/external/tcpdump/ |
in_cksum.c | 61 register int mlen = 0; local 77 if (mlen == -1) { 89 mlen = vec->len - 1; 91 mlen = vec->len; 95 if ((1 & (unsigned long) w) && (mlen > 0)) { 100 mlen--; 107 while ((mlen -= 32) >= 0) { 114 mlen += 32; 115 while ((mlen -= 8) >= 0) { 119 mlen += 8 [all...] |
/external/ipsec-tools/src/racoon/ |
str2val.c | 51 val2str(buf, mlen) 53 size_t mlen; 56 size_t len = (mlen * 2) + mlen / 8 + 10; 61 for (i = 0, j = 0; i < mlen; i++) {
|
/external/openssh/ |
ed25519.c | 53 const unsigned char *m,unsigned long long mlen, 71 *smlen = mlen+64; 72 for(i=0;i<mlen;i++) 77 crypto_hash_sha512(hmg, sm+32, mlen+32); /* Generate k as h(extsk[32],...,extsk[63],m) */ 88 get_hram(hram, sm, sk+32, sm, mlen+64); 104 unsigned char *m,unsigned long long *mlen, 116 *mlen = (unsigned long long) -1; 136 *mlen = smlen-64;
|
msg.c | 48 u_int mlen = sshbuf_len(m); local 52 put_u32(buf, mlen + 1); 58 if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(m), mlen) != mlen) {
|
hmac.h | 31 int ssh_hmac_update(struct ssh_hmac_ctx *ctx, const void *m, size_t mlen)
|
digest.h | 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 62 int ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen)
|
ssh-ed25519.c | 104 unsigned long long smlen = 0, mlen = 0; local 135 mlen = smlen; 136 if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) { 142 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen, 147 if (ret != 0 || mlen != datalen) { 160 explicit_bzero(m, smlen); /* NB mlen may be invalid if r != 0 */
|
digest-openssl.c | 142 ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen) 144 if (EVP_DigestUpdate(&ctx->mdctx, m, mlen) != 1) 183 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) 195 if (!EVP_Digest(m, mlen, d, &mdlen, digest->mdfunc(), NULL))
|
digest-libc.c | 40 typedef void md_update_fn(void *mdctx, const u_int8_t *m, size_t mlen); 198 ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen) 204 digest->md_update(ctx->mdctx, m, mlen); 246 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) 252 if (ssh_digest_update(ctx, m, mlen) != 0 ||
|
hmac.c | 93 ssh_hmac_update(struct ssh_hmac_ctx *ctx, const void *m, size_t mlen) 95 return ssh_digest_update(ctx->digest, m, mlen); 141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) 150 ssh_hmac_update(ctx, m, mlen) < 0 ||
|
ssh-pkcs11-helper.c | 106 int mlen = buffer_len(m); local 108 buffer_put_int(&oqueue, mlen); 109 buffer_append(&oqueue, buffer_ptr(m), mlen); 110 buffer_consume(m, mlen);
|
ssh-pkcs11-client.c | 54 int mlen = buffer_len(m); local 56 put_u32(buf, mlen); 61 buffer_consume(m, mlen);
|
/bionic/libc/upstream-openbsd/lib/libc/stdio/ |
vswscanf.c | 59 size_t len, mlen; local 72 if ((mlen = wcsrtombs(mbstr, &strp, len, &mbs)) == (size_t)-1) { 76 if (mlen == len) 81 f._bf._size = f._r = mlen;
|
/bionic/libc/kernel/uapi/scsi/ |
scsi_netlink.h | 57 #define INIT_SCSI_NL_HDR(hdr,t,mtype,mlen) { (hdr)->version = SCSI_NL_VERSION; (hdr)->transport = t; (hdr)->magic = SCSI_NL_MAGIC; (hdr)->msgtype = mtype; (hdr)->msglen = mlen; }
