/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
H A D | der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; local 62 dlen = 0; 64 dlen = (dlen << 8) | (unsigned long)in[x++]; 68 dlen = in[x++] & 0x7F; 72 if ((dlen == 0) || (dlen + x > inlen)) { 77 blen = ((dlen - 1) << 3) - (in[x++] & 7);
|
/external/openssh/openbsd-compat/ |
H A D | strlcat.c | 40 size_t dlen; local 45 dlen = d - dst; 46 n = siz - dlen; 49 return(dlen + strlen(s)); 59 return(dlen + (s - src)); /* count does not include NUL */
|
/external/tcpdump/missing/ |
H A D | strlcat.c | 56 size_t dlen; local 61 dlen = d - dst; 62 n = siz - dlen; 65 return(dlen + strlen(s)); 75 return(dlen + (s - src)); /* count does not include NUL */
|
/external/chromium_org/third_party/openssl/openssl/crypto/ecdsa/ |
H A D | ecs_sign.c | 62 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) argument 64 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); 67 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, argument 73 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 76 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char argument 79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 82 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char argument 87 RAND_seed(dgst, dlen); 88 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
|
/external/openssl/crypto/ecdsa/ |
H A D | ecs_sign.c | 62 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) argument 64 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); 67 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, argument 73 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 76 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char argument 79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 82 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char argument 87 RAND_seed(dgst, dlen); 88 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
|
/external/dropbear/ |
H A D | compat.c | 135 size_t dlen; local 140 dlen = d - dst; 141 n = siz - dlen; 144 return(dlen + strlen(s)); 154 return(dlen + (s - src)); /* count does not include NUL */
|
/external/chromium_org/third_party/openssl/openssl/crypto/cmac/ |
H A D | cmac.c | 215 int CMAC_Update(CMAC_CTX *ctx, const void *in, size_t dlen) argument 221 return FIPS_cmac_update(ctx, in, dlen); 225 if (dlen == 0) 233 if (dlen < nleft) 234 nleft = dlen; 236 dlen -= nleft; 239 if (dlen == 0) 247 while(dlen > bl) 251 dlen -= bl; 255 memcpy(ctx->last_block, data, dlen); [all...] |
H A D | cmac.h | 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
|
/external/openssl/crypto/cmac/ |
H A D | cmac.c | 215 int CMAC_Update(CMAC_CTX *ctx, const void *in, size_t dlen) argument 221 return FIPS_cmac_update(ctx, in, dlen); 225 if (dlen == 0) 233 if (dlen < nleft) 234 nleft = dlen; 236 dlen -= nleft; 239 if (dlen == 0) 247 while(dlen > bl) 251 dlen -= bl; 255 memcpy(ctx->last_block, data, dlen); [all...] |
H A D | cmac.h | 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
|
/external/linux-tools-perf/util/ |
H A D | strbuf.c | 54 const void *data, size_t dlen) 63 if (dlen >= len) 64 strbuf_grow(sb, dlen - len); 65 memmove(sb->buf + pos + dlen, 68 memcpy(sb->buf + pos, data, dlen); 69 strbuf_setlen(sb, sb->len + dlen - len); 53 strbuf_splice(struct strbuf *sb, size_t pos, size_t len, const void *data, size_t dlen) argument
|
/external/openssh/ |
H A D | ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 63 EVP_DigestFinal(&md, digest, &dlen); 65 sig = DSA_do_sign(digest, dlen, key->dsa); 116 u_int len, dlen; local 177 EVP_DigestFinal(&md, digest, &dlen); 179 ret = DSA_do_verify(digest, dlen, sig, key->dsa);
|
H A D | ssh-ecdsa.c | 54 u_int len, dlen; local 65 EVP_DigestFinal(&md, digest, &dlen); 67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); 103 u_int len, dlen; local 156 EVP_DigestFinal(&md, digest, &dlen); 158 ret = ECDSA_do_verify(digest, dlen, sig, key->ecdsa);
|
H A D | auth1.c | 119 u_int dlen; local 126 password = packet_get_string(&dlen); 138 memset(password, 0, dlen); 226 u_int dlen; local 228 response = packet_get_string(&dlen); 231 memset(response, 'r', dlen);
|
H A D | ssh-rsa.c | 46 u_int slen, dlen, len; local 62 EVP_DigestFinal(&md, digest, &dlen); 67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); 115 u_int len, dlen, modlen; local 169 EVP_DigestFinal(&md, digest, &dlen); 171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa);
|
/external/chromium_org/courgette/third_party/ |
H A D | bsdiff.h | 84 uint32 dlen; // Length of the result file. member in struct:courgette::MBSPatchHeader_
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | cmac.h | 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
|
/external/openssl/include/openssl/ |
H A D | cmac.h | 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
|
/external/chromium_org/third_party/openssl/openssl/crypto/dsa/ |
H A D | dsa_sign.c | 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument 76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa);
|
/external/openssl/crypto/dsa/ |
H A D | dsa_sign.c | 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument 76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa);
|
/external/iproute2/tc/ |
H A D | tc_stab.c | 147 unsigned i, j, dlen; 149 dlen = RTA_PAYLOAD(tb[TCA_STAB_DATA]) / sizeof(__u16); 152 for (i = 0; i < dlen/12; i++) { 154 for (j = 0; i * 12 + j < dlen; j++)
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 161 size_t pad, dlen; local 182 dlen = avp_length - sizeof(*avp); 184 if (dlen < 4) { 193 dlen -= 4; 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 201 parse->eap = os_malloc(dlen); 208 os_memcpy(parse->eap, dpos, dlen); 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 161 size_t pad, dlen; local 182 dlen = avp_length - sizeof(*avp); 184 if (dlen < 4) { 193 dlen -= 4; 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 201 parse->eap = os_malloc(dlen); 208 os_memcpy(parse->eap, dpos, dlen); 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 161 size_t pad, dlen; local 182 dlen = avp_length - sizeof(*avp); 184 if (dlen < 4) { 193 dlen -= 4; 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 201 parse->eap = os_malloc(dlen); 208 os_memcpy(parse->eap, dpos, dlen); 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_cryptoapi.c | 159 DWORD dlen; local 206 dlen = 8; 207 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 294 DWORD dlen; local 297 dlen = 16; 298 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 326 DWORD dlen; local 329 dlen = 16; 331 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 593 DWORD dlen; local 610 DWORD dlen; local [all...] |