/external/openssh/ |
H A D | ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 73 rlen = BN_num_bytes(sig->r); 75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { 76 error("bad sig size %u %u", rlen, slen); 81 BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen); 117 int rlen, ret; local 145 rlen = buffer_len(&b); 147 if (rlen != 0) { 149 "remaining bytes in signature %d", rlen);
|
H A D | ssh-ecdsa.c | 104 int rlen, ret; local 127 rlen = buffer_len(&b); 129 if (rlen != 0) { 130 error("%s: remaining bytes in signature %d", __func__, rlen);
|
H A D | ssh-rsa.c | 116 int rlen, ret, nid; local 139 rlen = buffer_len(&b); 141 if (rlen != 0) { 142 error("ssh_rsa_verify: remaining bytes in signature %d", rlen);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp(pos, sm->user->password, rlen) ! [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp(pos, sm->user->password, rlen) ! [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp(pos, sm->user->password, rlen) ! [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server_write.c | 47 size_t rlen; local 142 &rlen) < 0) { 148 pos = rhdr + rlen; 160 size_t rlen; local 227 &rlen) < 0) { 233 pos = rhdr + rlen; 249 size_t rlen; local 419 &rlen) < 0) { 425 pos = rhdr + rlen; 439 size_t rlen; local 505 size_t rlen; local 541 size_t rlen; local 575 size_t rlen, hlen; local [all...] |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
H A D | tlsv1_client_write.c | 133 size_t rlen; local 192 &rlen) < 0) { 198 pos = rhdr + rlen; 375 size_t rlen; local 414 &rlen) < 0) { 420 pos = rhdr + rlen; 433 size_t rlen, hlen, clen; local 591 &rlen) < 0) { 597 pos = rhdr + rlen; 610 size_t rlen; local 644 size_t rlen, hlen; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server_write.c | 47 size_t rlen; local 142 &rlen) < 0) { 148 pos = rhdr + rlen; 160 size_t rlen; local 227 &rlen) < 0) { 233 pos = rhdr + rlen; 249 size_t rlen; local 419 &rlen) < 0) { 425 pos = rhdr + rlen; 439 size_t rlen; local 505 size_t rlen; local 541 size_t rlen; local 575 size_t rlen, hlen; local [all...] |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
H A D | tlsv1_client_write.c | 133 size_t rlen; local 192 &rlen) < 0) { 198 pos = rhdr + rlen; 375 size_t rlen; local 414 &rlen) < 0) { 420 pos = rhdr + rlen; 433 size_t rlen, hlen, clen; local 591 &rlen) < 0) { 597 pos = rhdr + rlen; 610 size_t rlen; local 644 size_t rlen, hlen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_write.c | 47 size_t rlen; local 142 &rlen) < 0) { 148 pos = rhdr + rlen; 160 size_t rlen; local 227 &rlen) < 0) { 233 pos = rhdr + rlen; 249 size_t rlen; local 419 &rlen) < 0) { 425 pos = rhdr + rlen; 439 size_t rlen; local 505 size_t rlen; local 541 size_t rlen; local 575 size_t rlen, hlen; local [all...] |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
H A D | tlsv1_client_write.c | 133 size_t rlen; local 192 &rlen) < 0) { 198 pos = rhdr + rlen; 375 size_t rlen; local 414 &rlen) < 0) { 420 pos = rhdr + rlen; 433 size_t rlen, hlen, clen; local 591 &rlen) < 0) { 597 pos = rhdr + rlen; 610 size_t rlen; local 644 size_t rlen, hlen; local [all...] |
/external/libppp/src/ |
H A D | vjcomp.c | 118 int len, olen, rlen; local 146 rlen = len; 148 bp = mbuf_Read(bp, bufp, rlen); 156 len += rlen;
|
/external/chromium_org/third_party/yasm/source/patched-yasm/libyasm/ |
