/external/openssh/ |
ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 73 rlen = BN_num_bytes(sig->r); 75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { 76 error("bad sig size %u %u", rlen, slen); 81 BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen); 117 int rlen, ret; local 145 rlen = buffer_len(&b); 147 if (rlen != 0) { 149 "remaining bytes in signature %d", rlen);
|
ssh-ecdsa.c | 104 int rlen, ret; local 127 rlen = buffer_len(&b); 129 if (rlen != 0) { 130 error("%s: remaining bytes in signature %d", __func__, rlen);
|
ssh-rsa.c | 116 int rlen, ret, nid; local 139 rlen = buffer_len(&b); 141 if (rlen != 0) { 142 error("ssh_rsa_verify: remaining bytes in signature %d", rlen);
|
schnorr.c | 364 u_int rlen; local 381 rlen = buffer_len(&b); 383 if (rlen != 0) { 384 error("%s: remaining bytes in signature %d", __func__, rlen);
|
/system/bluetooth/bluez-clean-headers/bluetooth/ |
hci_lib.h | 32 int rlen; member in struct:hci_request
|
/system/core/toolbox/ |
md5.c | 38 ssize_t rlen; local 39 rlen = read(fd, buf, sizeof(buf)); 40 if (rlen == 0) 42 else if (rlen < 0) { 47 MD5_Update(&md5_ctx, buf, rlen);
|
/external/icu4c/test/cintltst/ |
cg7coll.c | 146 int32_t i, rlen, j, n; local 161 defRules = ucol_getRules(myCollation, &rlen); 163 tblColl1 = ucol_openRules(defRules, rlen, UCOL_OFF,
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 249 size_t i, rlen, hlen; local 285 rlen = WPA_GET_BE16(in_data + 3); 288 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 290 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 298 if (rlen > in_len) { 300 "(rlen=%lu > in_len=%lu)", 301 (unsigned long) rlen, (unsigned long) in_len); 306 in_len = rlen;
|
tlsv1_server_write.c | 51 size_t rlen; local 145 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 151 pos = rhdr + rlen; 163 size_t rlen; local 229 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 235 pos = rhdr + rlen; 252 size_t rlen; local 423 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 429 pos = rhdr + rlen; 446 size_t rlen; local 511 size_t rlen; local 553 size_t rlen; local 587 size_t rlen, hlen; local [all...] |
tlsv1_client.c | 225 size_t rlen; local 233 out_data, out_len, in_len, &rlen) < 0) { 240 return rlen;
|
tlsv1_client_write.c | 136 size_t rlen; local 194 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 200 pos = rhdr + rlen; 382 size_t rlen; local 420 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 426 pos = rhdr + rlen; 439 size_t rlen, hlen, clen; local 541 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 547 pos = rhdr + rlen; 561 size_t rlen; local 595 size_t rlen, hlen; local [all...] |
tlsv1_server.c | 199 size_t rlen; local 207 out_data, out_len, in_len, &rlen) < 0) { 214 return rlen;
|
/external/bluetooth/bluez/plugins/ |
dbusoob.c | 134 int32_t hlen, rlen; local 141 DBUS_TYPE_ARRAY, DBUS_TYPE_BYTE, &randomizer, &rlen, 145 if (hlen != 16 || rlen != 16 || bachk(addr))
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gtc.c | 104 size_t rlen; local 106 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 107 if (pos == NULL || rlen < 1) 110 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 116 if (rlen < 10) { 123 end = pos + rlen; 168 rlen = end - pos; 171 pos, rlen); 183 if (rlen != sm->user->password_len || 184 os_memcmp(pos, sm->user->password, rlen) != 0) [all...] |
eap_tnc.c | 101 size_t rlen; local 119 rlen = start_len + imv_len + end_len; 120 req = wpabuf_alloc(rlen);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp(pos, sm->user->password, rlen) != 0) [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
tlsv1_server_write.c | 47 size_t rlen; local 142 &rlen) < 0) { 148 pos = rhdr + rlen; 160 size_t rlen; local 227 &rlen) < 0) { 233 pos = rhdr + rlen; 249 size_t rlen; local 419 &rlen) < 0) { 425 pos = rhdr + rlen; 439 size_t rlen; local 505 size_t rlen; local 541 size_t rlen; local 575 size_t rlen, hlen; local [all...] |
/external/bluetooth/bluez/lib/bluetooth/ |
hci_lib.h | 40 int rlen; member in struct:hci_request
|
/external/bluetooth/bluez/test/ |
hstest.c | 154 int maxfd, sel, rlen, wlen; local 267 rlen = read(rd, buf, sizeof(buf)); 268 if (rlen > 0) { 276 rlen = read(sd, buf, sizeof(buf)); 277 if (rlen > 0) 280 rlen = read(fd, buf, rlen); 284 while (rlen > sco_mtu) { 286 rlen -= sco_mtu; 289 wlen += write(sd, p, rlen); [all...] |
/external/qemu/audio/ |
wavcapture.c | 34 uint8_t rlen[4]; local 40 le_store (rlen, rifflen, 4); 44 qemu_put_buffer (wav->f, rlen, 4);
|
wavaudio.c | 180 uint8_t rlen[4]; local 189 le_store (rlen, rifflen, 4); 193 qemu_put_buffer (wav->f, rlen, 4);
|
/external/openssl/ssl/ |
s3_lib.c | 3005 size_t rlen, wlen; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 200 size_t rlen; local 252 rlen = 2 + EAP_SAKE_RAND_LEN + 2 + EAP_SAKE_MIC_LEN; 254 rlen += 2 + data->peerid_len; 255 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen,
|
eap_tnc.c | 210 size_t len, rlen; local 383 rlen = start_len + imc_len + end_len; 384 resp = wpabuf_alloc(rlen);
|