/bionic/libc/string/ |
strlcat.c | 35 size_t dlen; local 40 dlen = d - dst; 41 n = siz - dlen; 44 return(dlen + strlen(s)); 54 return(dlen + (s - src)); /* count does not include NUL */
|
/bionic/libc/upstream-freebsd/lib/libc/string/ |
wcslcat.c | 54 size_t dlen; local 59 dlen = d - dst; 60 n = siz - dlen; 63 return(dlen + wcslen(s)); 73 return(dlen + (s - src)); /* count does not include NUL */
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; local 62 dlen = 0; 64 dlen = (dlen << 8) | (unsigned long)in[x++]; 68 dlen = in[x++] & 0x7F; 72 if ((dlen == 0) || (dlen + x > inlen)) { 77 blen = ((dlen - 1) << 3) - (in[x++] & 7);
|
/external/openssh/openbsd-compat/ |
strlcat.c | 40 size_t dlen; local 45 dlen = d - dst; 46 n = siz - dlen; 49 return(dlen + strlen(s)); 59 return(dlen + (s - src)); /* count does not include NUL */
|
/external/tcpdump/missing/ |
strlcat.c | 56 size_t dlen; local 61 dlen = d - dst; 62 n = siz - dlen; 65 return(dlen + strlen(s)); 75 return(dlen + (s - src)); /* count does not include NUL */
|
/external/chromium_org/courgette/third_party/ |
bsdiff.h | 84 uint32 dlen; // Length of the result file. member in struct:courgette::MBSPatchHeader_
|
/external/openssh/ |
ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 63 EVP_DigestFinal(&md, digest, &dlen); 65 sig = DSA_do_sign(digest, dlen, key->dsa); 116 u_int len, dlen; local 177 EVP_DigestFinal(&md, digest, &dlen); 179 ret = DSA_do_verify(digest, dlen, sig, key->dsa);
|
ssh-ecdsa.c | 54 u_int len, dlen; local 65 EVP_DigestFinal(&md, digest, &dlen); 67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); 103 u_int len, dlen; local 156 EVP_DigestFinal(&md, digest, &dlen); 158 ret = ECDSA_do_verify(digest, dlen, sig, key->ecdsa);
|
ssh-keysign.c | 159 u_int slen, dlen; local 233 data = buffer_get_string(&b, &dlen); 234 if (valid_request(pw, host, &key, data, dlen) < 0) 249 if (key_sign(keys[i], &signature, &slen, data, dlen) != 0)
|
auth1.c | 119 u_int dlen; local 126 password = packet_get_string(&dlen); 138 memset(password, 0, dlen); 226 u_int dlen; local 228 response = packet_get_string(&dlen); 231 memset(response, 'r', dlen);
|
ssh-rsa.c | 46 u_int slen, dlen, len; local 62 EVP_DigestFinal(&md, digest, &dlen); 67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); 115 u_int len, dlen, modlen; local 169 EVP_DigestFinal(&md, digest, &dlen); 171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa);
|
auth-options.c | 436 u_int nlen, dlen, clen; local 448 (data_blob = buffer_get_string_ret(&c, &dlen)) == NULL) { 452 buffer_append(&data, data_blob, dlen); 454 name, dlen);
|
ssh-pkcs11-helper.c | 170 u_int blen, dlen, slen = 0; local 176 data = get_string(&dlen); 183 if ((ret = RSA_private_encrypt(dlen, data, signature,
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/external/dropbear/ |
compat.c | 135 size_t dlen; local 140 dlen = d - dst; 141 n = siz - dlen; 144 return(dlen + strlen(s)); 154 return(dlen + (s - src)); /* count does not include NUL */
|
/frameworks/base/core/java/android/text/method/ |
DigitsKeyListener.java | 154 int dlen = dest.length(); local 169 for (int i = dend; i < dlen; i++) {
|
/external/qemu/audio/ |
wavcapture.c | 35 uint8_t dlen[4]; local 41 le_store (dlen, datalen, 4); 47 qemu_put_buffer (wav->f, dlen, 4);
|
wavaudio.c | 181 uint8_t dlen[4]; local 190 le_store (dlen, datalen, 4); 196 qemu_put_buffer (wav->f, dlen, 4);
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 165 dlen = strlen (dir); 166 while (dlen > 1 && dir[dlen - 1] == '/') 167 dlen--; /* remove trailing slashes */ 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/external/chromium_org/third_party/skia/src/effects/ |
SkDashPathEffect.cpp | 288 double dlen = SkScalarMul(fInitialDashLength, scale); local 291 SkASSERT(dlen >= 0); 293 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 299 SkDoubleToScalar(distance + dlen), 303 SkDoubleToScalar(distance + dlen), 307 distance += dlen; 319 // fetch our next dlen 320 dlen = SkScalarMul(intervals[index], scale);
|
/external/iproute2/tc/ |
m_ematch.c | 371 int dlen; local 378 dlen = RTA_PAYLOAD(tb[i]) - sizeof(*hdr); 381 if (dlen < 0) 392 if (dlen < sizeof(__u32)) 414 if (e->print_eopt(fd, hdr, data, dlen) < 0)
|
/external/skia/src/effects/ |
SkDashPathEffect.cpp | 288 double dlen = SkScalarMul(fInitialDashLength, scale); local 291 SkASSERT(dlen >= 0); 293 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 299 SkDoubleToScalar(distance + dlen), 303 SkDoubleToScalar(distance + dlen), 307 distance += dlen; 319 // fetch our next dlen 320 dlen = SkScalarMul(intervals[index], scale);
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 145 * The signed data is returned (by secure app) at offset of data + dlen. 151 * dlen : Plain data length 158 size_t dlen; member in struct:keymaster_sign_data_cmd
|