/external/openssl/crypto/dsa/ |
dsa_sign.c | 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) 76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa);
|
dsa_asn1.c | 153 int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, 157 RAND_seed(dgst, dlen); 158 s=DSA_do_sign(dgst,dlen,dsa);
|
dsa_ossl.c | 69 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 131 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) 169 if (dlen > BN_num_bytes(dsa->q)) 173 dlen = BN_num_bytes(dsa->q); 174 if (BN_bin2bn(dgst,dlen,&m) == NULL)
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/bsddb/ |
dbrecio.py | 76 dlen = newpos - self.pos 78 r = self.db.get(self.key, txn=self.txn, dlen=dlen, doff=self.pos) 124 self.db.put(self.key, "", txn=self.txn, dlen=self.len-size, doff=size) 134 self.db.put(self.key, s, txn=self.txn, dlen=len(s), doff=self.pos)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/bsddb/ |
dbrecio.py | 76 dlen = newpos - self.pos 78 r = self.db.get(self.key, txn=self.txn, dlen=dlen, doff=self.pos) 124 self.db.put(self.key, "", txn=self.txn, dlen=self.len-size, doff=size) 134 self.db.put(self.key, s, txn=self.txn, dlen=len(s), doff=self.pos)
|
/external/iproute2/tc/ |
tc_stab.c | 147 unsigned i, j, dlen; 149 dlen = RTA_PAYLOAD(tb[TCA_STAB_DATA]) / sizeof(__u16); 152 for (i = 0; i < dlen/12; i++) { 154 for (j = 0; i * 12 + j < dlen; j++)
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
binhex.py | 57 dlen = fp.tell() 61 return file, finfo, dlen, rlen 174 name, finfo, dlen, rlen = name_finfo_dlen_rlen 184 self.dlen = dlen 198 d4 = struct.pack('>ii', self.dlen, self.rlen) 220 self.dlen = self.dlen - len(data) 224 if self.dlen != 0: 419 self.dlen = struct.unpack('>l', rest[11:15])[0 [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
binhex.py | 57 dlen = fp.tell() 61 return file, finfo, dlen, rlen 174 name, finfo, dlen, rlen = name_finfo_dlen_rlen 184 self.dlen = dlen 198 d4 = struct.pack('>ii', self.dlen, self.rlen) 220 self.dlen = self.dlen - len(data) 224 if self.dlen != 0: 419 self.dlen = struct.unpack('>l', rest[11:15])[0 [all...] |
/external/openssh/ |
auth1.c | 119 u_int dlen; local 126 password = packet_get_string(&dlen); 138 memset(password, 0, dlen); 226 u_int dlen; local 228 response = packet_get_string(&dlen); 231 memset(response, 'r', dlen);
|
ssh-rsa.c | 46 u_int slen, dlen, len; local 62 EVP_DigestFinal(&md, digest, &dlen); 67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); 115 u_int len, dlen, modlen; local 169 EVP_DigestFinal(&md, digest, &dlen); 171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa);
|
ssh-keysign.c | 159 u_int slen, dlen; local 233 data = buffer_get_string(&b, &dlen); 234 if (valid_request(pw, host, &key, data, dlen) < 0) 249 if (key_sign(keys[i], &signature, &slen, data, dlen) != 0)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 161 size_t pad, dlen; local 182 dlen = avp_length - sizeof(*avp); 184 if (dlen < 4) { 193 dlen -= 4; 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 201 parse->eap = os_malloc(dlen); 208 os_memcpy(parse->eap, dpos, dlen); 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 159 DWORD dlen; local 206 dlen = 8; 207 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 294 DWORD dlen; local 297 dlen = 16; 298 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 326 DWORD dlen; local 329 dlen = 16; 331 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 593 DWORD dlen; local 610 DWORD dlen; local [all...] |
