/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
H A D | der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; local 62 dlen = 0; 64 dlen = (dlen << 8) | (unsigned long)in[x++]; 68 dlen = in[x++] & 0x7F; 72 if ((dlen == 0) || (dlen + x > inlen)) { 77 blen = ((dlen - 1) << 3) - (in[x++] & 7);
|
/external/tcpdump/missing/ |
H A D | strlcat.c | 56 size_t dlen; local 61 dlen = d - dst; 62 n = siz - dlen; 65 return(dlen + strlen(s)); 75 return(dlen + (s - src)); /* count does not include NUL */
|
/external/openssl/crypto/ecdsa/ |
H A D | ecs_sign.c | 62 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) argument 64 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); 67 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, argument 73 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 76 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char argument 79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 82 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char argument 87 RAND_seed(dgst, dlen); 88 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
|
/external/openssl/crypto/dsa/ |
H A D | dsa_sign.c | 65 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument 67 return dsa->meth->dsa_do_sign(dgst, dlen, dsa); 70 int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, argument 74 RAND_seed(dgst, dlen); 75 s=DSA_do_sign(dgst,dlen,dsa);
|
H A D | dsa_ossl.c | 69 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 131 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument 167 if (dlen > BN_num_bytes(dsa->q)) 171 dlen = BN_num_bytes(dsa->q); 172 if (BN_bin2bn(dgst,dlen,&m) == NULL)
|
H A D | dsa.h | 117 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 182 DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa); 200 int DSA_sign(int type,const unsigned char *dgst,int dlen,
|
/external/dropbear/ |
H A D | compat.c | 135 size_t dlen; local 140 dlen = d - dst; 141 n = siz - dlen; 144 return(dlen + strlen(s)); 154 return(dlen + (s - src)); /* count does not include NUL */
|
/external/skia/src/effects/ |
H A D | SkDashPathEffect.cpp | 113 SkScalar dlen = SkScalarMul(fInitialDashLength, scale); local 116 SkASSERT(dlen >= 0); 118 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 120 meas.getSegment(distance, distance + dlen, dst, true); 122 distance += dlen; 134 // fetch our next dlen 135 dlen = SkScalarMul(intervals[index], scale);
|
/external/iproute2/tc/ |
H A D | tc_stab.c | 147 unsigned i, j, dlen; 149 dlen = RTA_PAYLOAD(tb[TCA_STAB_DATA]) / sizeof(__u16); 152 for (i = 0; i < dlen/12; i++) { 154 for (j = 0; i * 12 + j < dlen; j++)
|
H A D | m_ematch.c | 371 int dlen; local 378 dlen = RTA_PAYLOAD(tb[i]) - sizeof(*hdr); 381 if (dlen < 0) 392 if (dlen < sizeof(__u32)) 414 if (e->print_eopt(fd, hdr, data, dlen) < 0)
|
/external/wpa_supplicant/ |
H A D | crypto_cryptoapi.c | 182 DWORD dlen; local 229 dlen = 8; 230 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 318 DWORD dlen; local 321 dlen = 16; 322 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 350 DWORD dlen; local 353 dlen = 16; 355 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 618 DWORD dlen; local 635 DWORD dlen; local [all...] |
H A D | radius.c | 1097 size_t i, dlen; local 1109 dlen = attr->length - sizeof(*attr); 1111 os_memcpy(buf, (attr + 1), dlen > len ? len : dlen); 1112 return dlen; 1175 size_t dlen; local 1182 dlen = attr->length - sizeof(*attr); 1207 dlen--; 1209 if (dlen >= sizeof(buf)) 1211 os_memcpy(buf, data, dlen); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_cryptoapi.c | 167 DWORD dlen; local 214 dlen = 8; 215 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 303 DWORD dlen; local 306 dlen = 16; 307 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 335 DWORD dlen; local 338 dlen = 16; 340 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 603 DWORD dlen; local 620 DWORD