/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 49 unsigned long buflen; local 81 buflen = taglen; 82 if ((err = eax_done(eax, buf, &buflen)) != CRYPT_OK) { 87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/ecdh/ |
ech_ossl.c | 118 size_t buflen, len; local 171 buflen = (EC_GROUP_get_degree(group) + 7)/8; 173 if (len > buflen) 178 if ((buf = OPENSSL_malloc(buflen)) == NULL) 184 memset(buf, 0, buflen - len); 185 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) 193 if (KDF(buf, buflen, out, &outlen) == NULL) 203 if (outlen > buflen) 204 outlen = buflen;
|
/external/dropbear/ |
cli-authinteract.c | 55 unsigned int buflen = strlen(buf); local 57 if (buflen > 0 && buf[buflen-1] == '\n') 58 buf[buflen-1] = '\0';
|
signkey.c | 283 unsigned int buflen; local 293 buflen = 4 + 3*MD5_HASH_SIZE; 294 ret = (char*)m_malloc(buflen); 296 memset(ret, 'Z', buflen); 305 ret[buflen-1] = 0x0; 318 unsigned int buflen; local 328 buflen = 5 + 3*SHA1_HASH_SIZE; 329 ret = (char*)m_malloc(buflen); 339 ret[buflen-1] = 0x0;
|
/external/elfutils/lib/ |
md5.h | 50 md5_uint32 buflen; member in struct:md5_ctx
|
sha1.h | 51 sha1_uint32 buflen; member in struct:sha1_ctx
|
/external/ipsec-tools/src/racoon/ |
privsep.h | 49 size_t buflen[PRIVSEP_NBUF_MAX]; member in struct:admin_com_bufs
|
getcertsbyname.c | 209 int buflen, anslen, len; local 225 buflen = 512; 228 buflen *= 2; 229 p = realloc(answer, buflen); 239 anslen = res_query(name, C_IN, T_CERT, answer, buflen); 243 } while (buflen < anslen);
|
plog.c | 184 size_t buflen; local 194 buflen = (len * 2) + (len / 4) + (len / 32) + 3; 195 buf = racoon_malloc(buflen); 205 snprintf(&buf[i], buflen - i, "%02x", 210 if (buflen - i >= 2) {
|
/external/openssl/crypto/ecdh/ |
ech_ossl.c | 118 size_t buflen, len; local 171 buflen = (EC_GROUP_get_degree(group) + 7)/8; 173 if (len > buflen) 178 if ((buf = OPENSSL_malloc(buflen)) == NULL) 184 memset(buf, 0, buflen - len); 185 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) 193 if (KDF(buf, buflen, out, &outlen) == NULL) 203 if (outlen > buflen) 204 outlen = buflen;
|
/prebuilts/gcc/darwin-x86/arm/arm-eabi-4.6/lib/gcc/arm-eabi/4.6.x-google/plugin/include/ |
md5.h | 88 md5_uint32 buflen; member in struct:md5_ctx
|
/prebuilts/gcc/darwin-x86/arm/arm-linux-androideabi-4.6/lib/gcc/arm-linux-androideabi/4.6.x-google/plugin/include/ |
md5.h | 88 md5_uint32 buflen; member in struct:md5_ctx
|
/prebuilts/gcc/linux-x86/arm/arm-eabi-4.6/lib/gcc/arm-eabi/4.6.x-google/plugin/include/ |
md5.h | 88 md5_uint32 buflen; member in struct:md5_ctx
|
/prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.6/lib/gcc/arm-linux-androideabi/4.6.x-google/plugin/include/ |
md5.h | 88 md5_uint32 buflen; member in struct:md5_ctx
|
/external/chromium_org/android_webview/javatests/src/org/chromium/android_webview/test/util/ |
VideoTestWebServer.java | 77 int buflen = 128; local 78 byte[] buffer = new byte[buflen]; 79 int len = in.read(buffer, 0, buflen); 82 if (len < buflen) break; 83 len = in.read(buffer, 0, buflen);
|
/external/chromium_org/third_party/opus/src/celt/tests/ |
test_unit_dft.c | 97 size_t buflen = sizeof(kiss_fft_cpx)*nfft; local 99 kiss_fft_cpx * in = (kiss_fft_cpx*)malloc(buflen); 100 kiss_fft_cpx * out= (kiss_fft_cpx*)malloc(buflen);
|
test_unit_mdct.c | 118 size_t buflen = sizeof(kiss_fft_scalar)*nfft; local 120 kiss_fft_scalar * in = (kiss_fft_scalar*)malloc(buflen); 121 kiss_fft_scalar * in_copy = (kiss_fft_scalar*)malloc(buflen); 122 kiss_fft_scalar * out= (kiss_fft_scalar*)malloc(buflen);
|
/external/openssh/ |
misc.h | 83 size_t buflen; member in struct:bwlimit
|
/external/oprofile/libpopt/ |
poptparse.c | 64 int buflen = strlen(s) + 1; local 65 char * buf = memset(alloca(buflen), 0, buflen);
|
/frameworks/av/media/libstagefright/ |
SkipCutBuffer.cpp | 43 int32_t buflen = buffer->range_length(); local 48 int32_t to_drop = (buflen < mFrontPadding) ? buflen : mFrontPadding; 50 buflen -= to_drop; 51 buffer->set_range(offset, buflen); 58 write(src, buflen); 70 int32_t buflen = buffer->size(); local 75 int32_t to_drop = (buflen < mFrontPadding) ? buflen : mFrontPadding; 77 buflen -= to_drop [all...] |
/system/core/toolbox/ |
notify.c | 107 int buflen; local 115 buflen = width - strlen(display_name); 116 read_len = read(ffd, buf, buflen); 118 if(read_len < buflen && buf[read_len-1] != '\n') { 122 if(read_len == buflen) {
|
/external/chromium_org/third_party/smhasher/src/ |
KeysetTest.cpp | 86 const int buflen = keymax + pad*3; local 88 uint8_t * buffer1 = new uint8_t[buflen]; 89 uint8_t * buffer2 = new uint8_t[buflen]; 107 r.rand_p(buffer1,buflen); 108 r.rand_p(buffer2,buflen);
|
/external/compiler-rt/lib/asan/ |
asan_malloc_mac.cc | 92 size_t buflen = 6 + (name ? internal_strlen(name) : 0); local 93 InternalScopedBuffer<char> new_name(buflen); 95 internal_snprintf(new_name.data(), buflen, "asan-%s", name);
|
/external/ipsec-tools/src/libipsec/ |
ipsec_dump_policy.c | 99 size_t off, buflen; local 187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir]) 197 if ((buf = malloc(buflen)) == NULL) { 204 snprintf(buf, buflen, "%s %s %c %u %s", 210 snprintf(buf, buflen, "%s %s %s", 216 snprintf(buf, buflen, "%s %s", 221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir], 256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1; 257 newbuf = (char *)realloc(buf, buflen); 264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf) [all...] |
/external/libpcap/ |
pcap-pf.c | 92 register int cc, n, buflen, inc; local 174 buflen = sp->ens_count; 175 if (buflen > pc->snapshot) 176 buflen = pc->snapshot; 179 inc = ENALIGN(buflen + sp->ens_stamplen); 201 bpf_filter(fcode, p, sp->ens_count, buflen)) { 212 buflen -= pad; 214 h.caplen = buflen;
|