/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 49 unsigned long buflen; local 81 buflen = taglen; 82 if ((err = eax_done(eax, buf, &buflen)) != CRYPT_OK) { 87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) {
|
/external/dropbear/ |
cli-authinteract.c | 55 unsigned int buflen = strlen(buf); local 57 if (buflen > 0 && buf[buflen-1] == '\n') 58 buf[buflen-1] = '\0';
|
signkey.c | 283 unsigned int buflen; local 293 buflen = 4 + 3*MD5_HASH_SIZE; 294 ret = (char*)m_malloc(buflen); 296 memset(ret, 'Z', buflen); 305 ret[buflen-1] = 0x0; 318 unsigned int buflen; local 328 buflen = 5 + 3*SHA1_HASH_SIZE; 329 ret = (char*)m_malloc(buflen); 339 ret[buflen-1] = 0x0;
|
/external/elfutils/lib/ |
md5.h | 50 md5_uint32 buflen; member in struct:md5_ctx
|
sha1.h | 51 sha1_uint32 buflen; member in struct:sha1_ctx
|
/external/ipsec-tools/src/racoon/ |
privsep.h | 49 size_t buflen[PRIVSEP_NBUF_MAX]; member in struct:admin_com_bufs
|
getcertsbyname.c | 209 int buflen, anslen, len; local 225 buflen = 512; 228 buflen *= 2; 229 p = realloc(answer, buflen); 239 anslen = res_query(name, C_IN, T_CERT, answer, buflen); 243 } while (buflen < anslen);
|
plog.c | 184 size_t buflen; local 194 buflen = (len * 2) + (len / 4) + (len / 32) + 3; 195 buf = racoon_malloc(buflen); 205 snprintf(&buf[i], buflen - i, "%02x", 210 if (buflen - i >= 2) {
|
/external/openssl/crypto/ecdh/ |
ech_ossl.c | 118 size_t buflen, len; local 171 buflen = (EC_GROUP_get_degree(group) + 7)/8; 173 if (len > buflen) 178 if ((buf = OPENSSL_malloc(buflen)) == NULL) 184 memset(buf, 0, buflen - len); 185 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) 193 if (KDF(buf, buflen, out, &outlen) == NULL) 203 if (outlen > buflen) 204 outlen = buflen;
|
/prebuilts/gcc/darwin-x86/arm/arm-eabi-4.6/lib/gcc/arm-eabi/4.6.x-google/plugin/include/ |
md5.h | 88 md5_uint32 buflen; member in struct:md5_ctx
|
/prebuilts/gcc/darwin-x86/arm/arm-linux-androideabi-4.6/lib/gcc/arm-linux-androideabi/4.6.x-google/plugin/include/ |
md5.h | 88 md5_uint32 buflen; member in struct:md5_ctx
|
/prebuilts/gcc/linux-x86/arm/arm-eabi-4.6/lib/gcc/arm-eabi/4.6.x-google/plugin/include/ |
md5.h | 88 md5_uint32 buflen; member in struct:md5_ctx
|
/prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.6/lib/gcc/arm-linux-androideabi/4.6.x-google/plugin/include/ |
md5.h | 88 md5_uint32 buflen; member in struct:md5_ctx
|
/external/openssh/ |
misc.h | 83 size_t buflen; member in struct:bwlimit
|
/external/oprofile/libpopt/ |
poptparse.c | 64 int buflen = strlen(s) + 1; local 65 char * buf = memset(alloca(buflen), 0, buflen);
|
/frameworks/av/media/libstagefright/ |
SkipCutBuffer.cpp | 43 int32_t buflen = buffer->range_length(); local 48 int32_t to_drop = (buflen < mFrontPadding) ? buflen : mFrontPadding; 50 buflen -= to_drop; 51 buffer->set_range(offset, buflen); 58 write(src, buflen); 70 int32_t buflen = buffer->size(); local 75 int32_t to_drop = (buflen < mFrontPadding) ? buflen : mFrontPadding; 77 buflen -= to_drop [all...] |
/system/core/toolbox/ |
notify.c | 107 int buflen; local 115 buflen = width - strlen(display_name); 116 read_len = read(ffd, buf, buflen); 118 if(read_len < buflen && buf[read_len-1] != '\n') { 122 if(read_len == buflen) {
|
/external/compiler-rt/lib/asan/ |
asan_malloc_mac.cc | 82 size_t buflen = 6 + (name ? internal_strlen(name) : 0); local 83 InternalScopedBuffer<char> new_name(buflen); 85 internal_snprintf(new_name.data(), buflen, "asan-%s", name);
|
/external/ipsec-tools/src/libipsec/ |
ipsec_dump_policy.c | 99 size_t off, buflen; local 187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir]) 197 if ((buf = malloc(buflen)) == NULL) { 204 snprintf(buf, buflen, "%s %s %c %u %s", 210 snprintf(buf, buflen, "%s %s %s", 216 snprintf(buf, buflen, "%s %s", 221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir], 256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1; 257 newbuf = (char *)realloc(buf, buflen); 264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf) [all...] |
/external/libpcap/ |
pcap-pf.c | 92 register int cc, n, buflen, inc; local 174 buflen = sp->ens_count; 175 if (buflen > pc->snapshot) 176 buflen = pc->snapshot; 179 inc = ENALIGN(buflen + sp->ens_stamplen); 201 bpf_filter(fcode, p, sp->ens_count, buflen)) { 212 buflen -= pad; 214 h.caplen = buflen;
|
/external/srtp/crypto/test/ |
cipher_driver.c | 262 unsigned len, buflen = 1024; local 263 uint8_t buffer0[buflen], buffer1[buflen], *current, *end; 276 for (j=0; j < buflen; j++) 285 status = cipher_encrypt(c, buffer0, &buflen); 296 end = buffer1 + buflen; 319 for (j=0; j < buflen; j++) 323 printf("computed: %s\n", octet_string_hex_string(buffer1, buflen)); 324 printf("expected: %s\n", octet_string_hex_string(buffer0, buflen));
|
/packages/apps/Nfc/nxp/jni/ |
com_android_nfc_NativeP2pDevice.cpp | 275 uint32_t buflen; local 294 buflen = (uint32_t)e->GetArrayLength(data); 296 TRACE("Buffer Length = %d\n", buflen); 299 transceive_info.sSendData.length = buflen; //- offset;
|
/bionic/libc/kernel/common/linux/nfsd/ |
xdr.h | 130 int buflen; member in struct:nfsd_readdirres
|
/bionic/libc/netbsd/nameser/ |
ns_print.c | 64 char **buf, size_t *buflen); 67 char **buf, size_t *buflen); 68 static void addlen(size_t len, char **buf, size_t *buflen); 70 char **buf, size_t *buflen); 72 char **buf, size_t *buflen); 86 * ns_sprintrr(handle, rr, name_ctx, origin, buf, buflen) 94 char *buf, size_t buflen) 101 name_ctx, origin, buf, buflen); 108 * name_ctx, origin, buf, buflen) 118 char *buf, size_t buflen) 170 addlen(strlen(buf), &buf, &buflen); local 338 addlen(strlen(buf), &buf, &buflen); local 429 addlen(strlen(buf), &buf, &buflen); local 671 addlen(strlen(buf), &buf, &buflen); local 694 addlen(strlen(buf), &buf, &buflen); local [all...] |
/development/ndk/platforms/android-3/include/linux/nfsd/ |
xdr.h | 119 int buflen; member in struct:nfsd_readdirres
|