/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; local 62 dlen = 0; 64 dlen = (dlen << 8) | (unsigned long)in[x++]; 68 dlen = in[x++] & 0x7F; 72 if ((dlen == 0) || (dlen + x > inlen)) { 77 blen = ((dlen - 1) << 3) - (in[x++] & 7);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/bionic/libc/string/ |
strlcat.c | 35 size_t dlen; local 40 dlen = d - dst; 41 n = siz - dlen; 44 return(dlen + strlen(s)); 54 return(dlen + (s - src)); /* count does not include NUL */
|
/bionic/libc/upstream-freebsd/lib/libc/string/ |
wcslcat.c | 54 size_t dlen; local 59 dlen = d - dst; 60 n = siz - dlen; 63 return(dlen + wcslen(s)); 73 return(dlen + (s - src)); /* count does not include NUL */
|
/external/openssh/openbsd-compat/ |
strlcat.c | 40 size_t dlen; local 45 dlen = d - dst; 46 n = siz - dlen; 49 return(dlen + strlen(s)); 59 return(dlen + (s - src)); /* count does not include NUL */
|
/external/tcpdump/missing/ |
strlcat.c | 56 size_t dlen; local 61 dlen = d - dst; 62 n = siz - dlen; 65 return(dlen + strlen(s)); 75 return(dlen + (s - src)); /* count does not include NUL */
|
/external/openssl/crypto/ecdsa/ |
ecs_sign.c | 62 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) 64 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); 67 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, 73 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 76 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char 79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 82 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char 87 RAND_seed(dgst, dlen); 88 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
|
/external/dropbear/ |
compat.c | 135 size_t dlen; local 140 dlen = d - dst; 141 n = siz - dlen; 144 return(dlen + strlen(s)); 154 return(dlen + (s - src)); /* count does not include NUL */
|
/external/openssl/crypto/cmac/ |
cmac.c | 215 int CMAC_Update(CMAC_CTX *ctx, const void *in, size_t dlen) 221 return FIPS_cmac_update(ctx, in, dlen); 225 if (dlen == 0) 233 if (dlen < nleft) 234 nleft = dlen; 236 dlen -= nleft; 239 if (dlen == 0) 247 while(dlen > bl) 251 dlen -= bl; 255 memcpy(ctx->last_block, data, dlen); [all...] |
cmac.h | 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 165 dlen = strlen (dir); 166 while (dlen > 1 && dir[dlen - 1] == '/') 167 dlen--; /* remove trailing slashes */ 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/external/linux-tools-perf/util/ |
strbuf.c | 54 const void *data, size_t dlen) 63 if (dlen >= len) 64 strbuf_grow(sb, dlen - len); 65 memmove(sb->buf + pos + dlen, 68 memcpy(sb->buf + pos, data, dlen); 69 strbuf_setlen(sb, sb->len + dlen - len);
|
/external/openssh/ |
ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 63 EVP_DigestFinal(&md, digest, &dlen); 65 sig = DSA_do_sign(digest, dlen, key->dsa); 116 u_int len, dlen; local 177 EVP_DigestFinal(&md, digest, &dlen); 179 ret = DSA_do_verify(digest, dlen, sig, key->dsa);
|
ssh-ecdsa.c | 54 u_int len, dlen; local 65 EVP_DigestFinal(&md, digest, &dlen); 67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); 103 u_int len, dlen; local 156 EVP_DigestFinal(&md, digest, &dlen); 158 ret = ECDSA_do_verify(digest, dlen, sig, key->ecdsa);
|
auth1.c | 119 u_int dlen; local 126 password = packet_get_string(&dlen); 138 memset(password, 0, dlen); 226 u_int dlen; local 228 response = packet_get_string(&dlen); 231 memset(response, 'r', dlen);
|
ssh-rsa.c | 46 u_int slen, dlen, len; local 62 EVP_DigestFinal(&md, digest, &dlen); 67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); 115 u_int len, dlen, modlen; local 169 EVP_DigestFinal(&md, digest, &dlen); 171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa);
|
/external/skia/legacy/src/effects/ |
SkDashPathEffect.cpp | 105 SkScalar dlen = SkScalarMul(fInitialDashLength, scale); local 108 SkASSERT(dlen >= 0); 110 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 112 meas.getSegment(distance, distance + dlen, dst, true); 114 distance += dlen; 126 // fetch our next dlen 127 dlen = SkScalarMul(intervals[index], scale);
|
/external/openssl/include/openssl/ |
cmac.h | 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
|
/external/openssl/crypto/dsa/ |
dsa_sign.c | 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) 76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa);
|
dsa_asn1.c | 153 int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, 157 RAND_seed(dgst, dlen); 158 s=DSA_do_sign(dgst,dlen,dsa);
|
/external/iproute2/tc/ |
tc_stab.c | 147 unsigned i, j, dlen; 149 dlen = RTA_PAYLOAD(tb[TCA_STAB_DATA]) / sizeof(__u16); 152 for (i = 0; i < dlen/12; i++) { 154 for (j = 0; i * 12 + j < dlen; j++)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 161 size_t pad, dlen; local 182 dlen = avp_length - sizeof(*avp); 184 if (dlen < 4) { 193 dlen -= 4; 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 201 parse->eap = os_malloc(dlen); 208 os_memcpy(parse->eap, dpos, dlen); 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 159 DWORD dlen; local 206 dlen = 8; 207 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 294 DWORD dlen; local 297 dlen = 16; 298 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 326 DWORD dlen; local 329 dlen = 16; 331 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 593 DWORD dlen; local 610 DWORD dlen; local [all...] |