dlen; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_cryptoapi.c | 165 DWORD dlen; local 212 dlen = 8; 213 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 300 DWORD dlen; local 303 dlen = 16; 304 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 332 DWORD dlen; local 335 dlen = 16; 337 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 599 DWORD dlen; local 616 DWORD dlen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_cryptoapi.c | 165 DWORD dlen; local 212 dlen = 8; 213 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 300 DWORD dlen; local 303 dlen = 16; 304 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 332 DWORD dlen; local 335 dlen = 16; 337 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 599 DWORD dlen; local 616 DWORD dlen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_cryptoapi.c | 165 DWORD dlen; local 212 dlen = 8; 213 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 300 DWORD dlen; local 303 dlen = 16; 304 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 332 DWORD dlen; local 335 dlen = 16; 337 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 599 DWORD dlen; local 616 DWORD dlen; local [all...] |
/external/qemu/audio/ |
H A D | wavcapture.c | 35 uint8_t dlen[4]; local 41 le_store (dlen, datalen, 4); 47 qemu_put_buffer (wav->f, dlen, 4);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_ttls.c | 179 size_t pad, dlen; local 200 dlen = avp_length - sizeof(*avp); 202 if (dlen < 4) { 211 dlen -= 4; 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 219 parse->eap = os_malloc(dlen); 226 os_memcpy(parse->eap, dpos, dlen); 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 179 size_t pad, dlen; local 200 dlen = avp_length - sizeof(*avp); 202 if (dlen < 4) { 211 dlen -= 4; 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 219 parse->eap = os_malloc(dlen); 226 os_memcpy(parse->eap, dpos, dlen); 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 179 size_t pad, dlen; local 200 dlen = avp_length - sizeof(*avp); 202 if (dlen < 4) { 211 dlen -= 4; 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 219 parse->eap = os_malloc(dlen); 226 os_memcpy(parse->eap, dpos, dlen); 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 179 size_t pad, dlen; local 200 dlen = avp_length - sizeof(*avp); 202 if (dlen < 4) { 211 dlen -= 4; 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 219 parse->eap = os_malloc(dlen); 226 os_memcpy(parse->eap, dpos, dlen); 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/qemu/telephony/ |
H A D | sms.c | 501 int dlen, adjust = 0; local 520 for (dlen = 0; dlen < len; dlen+=1) 522 int c = cur[dlen]; 526 if (dlen >= sizeof(address->data)) { 536 address->data[dlen] = (byte_t) c; 543 address->len = 2*dlen + adjust; 582 int len, dlen; local 587 dlen 623 int dlen; local [all...] |
/external/openssl/include/openssl/ |
H A D | dsa.h | 117 DSA_SIG * (*dsa_do_sign)(const unsigned char *dgst, int dlen, DSA *dsa); 182 DSA_SIG * DSA_do_sign(const unsigned char *dgst,int dlen,DSA *dsa); 200 int DSA_sign(int type,const unsigned char *dgst,int dlen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.c | 1101 size_t i, dlen; local 1114 dlen = attr->length - sizeof(*attr); 1116 os_memcpy(buf, (attr + 1), dlen > len ? len : dlen); 1117 return dlen; 1181 size_t dlen; local 1188 dlen = attr->length - sizeof(*attr); 1212 dlen--; 1214 if (dlen >= sizeof(buf)) 1216 os_memcpy(buf, data, dlen); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 1065 static int eap_ttls_parse_attr_eap(const u8 *dpos, size_t dlen, argument 1070 parse->eapdata = os_malloc(dlen); 1076 os_memcpy(parse->eapdata, dpos, dlen); 1077 parse->eap_len = dlen; 1079 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 1085 os_memcpy(neweap + parse->eap_len, dpos, dlen); 1087 parse->eap_len += dlen; 1100 size_t dlen; local 1125 dlen = avp_length - sizeof(*avp); 1127 if (dlen < [all...] |