H A D | bc-data.c | 270 unsigned long len = 0, rlen, i; local 314 rlen = dv->data.raw.len; 316 rlen = (rlen + size - 1) / size; 317 len += rlen*size; 390 rlen = dv->data.raw.len; 392 rlen); 394 len += rlen; 396 rlen %= size; 397 if (rlen > [all...] |
/external/qemu/audio/ |
H A D | wavcapture.c | 34 uint8_t rlen[4]; local 40 le_store (rlen, rifflen, 4); 44 qemu_put_buffer (wav->f, rlen, 4);
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.c | 391 int rlen, rec; local 412 rlen = scard_get_record_len(scard, rec, 414 if (rlen < 0) { 420 if (rlen > (int) blen) { 424 if (scard_read_record(scard, buf, rlen, rec, 430 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 439 if (efdir->appl_template_len > rlen - 2) { 441 "template (len=%d rlen=%d)", 442 efdir->appl_template_len, rlen); 767 unsigned long rlen; local 799 size_t len, rlen; local [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.c | 391 int rlen, rec; local 412 rlen = scard_get_record_len(scard, rec, 414 if (rlen < 0) { 420 if (rlen > (int) blen) { 424 if (scard_read_record(scard, buf, rlen, rec, 430 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 439 if (efdir->appl_template_len > rlen - 2) { 441 "template (len=%d rlen=%d)", 442 efdir->appl_template_len, rlen); 767 unsigned long rlen; local 799 size_t len, rlen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.c | 391 int rlen, rec; local 412 rlen = scard_get_record_len(scard, rec, 414 if (rlen < 0) { 420 if (rlen > (int) blen) { 424 if (scard_read_record(scard, buf, rlen, rec, 430 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 439 if (efdir->appl_template_len > rlen - 2) { 441 "template (len=%d rlen=%d)", 442 efdir->appl_template_len, rlen); 767 unsigned long rlen; local 799 size_t len, rlen; local [all...] |
/external/smack/src/org/xbill/DNS/ |
H A D | DNSSEC.java | 584 int rlen = DSA_LEN; 586 rlen++; 594 out.writeU8(rlen + slen + 4); 597 out.writeU8(rlen); 598 if (rlen > DSA_LEN) 626 int rlen = in.readU8(); 627 if (rlen == DSA_LEN + 1) { 630 } else if (rlen != DSA_LEN) 661 int rlen = keyinfo.length; 663 rlen [all...] |
/external/libmtp/src/ |
H A D | libusb-glue.c | 1233 PTPUSBBulkContainer *packet, unsigned long *rlen) 1243 *rlen = params->response_packet_size; 1251 ret = ptp_read_func(PTP_USB_BULK_HS_MAX_PACKET_LEN_READ, &memhandler, params->data, rlen, 0); 1252 ptp_exit_recv_memory_handler (&memhandler, &x, rlen); 1254 memcpy (packet, x, *rlen); 1273 unsigned long len, rlen; local 1275 ret = ptp_usb_getpacket(params, &usbdata, &rlen); 1311 params, handler->priv, rlen - PTP_USB_BULK_HDR_LEN, usbdata.payload.data, 1335 if (rlen > dtoh32(usbdata.length)) { 1349 unsigned int surplen = rlen 1232 ptp_usb_getpacket(PTPParams *params, PTPUSBBulkContainer *packet, unsigned long *rlen) argument 1431 unsigned long rlen; local 1503 unsigned long rlen; local [all...] |
/external/svox/pico/lib/ |
H A D | picopr.c | 263 picoos_int32 rlen; member in struct:pr_Path 2010 while ((*i) < pr->rbestpath.rlen) { 2105 } else if (((*i) < (pr->rbestpath.rlen - 1)) && (d != pr->rbestpath.rele[(*i) + 1].rdepth)) { 2199 for (li = 0; li<pr->rbestpath.rlen; li++) { 2268 len = pr->ractpath.rlen; 2271 if ((len > 0) && (pr->ractpath.rlen < PR_MAX_PATH_LEN) && ((PR_TSE_MASK_NEXT & npset) != 0)) { 2276 pr->ractpath.rlen++; 2294 with__0 = & pr->ractpath.rele[pr->ractpath.rlen - 1]; 2295 if ((pr->ractpath.rlen > 0) && (pr->ractpath.rlen < PR_MAX_PATH_LE [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | kssl.h | 167 krb5_principal *princ, int rlen, const char *realm,
|