
307 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) {
335 DWORD dlen; local
338 dlen = 16;
340 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) {
603 DWORD dlen; local
620 DWORD dlen; local
    [all...]

Completed in 1606 milliseconds

1 2 3 4