/external/chromium_org/courgette/third_party/ |
bsdiff_apply.cc | 49 if (!stream->ReadVarint32(&header->dlen)) return READ_ERROR; 83 if (header->dlen && !new_stream->Reserve(header->dlen))
|
/external/chromium_org/third_party/openssl/openssl/crypto/dsa/ |
dsa_asn1.c | 153 int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, 157 RAND_seed(dgst, dlen); 158 s=DSA_do_sign(dgst,dlen,dsa);
|
dsa_ossl.c | 69 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 131 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) 169 if (dlen > BN_num_bytes(dsa->q)) 173 dlen = BN_num_bytes(dsa->q); 174 if (BN_bin2bn(dgst,dlen,&m) == NULL)
|
/external/qemu/audio/ |
wavcapture.c | 35 uint8_t dlen[4]; local 41 le_store (dlen, datalen, 4); 47 qemu_put_buffer (wav->f, dlen, 4);
|
/frameworks/base/core/java/android/text/method/ |
DigitsKeyListener.java | 154 int dlen = dest.length(); local 169 for (int i = dend; i < dlen; i++) {
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/bsddb/test/ |
test_all.py | 101 def set_range(self, k, dlen=-1, doff=-1) : 104 v = self._dbcursor.set_range(k, dlen=dlen, doff=doff) 119 def put(self, key, data, flags=0, dlen=-1, doff=-1) : 124 return self._dbcursor.put(key, data, flags=flags, dlen=dlen, 127 def current(self, flags=0, dlen=-1, doff=-1) : 128 v = self._dbcursor.current(flags=flags, dlen=dlen, doff=doff) 265 def put(self, key, data, txn=None, flags=0, dlen=-1, doff=-1) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/bsddb/test/ |
test_all.py | 101 def set_range(self, k, dlen=-1, doff=-1) : 104 v = self._dbcursor.set_range(k, dlen=dlen, doff=doff) 119 def put(self, key, data, flags=0, dlen=-1, doff=-1) : 124 return self._dbcursor.put(key, data, flags=flags, dlen=dlen, 127 def current(self, flags=0, dlen=-1, doff=-1) : 128 v = self._dbcursor.current(flags=flags, dlen=dlen, doff=doff) 265 def put(self, key, data, txn=None, flags=0, dlen=-1, doff=-1) [all...] |
/external/openssh/openbsd-compat/ |
port-tun.c | 250 sys_tun_outfilter(struct Channel *c, u_char **data, u_int *dlen) 255 *data = buffer_get_string(&c->output, dlen); 256 if (*dlen < sizeof(*af)) 261 *dlen -= sizeof(u_int32_t);
|
/external/iputils/ninfod/ |
ni_ifaddrs.c | 319 size_t dlen, xlen; local 329 icnt = dlen = xlen = 0; 362 + dlen + xlen); 377 xdata = data + dlen; 465 dlen += NLMSG_ALIGN(rtapayload); 506 dlen += NLMSG_ALIGN(ifamap.address_len); 523 if (icnt == 0 && (dlen + xlen == 0)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 802 static int eap_ttls_parse_attr_eap(const u8 *dpos, size_t dlen, 807 parse->eapdata = os_malloc(dlen); 813 os_memcpy(parse->eapdata, dpos, dlen); 814 parse->eap_len = dlen; 816 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 822 os_memcpy(neweap + parse->eap_len, dpos, dlen); 824 parse->eap_len += dlen; 837 size_t dlen; local 862 dlen = avp_length - sizeof(*avp); 864 if (dlen < 4) [all...] |
/external/qemu/telephony/ |
sms.c | 501 int dlen, adjust = 0; local 520 for (dlen = 0; dlen < len; dlen+=1) 522 int c = cur[dlen]; 526 if (dlen >= sizeof(address->data)) { 536 address->data[dlen] = (byte_t) c; 543 address->len = 2*dlen + adjust; 582 int len, dlen; local 587 dlen = *cur++ 623 int dlen; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 1264 size_t i, dlen; local 1277 dlen = attr->length - sizeof(*attr); 1279 os_memcpy(buf, (attr + 1), dlen > len ? len : dlen); 1280 return dlen; 1344 size_t dlen; local 1427 size_t dlen; local [all...] |