HomeSort by relevance Sort by last modified time
    Searched defs:mlen (Results 1 - 25 of 50) sorted by null

1 2

  /external/openssh/
msg.c 48 u_int mlen = sshbuf_len(m); local
52 put_u32(buf, mlen + 1);
58 if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(m), mlen) != mlen) {
ssh-ed25519.c 104 unsigned long long smlen = 0, mlen = 0; local
135 mlen = smlen;
136 if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) {
142 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen,
147 if (ret != 0 || mlen != datalen) {
160 explicit_bzero(m, smlen); /* NB mlen may be invalid if r != 0 */
ssh-pkcs11-client.c 54 int mlen = buffer_len(m); local
56 put_u32(buf, mlen);
61 buffer_consume(m, mlen);
ssh-pkcs11-helper.c 106 int mlen = buffer_len(m); local
108 buffer_put_int(&oqueue, mlen);
109 buffer_append(&oqueue, buffer_ptr(m), mlen);
110 buffer_consume(m, mlen);
monitor_wrap.c 134 u_int mlen = buffer_len(m); local
139 put_u32(buf, mlen + 1);
143 if (atomicio(vwrite, sock, buffer_ptr(m), mlen) != mlen)
  /bionic/libc/upstream-openbsd/lib/libc/stdio/
vswscanf.c 59 size_t len, mlen; local
72 if ((mlen = wcsrtombs(mbstr, &strp, len, &mbs)) == (size_t)-1) {
76 if (mlen == len)
81 f._bf._size = f._r = mlen;
  /external/tcpdump/
in_cksum.c 61 register int mlen = 0; local
77 if (mlen == -1) {
89 mlen = vec->len - 1;
91 mlen = vec->len;
95 if ((1 & (unsigned long) w) && (mlen > 0)) {
100 mlen--;
107 while ((mlen -= 32) >= 0) {
114 mlen += 32;
115 while ((mlen -= 8) >= 0) {
119 mlen += 8
    [all...]
  /system/core/libmincrypt/test/
ecdsa_test.c 223 int mlen; local
234 message = parsehex(sig, &mlen); \
235 int result = dsa_sig_unpack(message, mlen, &r, &s); \
266 message = parsehex(message_##n, &mlen); \
267 SHA256_hash(message, mlen, hash_buf); \
rsa_test.c 803 int mlen; local
    [all...]
  /external/boringssl/src/crypto/modes/
gcm.c 640 uint64_t mlen = ctx->len.u[1]; local
651 mlen += len;
652 if (mlen > ((OPENSSL_U64(1) << 36) - 32) ||
653 (sizeof(len) == 8 && mlen < len)) {
656 ctx->len.u[1] = mlen;
800 uint64_t mlen = ctx->len.u[1]; local
811 mlen += len;
812 if (mlen > ((OPENSSL_U64(1) << 36) - 32) ||
813 (sizeof(len) == 8 && mlen < len)) {
816 ctx->len.u[1] = mlen;
967 uint64_t mlen = ctx->len.u[1]; local
1077 uint64_t mlen = ctx->len.u[1]; local
    [all...]
  /external/boringssl/src/crypto/rsa/
padding.c 454 unsigned i, dblen, mlen = -1, mdlen; local
527 mlen = dblen - one_index;
528 if (tlen < mlen) {
531 mlen = -1;
533 memcpy(to, db + one_index, mlen);
537 return mlen;
  /external/ppp/pppd/
chap-new.c 312 int response_len, ok, mlen; local
361 mlen = strlen(ss->message);
362 len = CHAP_HDRLEN + mlen;
367 if (mlen > 0)
368 memcpy(p + CHAP_HDRLEN, ss->message, mlen);
upap.c 619 int mlen, ulen, wlen; local
664 mlen = p[0];
665 if (len < mlen + 1)
668 p += mlen + 1;
669 len -= mlen + 1;
671 print_string(msg, mlen, printer, arg);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_glue.c 497 size_t mlen; local
507 mlen = ((u8 *) &m->u - (u8 *) m) + data_len;
515 res = hostapd_drv_send_mlme(hapd, (u8 *) m, mlen, 0);
  /external/wpa_supplicant_8/src/eap_peer/
eap_pax.c 333 u16 flen, mlen; local
343 mlen = wpabuf_len(reqData) - EAP_PAX_ICV_LEN;
412 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0,
416 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0,
eap_gpsk.c 635 size_t mlen; local
639 mlen = eap_gpsk_mic_len(data->vendor, data->specifier);
641 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, 1 + 2 + mlen,
652 rpos = wpabuf_put(resp, mlen);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 189 size_t len, mlen; local
198 mlen = sizeof(struct eap_hdr) + 1 + len;
265 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN;
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_ndis.c 116 size_t mlen = sizeof(*eth) + len; local
117 eth = os_malloc(mlen);
125 res = WriteFile(driver_ndis_get_ndisuio_handle(), eth, mlen,
l2_packet_pcap.c 94 size_t mlen = sizeof(*eth) + len; local
95 eth = os_malloc(mlen);
105 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen);
107 ret = eth_send(l2->eth, (u8 *) eth, mlen);
l2_packet_winpcap.c 84 size_t mlen = sizeof(*eth) + len; local
85 eth = os_malloc(mlen);
93 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen);
  /bionic/libc/upstream-netbsd/lib/libc/regex/
regex2.h 199 size_t mlen; /* length of must */ member in struct:re_guts
  /bootable/recovery/applypatch/
imgdiff.c 235 int mlen = Read2(cd+32); // file comment len local
244 cd += 46 + nlen + xlen + mlen;
    [all...]
  /external/llvm/lib/Support/
regex2.h 150 int mlen; /* length of must */ member in struct:re_guts
  /external/toybox/toys/posix/
sed.c 490 int mflags = 0, count = 0, zmatch = 1, rlen = len, mlen, off, newlen; local
497 mlen = match[0].rm_eo-match[0].rm_so;
498 if (!mlen && !zmatch) {
532 len += newlen-mlen;
539 for (off = mlen = 0; new[off]; off++) {
545 if (!(rswap[mlen++] = unescape(new[off])))
546 rswap[mlen-1] = new[off];
551 rswap[mlen++] = new[off];
557 memcpy(rswap+mlen, rline+match[cc].rm_so, ll);
558 mlen += ll
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 325 size_t mlen; local
334 sizeof(*msg) + kde_len, &mlen,
375 mbuf, mlen, NULL);
382 size_t mlen; local
393 sizeof(*msg) + kde_len, &mlen,
430 peerkey->addr, ETH_P_EAPOL, mbuf, mlen,
    [all...]

Completed in 681 milliseconds

1 2