|
/external/kernel-headers/original/uapi/scsi/ |
scsi_netlink.h | 113 #define INIT_SCSI_NL_HDR(hdr, t, mtype, mlen) \ 119 (hdr)->msglen = mlen; \
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_fs_visitor.cpp | 595 pull->mlen = 1; 753 int mlen; local 759 mlen = 1; 763 emit(BRW_OPCODE_MOV, fs_reg(MRF, base_mrf + mlen + i), coordinate); 767 mlen += 3; 773 emit(BRW_OPCODE_MOV, fs_reg(MRF, base_mrf + mlen), fs_reg(0.0f)); 774 mlen++; 776 emit(BRW_OPCODE_MOV, fs_reg(MRF, base_mrf + mlen), lod); 777 mlen++; 782 emit(BRW_OPCODE_MOV, fs_reg(MRF, base_mrf + mlen), shadow_c) 922 int mlen = 0; local 1042 int mlen = 0; local [all...] |
brw_fs_emit.cpp | 109 inst->mlen, 172 assert(inst->mlen == 0); 186 assert(inst->mlen == 0); 197 assert(inst->mlen == 0); 225 assert(inst->mlen == 0); 244 assert(inst->mlen >= 1); 339 assert(inst->mlen == 6); 341 assert(inst->mlen <= 4); 346 assert(inst->mlen == 6); 349 assert(inst->mlen == 9) [all...] |
/system/core/libmincrypt/test/ |
ecdsa_test.c | 223 int mlen; local 234 message = parsehex(sig, &mlen); \ 235 int result = dsa_sig_unpack(message, mlen, &r, &s); \ 266 message = parsehex(message_##n, &mlen); \ 267 SHA256_hash(message, mlen, hash_buf); \
|
rsa_test.c | 803 int mlen; local [all...] |
/external/ppp/pppd/include/net/ |
vjcompress.h | 134 extern u_int vj_compress_tcp __P((struct ip *ip, u_int mlen,
|
/external/ppp/pppd/ |
upap.c | 619 int mlen, ulen, wlen; local 664 mlen = p[0]; 665 if (len < mlen + 1) 668 p += mlen + 1; 669 len -= mlen + 1; 671 print_string(msg, mlen, printer, arg);
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_pcap.c | 94 size_t mlen = sizeof(*eth) + len; local 95 eth = os_malloc(mlen); 105 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); 107 ret = eth_send(l2->eth, (u8 *) eth, mlen);
|
/external/boringssl/src/crypto/modes/ |
gcm.c | 640 uint64_t mlen = ctx->len.u[1]; local 651 mlen += len; 652 if (mlen > ((OPENSSL_U64(1) << 36) - 32) || 653 (sizeof(len) == 8 && mlen < len)) { 656 ctx->len.u[1] = mlen; 800 uint64_t mlen = ctx->len.u[1]; local 811 mlen += len; 812 if (mlen > ((OPENSSL_U64(1) << 36) - 32) || 813 (sizeof(len) == 8 && mlen < len)) { 816 ctx->len.u[1] = mlen; 967 uint64_t mlen = ctx->len.u[1]; local 1077 uint64_t mlen = ctx->len.u[1]; local [all...] |
/external/toybox/toys/posix/ |
sed.c | 490 int mflags = 0, count = 0, zmatch = 1, rlen = len, mlen, off, newlen; local 497 mlen = match[0].rm_eo-match[0].rm_so; 498 if (!mlen && !zmatch) { 532 len += newlen-mlen; 539 for (off = mlen = 0; new[off]; off++) { 545 if (!(rswap[mlen++] = unescape(new[off]))) 546 rswap[mlen-1] = new[off]; 551 rswap[mlen++] = new[off]; 557 memcpy(rswap+mlen, rline+match[cc].rm_so, ll); 558 mlen += ll [all...] |
/external/boringssl/src/crypto/rsa/ |
padding.c | 454 unsigned i, dblen, mlen = -1, mdlen; local 527 mlen = dblen - one_index; 528 if (tlen < mlen) { 531 mlen = -1; 533 memcpy(to, db + one_index, mlen); 537 return mlen;
|