/external/openssh/ |
H A D | kexdhc.c | 55 u_int klen, slen, sbloblen, hashlen; local 110 signature = packet_get_string(&slen); 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
|
H A D | kexdhs.c | 57 u_int sbloblen, klen, hashlen, slen; local 147 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, hash, 157 packet_put_string(signature, slen);
|
H A D | kexecdhc.c | 59 u_int klen, slen, sbloblen, hashlen; local 109 signature = packet_get_string(&slen); 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
|
H A D | kexecdhs.c | 61 u_int klen, slen, sbloblen, hashlen; local 145 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, 155 packet_put_string(signature, slen);
|
H A D | kexgexc.c | 56 u_int klen, slen, sbloblen, hashlen; local 148 signature = packet_get_string(&slen); 192 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
|
H A D | auth2-hostbased.c | 63 u_int alen, blen, slen; local 75 sig = packet_get_string(&slen); 77 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 78 cuser, chost, pkalg, slen); 82 buffer_append(&b, sig, slen); 122 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b),
|
H A D | kexgexs.c | 60 u_int sbloblen, klen, slen, hashlen; local 190 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, hash, 201 packet_put_string(signature, slen);
|
H A D | ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 74 slen = BN_num_bytes(sig->s); 75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { 76 error("bad sig size %u %u", rlen, slen); 82 BN_bn2bin(sig->s, sigblob+ SIGBLOB_LEN - slen);
|
H A D | ssh-keysign.c | 159 u_int slen, dlen; local 249 if (key_sign(keys[i], &signature, &slen, data, dlen) != 0) 255 buffer_put_string(&b, signature, slen);
|
H A D | ssh-pkcs11-client.c | 109 u_int blen, slen = 0; local 128 signature = buffer_get_string(&msg, &slen); 129 if (slen <= (u_int)RSA_size(rsa)) { 130 memcpy(to, signature, slen); 131 ret = slen;
|
/external/openssh/openbsd-compat/ |
H A D | mktemp.c | 51 mkstemps(char *path, int slen) argument 55 return (_gettemp(path, &fd, 0, slen) ? fd : -1); 73 _gettemp(path, doopen, domkdir, slen) 77 int slen; 91 trv -= slen;
|
H A D | realpath.c | 58 int serrno, slen; local 150 slen = readlink(resolved, symlink, sizeof(symlink) - 1); 151 if (slen < 0) 153 symlink[slen] = '\0'; 171 if (symlink[slen - 1] != '/') { 172 if (slen + 1 >= sizeof(symlink)) { 176 symlink[slen] = '/'; 177 symlink[slen + 1] = 0;
|
/external/chromium/base/ |
H A D | file_util_android.cc | 23 mkstemps(char *path, int slen) argument 27 return (_gettemp(path, &fd, 0, slen) ? fd : -1); 65 _gettemp(char *path, int *doopen, int domkdir, int slen) argument 79 trv -= slen;
|
/external/libselinux/src/ |
H A D | label_internal.h | 36 int slen; member in struct:selabel_sub
|
/external/dropbear/ |
H A D | rsa.c | 219 unsigned int slen; local 231 slen = buf_getint(buf); 232 if (slen != (unsigned int)mp_unsigned_bin_size(key->n)) {
|
/external/harfbuzz/src/ |
H A D | harfbuzz-hebrew.c | 78 int slen = 1; local 137 shapedChars[slen] = 0x25cc; 138 attributes[slen].clusterStart = TRUE; 139 attributes[slen].mark = FALSE; 140 attributes[slen].combiningClass = 0; 141 cluster_start = slen; 142 ++slen; 153 shapedChars[slen] = uc[i]; 156 attributes[slen].clusterStart = TRUE; 157 attributes[slen] [all...] |
H A D | harfbuzz-greek.c | 364 int slen = 1; local 376 hb_uint16 base = shapedChars[slen-1]; 399 shapedChars[slen-1] = shaped; 408 shapedChars[slen] = uc[i]; 411 attributes[slen].clusterStart = TRUE; 412 attributes[slen].mark = FALSE; 413 attributes[slen].combiningClass = 0; 414 attributes[slen].dontPrint = HB_IsControlChar(uc[i]); 415 cluster_start = slen; 417 attributes[slen] [all...] |
/external/openssl/crypto/asn1/ |
H A D | f_enum.c | 105 int num=0,slen=0,first=1; local 153 if (num+i > slen) 168 slen=num+i*2;
|
H A D | f_int.c | 109 int num=0,slen=0,first=1; local 166 if (num+i > slen) 172 sp=OPENSSL_realloc_clean(s,slen,num+i*2); 180 slen=num+i*2;
|
H A D | f_string.c | 103 int num=0,slen=0,first=1; local 158 if (num+i > slen) 173 slen=num+i*2;
|
/external/openssl/crypto/pem/ |
H A D | pem_pkey.c | 81 int slen; local 122 } else if ((slen = pem_check_suffix(nm, "PRIVATE KEY")) > 0) 125 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); 161 int slen; local 169 if ((slen = pem_check_suffix(nm, "PARAMETERS")) > 0) 174 if (!EVP_PKEY_set_type_str(ret, nm, slen)
|
/external/dnsmasq/src/ |
H A D | netlink.c | 42 socklen_t slen = sizeof(addr); local 65 getsockname(daemon->netlinkfd, (struct sockaddr *)&addr, &slen) == 1)
|
/external/icu4c/test/intltest/ |
H A D | mnkytst.cpp | 82 int32_t slen = checkValue((rand() - source.length()) % source.length()); local 86 source.extract(MIN(s, slen), MAX(s, slen), subs); 157 int32_t slen = checkValue((rand() - source.length()) % source.length()); local 161 source.extract(MIN(s, slen), MAX(s, slen), subs);
|
/external/chromium/sdch/open-vcdiff/src/ |
H A D | gflags_reporting.cc | 100 const int slen = static_cast<int>(s.length()); local 101 if (*chars_in_line + 1 + slen >= kLineLength) { // < 80 chars/line 109 *chars_in_line += slen;
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | stringutils.h | 179 const CTYPE* strchrn(const CTYPE* str, size_t slen, CTYPE ch) { argument 180 for (size_t i=0; i<slen && str[i]; ++i) {
|