/bionic/libc/string/ |
strlcat.c | 35 size_t dlen; local 40 dlen = d - dst; 41 n = siz - dlen; 44 return(dlen + strlen(s)); 54 return(dlen + (s - src)); /* count does not include NUL */
|
/bionic/libc/wchar/ |
wcslcat.c | 54 size_t dlen; local 59 dlen = d - dst; 60 n = siz - dlen; 63 return(dlen + wcslen(s)); 73 return(dlen + (s - src)); /* count does not include NUL */
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; local 62 dlen = 0; 64 dlen = (dlen << 8) | (unsigned long)in[x++]; 68 dlen = in[x++] & 0x7F; 72 if ((dlen == 0) || (dlen + x > inlen)) { 77 blen = ((dlen - 1) << 3) - (in[x++] & 7);
|
/external/openssh/openbsd-compat/ |
strlcat.c | 40 size_t dlen; local 45 dlen = d - dst; 46 n = siz - dlen; 49 return(dlen + strlen(s)); 59 return(dlen + (s - src)); /* count does not include NUL */
|
/external/tcpdump/missing/ |
strlcat.c | 56 size_t dlen; local 61 dlen = d - dst; 62 n = siz - dlen; 65 return(dlen + strlen(s)); 75 return(dlen + (s - src)); /* count does not include NUL */
|
/external/openssh/ |
ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 63 EVP_DigestFinal(&md, digest, &dlen); 65 sig = DSA_do_sign(digest, dlen, key->dsa); 116 u_int len, dlen; local 177 EVP_DigestFinal(&md, digest, &dlen); 179 ret = DSA_do_verify(digest, dlen, sig, key->dsa);
|
ssh-ecdsa.c | 54 u_int len, dlen; local 65 EVP_DigestFinal(&md, digest, &dlen); 67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); 103 u_int len, dlen; local 156 EVP_DigestFinal(&md, digest, &dlen); 158 ret = ECDSA_do_verify(digest, dlen, sig, key->ecdsa);
|
ssh-keysign.c | 159 u_int slen, dlen; local 233 data = buffer_get_string(&b, &dlen); 234 if (valid_request(pw, host, &key, data, dlen) < 0) 249 if (key_sign(keys[i], &signature, &slen, data, dlen) != 0)
|
auth1.c | 119 u_int dlen; local 126 password = packet_get_string(&dlen); 138 memset(password, 0, dlen); 226 u_int dlen; local 228 response = packet_get_string(&dlen); 231 memset(response, 'r', dlen);
|
ssh-rsa.c | 46 u_int slen, dlen, len; local 62 EVP_DigestFinal(&md, digest, &dlen); 67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); 115 u_int len, dlen, modlen; local 169 EVP_DigestFinal(&md, digest, &dlen); 171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa);
|
auth-options.c | 436 u_int nlen, dlen, clen; local 448 (data_blob = buffer_get_string_ret(&c, &dlen)) == NULL) { 452 buffer_append(&data, data_blob, dlen); 454 name, dlen);
|
ssh-pkcs11-helper.c | 170 u_int blen, dlen, slen = 0; local 176 data = get_string(&dlen); 183 if ((ret = RSA_private_encrypt(dlen, data, signature,
|
kex.c | 230 u_int i, dlen; local 237 ptr = packet_get_raw(&dlen); 238 buffer_append(&kex->peer, ptr, dlen);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/external/dropbear/ |
compat.c | 135 size_t dlen; local 140 dlen = d - dst; 141 n = siz - dlen; 144 return(dlen + strlen(s)); 154 return(dlen + (s - src)); /* count does not include NUL */
|
/external/skia/src/effects/ |
SkDashPathEffect.cpp | 105 SkScalar dlen = SkScalarMul(fInitialDashLength, scale); local 108 SkASSERT(dlen >= 0); 110 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 112 meas.getSegment(distance, distance + dlen, dst, true); 114 distance += dlen; 126 // fetch our next dlen 127 dlen = SkScalarMul(intervals[index], scale);
|
/frameworks/base/core/java/android/text/method/ |
DigitsKeyListener.java | 145 int dlen = dest.length(); local 160 for (int i = dend; i < dlen; i++) {
|
/external/qemu/audio/ |
wavcapture.c | 35 uint8_t dlen[4]; local 41 le_store (dlen, datalen, 4); 47 qemu_put_buffer (wav->f, dlen, 4);
|
wavaudio.c | 181 uint8_t dlen[4]; local 190 le_store (dlen, datalen, 4); 196 qemu_put_buffer (wav->f, dlen, 4);
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 165 dlen = strlen (dir); 166 while (dlen > 1 && dir[dlen - 1] == '/') 167 dlen--; /* remove trailing slashes */ 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/external/iproute2/tc/ |
m_ematch.c | 371 int dlen; local 378 dlen = RTA_PAYLOAD(tb[i]) - sizeof(*hdr); 381 if (dlen < 0) 392 if (dlen < sizeof(__u32)) 414 if (e->print_eopt(fd, hdr, data, dlen) < 0)
|
/external/bluetooth/hcidump/parser/ |
l2cap.c | 630 printf("Echo req: dlen %d\n", btohs(cmd->len)); 639 printf("Echo rsp: dlen %d\n", btohs(cmd->len)); 713 uint16_t dlen = btohs(hdr->len); local 804 printf("L2CAP(c): len %d psm %d\n", dlen, psm); 826 printf("L2CAP(d): cid 0x%4.4x len %d", cid, dlen); 942 uint16_t dlen; local 946 dlen = btohs(hdr->len); 948 if ((int) frm->len == (dlen + L2CAP_HDR_SIZE)) { 963 if (!(fr->data = malloc(dlen + L2CAP_HDR_SIZE))) { 968 fr->data_len = dlen + L2CAP_HDR_SIZE [all...] |
/external/ppp/pppd/ |
utils.c | 117 size_t dlen = strlen(dest); local 119 return dlen + strlcpy(dest + dlen, src, (len > dlen? len - dlen: 0));
|