/external/openssh/ |
msg.c | 48 u_int mlen = sshbuf_len(m); local 52 put_u32(buf, mlen + 1); 58 if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(m), mlen) != mlen) {
|
ssh-ed25519.c | 104 unsigned long long smlen = 0, mlen = 0; local 135 mlen = smlen; 136 if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) { 142 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen, 147 if (ret != 0 || mlen != datalen) { 160 explicit_bzero(m, smlen); /* NB mlen may be invalid if r != 0 */
|
ssh-pkcs11-client.c | 54 int mlen = buffer_len(m); local 56 put_u32(buf, mlen); 61 buffer_consume(m, mlen);
|
ssh-pkcs11-helper.c | 106 int mlen = buffer_len(m); local 108 buffer_put_int(&oqueue, mlen); 109 buffer_append(&oqueue, buffer_ptr(m), mlen); 110 buffer_consume(m, mlen);
|
monitor_wrap.c | 134 u_int mlen = buffer_len(m); local 139 put_u32(buf, mlen + 1); 143 if (atomicio(vwrite, sock, buffer_ptr(m), mlen) != mlen)
|
/bionic/libc/upstream-openbsd/lib/libc/stdio/ |
vswscanf.c | 59 size_t len, mlen; local 72 if ((mlen = wcsrtombs(mbstr, &strp, len, &mbs)) == (size_t)-1) { 76 if (mlen == len) 81 f._bf._size = f._r = mlen;
|
/external/tcpdump/ |
in_cksum.c | 61 register int mlen = 0; local 77 if (mlen == -1) { 89 mlen = vec->len - 1; 91 mlen = vec->len; 95 if ((1 & (unsigned long) w) && (mlen > 0)) { 100 mlen--; 107 while ((mlen -= 32) >= 0) { 114 mlen += 32; 115 while ((mlen -= 8) >= 0) { 119 mlen += 8 [all...] |
/system/core/libmincrypt/test/ |
ecdsa_test.c | 223 int mlen; local 234 message = parsehex(sig, &mlen); \ 235 int result = dsa_sig_unpack(message, mlen, &r, &s); \ 266 message = parsehex(message_##n, &mlen); \ 267 SHA256_hash(message, mlen, hash_buf); \
|
rsa_test.c | 803 int mlen; local [all...] |
/external/boringssl/src/crypto/modes/ |
gcm.c | 640 uint64_t mlen = ctx->len.u[1]; local 651 mlen += len; 652 if (mlen > ((OPENSSL_U64(1) << 36) - 32) || 653 (sizeof(len) == 8 && mlen < len)) { 656 ctx->len.u[1] = mlen; 800 uint64_t mlen = ctx->len.u[1]; local 811 mlen += len; 812 if (mlen > ((OPENSSL_U64(1) << 36) - 32) || 813 (sizeof(len) == 8 && mlen < len)) { 816 ctx->len.u[1] = mlen; 967 uint64_t mlen = ctx->len.u[1]; local 1077 uint64_t mlen = ctx->len.u[1]; local [all...] |
/external/boringssl/src/crypto/rsa/ |
padding.c | 454 unsigned i, dblen, mlen = -1, mdlen; local 527 mlen = dblen - one_index; 528 if (tlen < mlen) { 531 mlen = -1; 533 memcpy(to, db + one_index, mlen); 537 return mlen;
|
/external/ppp/pppd/ |
chap-new.c | 312 int response_len, ok, mlen; local 361 mlen = strlen(ss->message); 362 len = CHAP_HDRLEN + mlen; 367 if (mlen > 0) 368 memcpy(p + CHAP_HDRLEN, ss->message, mlen);
|
upap.c | 619 int mlen, ulen, wlen; local 664 mlen = p[0]; 665 if (len < mlen + 1) 668 p += mlen + 1; 669 len -= mlen + 1; 671 print_string(msg, mlen, printer, arg);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 497 size_t mlen; local 507 mlen = ((u8 *) &m->u - (u8 *) m) + data_len; 515 res = hostapd_drv_send_mlme(hapd, (u8 *) m, mlen, 0);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_pax.c | 333 u16 flen, mlen; local 343 mlen = wpabuf_len(reqData) - EAP_PAX_ICV_LEN; 412 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0, 416 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0,
|
eap_gpsk.c | 635 size_t mlen; local 639 mlen = eap_gpsk_mic_len(data->vendor, data->specifier); 641 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, 1 + 2 + mlen, 652 rpos = wpabuf_put(resp, mlen);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 189 size_t len, mlen; local 198 mlen = sizeof(struct eap_hdr) + 1 + len; 265 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN;
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_ndis.c | 116 size_t mlen = sizeof(*eth) + len; local 117 eth = os_malloc(mlen); 125 res = WriteFile(driver_ndis_get_ndisuio_handle(), eth, mlen,
|
l2_packet_pcap.c | 94 size_t mlen = sizeof(*eth) + len; local 95 eth = os_malloc(mlen); 105 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); 107 ret = eth_send(l2->eth, (u8 *) eth, mlen);
|
l2_packet_winpcap.c | 84 size_t mlen = sizeof(*eth) + len; local 85 eth = os_malloc(mlen); 93 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen);
|
/bionic/libc/upstream-netbsd/lib/libc/regex/ |
regex2.h | 199 size_t mlen; /* length of must */ member in struct:re_guts
|
/bootable/recovery/applypatch/ |
imgdiff.c | 235 int mlen = Read2(cd+32); // file comment len local 244 cd += 46 + nlen + xlen + mlen; [all...] |
/external/llvm/lib/Support/ |
regex2.h | 150 int mlen; /* length of must */ member in struct:re_guts
|
/external/toybox/toys/posix/ |
sed.c | 490 int mflags = 0, count = 0, zmatch = 1, rlen = len, mlen, off, newlen; local 497 mlen = match[0].rm_eo-match[0].rm_so; 498 if (!mlen && !zmatch) { 532 len += newlen-mlen; 539 for (off = mlen = 0; new[off]; off++) { 545 if (!(rswap[mlen++] = unescape(new[off]))) 546 rswap[mlen-1] = new[off]; 551 rswap[mlen++] = new[off]; 557 memcpy(rswap+mlen, rline+match[cc].rm_so, ll); 558 mlen += ll [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 325 size_t mlen; local 334 sizeof(*msg) + kde_len, &mlen, 375 mbuf, mlen, NULL); 382 size_t mlen; local 393 sizeof(*msg) + kde_len, &mlen, 430 peerkey->addr, ETH_P_EAPOL, mbuf, mlen, [all...] |