/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
H A D | der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; local 77 blen = ((dlen - 1) << 3) - (in[x++] & 7); 80 if (blen > *outlen) { 81 *outlen = blen; 86 for (y = 0; y < blen; y++) { 94 *outlen = blen;
|
/external/iproute2/lib/ |
H A D | ll_addr.c | 32 const char *ll_addr_n2a(unsigned char *addr, int alen, int type, char *buf, int blen) argument 39 return inet_ntop(AF_INET, addr, buf, blen); 42 return inet_ntop(AF_INET6, addr, buf, blen); 47 snprintf(buf+l, blen, "%02x", addr[i]); 48 blen -= 2; 51 snprintf(buf+l, blen, ":%02x", addr[i]); 52 blen -= 3;
|
H A D | utils.c | 631 char *hexstring_n2a(const __u8 *str, int len, char *buf, int blen) argument 637 if (blen < 3) 641 blen -= 2; 642 if (i != len-1 && blen > 1) { 644 blen--; 650 __u8* hexstring_a2n(const char *str, __u8 *buf, int blen) argument 675 if (cnt < blen) { 683 if (cnt < blen) 684 memset(buf+cnt, 0, blen-cnt);
|
/external/openssh/ |
H A D | auth2-hostbased.c | 63 u_int alen, blen, slen; local 72 pkblob = packet_get_string(&blen); 93 key = key_from_blob(pkblob, blen); 113 buffer_put_string(&b, pkblob, blen);
|
H A D | ssh-keysign.c | 68 u_int blen, len; local 103 pkblob = buffer_get_string(&b, &blen); 108 else if ((key = key_from_blob(pkblob, blen)) == NULL)
|
H A D | ssh-pkcs11-client.c | 109 u_int blen, slen = 0; local 117 if (key_to_blob(&key, &blob, &blen) == 0) 121 buffer_put_string(&msg, blob, blen); 188 u_int blen; local 205 blob = buffer_get_string(&msg, &blen); 207 k = key_from_blob(blob, blen);
|
H A D | auth2-pubkey.c | 74 u_int alen, blen, slen; local 86 pkblob = packet_get_string(&blen); 88 buffer_append(&b, pkblob, blen); 94 pkblob = packet_get_string(&blen); 103 key = key_from_blob(pkblob, blen); 136 buffer_put_string(&b, pkblob, blen); 163 packet_put_string(pkblob, blen);
|
H A D | ssh-pkcs11-helper.c | 120 u_int blen; local 130 key_to_blob(keys[i], &blob, &blen); 131 buffer_put_string(&msg, blob, blen); 170 u_int blen, dlen, slen = 0; local 175 blob = get_string(&blen); 179 if ((key = key_from_blob(blob, blen)) != NULL) {
|
H A D | authfd.c | 319 u_int blen; local 343 blob = buffer_get_string(&auth->identities, &blen); 345 key = key_from_blob(blob, blen); 424 u_int blen; local 428 if (key_to_blob(key, &blob, &blen) == 0) 436 buffer_put_string(&msg, blob, blen); 600 u_int blen; local 612 key_to_blob(key, &blob, &blen); 614 buffer_put_string(&msg, blob, blen);
|
H A D | authfile.c | 173 int blen, len = strlen(_passphrase); local 208 if ((blen = BIO_get_mem_data(bio, &bptr)) <= 0) 211 buffer_append(blob, bptr, blen);
|
/external/openssl/crypto/dh/ |
H A D | dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 178 blen=DH_size(b); 179 bbuf=(unsigned char *)OPENSSL_malloc(blen);
|
/external/ipsec-tools/src/racoon/ |
H A D | policy.c | 444 int blen, i; local 446 blen = sizeof(buf) - 1; 456 i = snprintf(p, blen, "%s/%d[%s ", a, spidx->prefs, b); 457 if (i < 0 || i >= blen) 460 blen -= i; 469 i = snprintf(p, blen, "%s/%d[%s ", a, spidx->prefd, b); 470 if (i < 0 || i >= blen) 473 blen -= i; 475 i = snprintf(p, blen, "proto=%s dir=%s", 481 blen [all...] |
/external/openssl/crypto/bio/ |
H A D | bss_mem.c | 172 int blen; local 188 blen=bm->length; 189 if (BUF_MEM_grow_clean(bm,blen+inl) != (blen+inl)) 191 memcpy(&(bm->data[blen]),in,inl);
|
/external/openssl/crypto/ecdh/ |
H A D | ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; local 226 blen=KDF1_SHA1_len; 227 bbuf=(unsigned char *)OPENSSL_malloc(blen); 228 bout=ECDH_compute_key(bbuf,blen,EC_KEY_get0_public_key(a),b,KDF1_SHA1);
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | edit_readline.c | 131 size_t blen = os_strlen(ps) + 3; local 132 char *ps2 = os_malloc(blen); 134 os_snprintf(ps2, blen, "%s> ", ps);
|
H A D | wpabuf.c | 271 size_t blen; local 276 blen = wpabuf_len(buf); 277 if (blen >= len) 282 os_memset(wpabuf_put(ret, len - blen), 0, len - blen);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | edit_readline.c | 131 size_t blen = os_strlen(ps) + 3; local 132 char *ps2 = os_malloc(blen); 134 os_snprintf(ps2, blen, "%s> ", ps);
|
H A D | wpabuf.c | 271 size_t blen; local 276 blen = wpabuf_len(buf); 277 if (blen >= len) 282 os_memset(wpabuf_put(ret, len - blen), 0, len - blen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | edit_readline.c | 131 size_t blen = os_strlen(ps) + 3; local 132 char *ps2 = os_malloc(blen); 134 os_snprintf(ps2, blen, "%s> ", ps);
|
H A D | wpabuf.c | 271 size_t blen; local 276 blen = wpabuf_len(buf); 277 if (blen >= len) 282 os_memset(wpabuf_put(ret, len - blen), 0, len - blen);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | win_if_list.c | 77 size_t blen = sizeof(*b) + 1024; local 84 b = malloc(blen); 89 memset(b, 0, blen); 93 (DWORD) blen, &written, NULL)) {
|
/external/svox/pico/lib/ |
H A D | picowa.c | 399 picoos_uint16 blen; local 402 wa->inBufSize, &blen); 406 wa->inLen = blen;
|
/external/grub/netboot/ |
H A D | sk_g16.h | 146 volatile short blen; /* Buffer Length (two's complement) */ member in struct:rmd 164 unsigned short blen; /* Buffer Length (two's complement) */ member in struct:tmd
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_helpers.c | 134 size_t blen = registered_sig + MAX_SIG_LEN - pos; local 135 ret = os_snprintf(pos, blen, "%s", arg->type); 136 if (ret < 0 || (size_t) ret >= blen)
|
/external/openssl/crypto/asn1/ |
H A D | asn_mime.c | 103 static int mime_bound_check(char *line, int linelen, char *bound, int blen); 611 int len, blen; local 617 blen = strlen(bound); 624 state = mime_bound_check(linebuf, len, bound, blen); 921 static int mime_bound_check(char *line, int linelen, char *bound, int blen) argument 924 if(blen == -1) blen = strlen(bound); 926 if(blen + 2 > linelen) return 0; 928 if(!strncmp(line, "--", 2) && !strncmp(line + 2, bound, blen)) { 929 if(!strncmp(line + blen [all...] |