/external/chromium_org/third_party/cld/encodings/compact_lang_det/win/ |
H A D | cld_htmlutils_windows.cc | 10 int* tlen, int* plen) { 21 *tlen = 1; 24 ++*tlen; 9 EntityToBuffer(const char* src, int len, char* dst, int* tlen, int* plen) argument
|
H A D | cld_htmlutils_google3.cc | 20 int* tlen, int* plen) { 21 char32 entval = HtmlUtils::ReadEntity(src, len, tlen); 28 *tlen = 1; 31 // fprintf(stderr,"t%d p%d]\n", *tlen, *plen); 19 EntityToBuffer(const char* src, int len, char* dst, int* tlen, int* plen) argument
|
H A D | cld_htmlutils.h | 11 int* tlen, int* plen);
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
H A D | rsa_none.c | 65 int RSA_padding_add_none(unsigned char *to, int tlen, argument 68 if (flen > tlen) 74 if (flen < tlen) 84 int RSA_padding_check_none(unsigned char *to, int tlen, argument 88 if (flen > tlen) 94 memset(to,0,tlen-flen); 95 memcpy(to+tlen-flen,from,flen); 96 return(tlen);
|
H A D | rsa_pk1.c | 65 int RSA_padding_add_PKCS1_type_1(unsigned char *to, int tlen, argument 71 if (flen > (tlen-RSA_PKCS1_PADDING_SIZE)) 83 j=tlen-3-flen; 91 int RSA_padding_check_PKCS1_type_1(unsigned char *to, int tlen, argument 133 if (j > tlen) 143 int RSA_padding_add_PKCS1_type_2(unsigned char *to, int tlen, argument 149 if (flen > (tlen-11)) 161 j=tlen-3-flen; 181 int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen, argument 215 if (j > tlen) [all...] |
H A D | rsa_ssl.c | 65 int RSA_padding_add_SSLv23(unsigned char *to, int tlen, argument 71 if (flen > (tlen-11)) 83 j=tlen-3-8-flen; 105 int RSA_padding_check_SSLv23(unsigned char *to, int tlen, argument 145 if (j > tlen)
|
H A D | rsa_x931.c | 66 int RSA_padding_add_X931(unsigned char *to, int tlen, argument 76 j = tlen - flen - 2; 105 int RSA_padding_check_X931(unsigned char *to, int tlen, argument
|
H A D | rsa.h | 380 int RSA_padding_add_PKCS1_type_1(unsigned char *to,int tlen, 382 int RSA_padding_check_PKCS1_type_1(unsigned char *to,int tlen, 384 int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen, 386 int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, 390 int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, 393 int RSA_padding_check_PKCS1_OAEP(unsigned char *to,int tlen, 396 int RSA_padding_add_SSLv23(unsigned char *to,int tlen, 398 int RSA_padding_check_SSLv23(unsigned char *to,int tlen, 400 int RSA_padding_add_none(unsigned char *to,int tlen, 402 int RSA_padding_check_none(unsigned char *to,int tlen, [all...] |
/external/openssl/crypto/rsa/ |
H A D | rsa_none.c | 65 int RSA_padding_add_none(unsigned char *to, int tlen, argument 68 if (flen > tlen) 74 if (flen < tlen) 84 int RSA_padding_check_none(unsigned char *to, int tlen, argument 88 if (flen > tlen) 94 memset(to,0,tlen-flen); 95 memcpy(to+tlen-flen,from,flen); 96 return(tlen);
|
H A D | rsa_pk1.c | 65 int RSA_padding_add_PKCS1_type_1(unsigned char *to, int tlen, argument 71 if (flen > (tlen-RSA_PKCS1_PADDING_SIZE)) 83 j=tlen-3-flen; 91 int RSA_padding_check_PKCS1_type_1(unsigned char *to, int tlen, argument 133 if (j > tlen) 143 int RSA_padding_add_PKCS1_type_2(unsigned char *to, int tlen, argument 149 if (flen > (tlen-11)) 161 j=tlen-3-flen; 181 int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen, argument 215 if (j > tlen) [all...] |
H A D | rsa_ssl.c | 65 int RSA_padding_add_SSLv23(unsigned char *to, int tlen, argument 71 if (flen > (tlen-11)) 83 j=tlen-3-8-flen; 105 int RSA_padding_check_SSLv23(unsigned char *to, int tlen, argument 145 if (j > tlen)
|
H A D | rsa_x931.c | 66 int RSA_padding_add_X931(unsigned char *to, int tlen, argument 76 j = tlen - flen - 2; 105 int RSA_padding_check_X931(unsigned char *to, int tlen, argument
|
H A D | rsa.h | 380 int RSA_padding_add_PKCS1_type_1(unsigned char *to,int tlen, 382 int RSA_padding_check_PKCS1_type_1(unsigned char *to,int tlen, 384 int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen, 386 int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, 390 int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, 393 int RSA_padding_check_PKCS1_OAEP(unsigned char *to,int tlen, 396 int RSA_padding_add_SSLv23(unsigned char *to,int tlen, 398 int RSA_padding_check_SSLv23(unsigned char *to,int tlen, 400 int RSA_padding_add_none(unsigned char *to,int tlen, 402 int RSA_padding_check_none(unsigned char *to,int tlen, [all...] |
/external/tcpdump/ |
H A D | print-vqp.c | 117 int tlen; local 121 tlen = len; 158 tlen-=sizeof(const struct vqp_common_header_t); 160 while (nitems > 0 && tlen > 0) { 166 tlen-=sizeof(struct vqp_obj_tlv_t); 203 tlen -= vqp_obj_len;
|
H A D | print-cfm.c | 298 u_int hexdump, tlen, cfm_tlv_len, cfm_tlv_type, ccm_interval; local 337 tlen = length - sizeof(struct cfm_common_header_t); 469 if (tlen > cfm_common_header->first_tlv_offset) { 471 tlen - cfm_common_header->first_tlv_offset); 479 if (tlen <= cfm_common_header->first_tlv_offset) { 484 tlen -= cfm_common_header->first_tlv_offset; 486 while (tlen > 0) { 508 ((cfm_tlv_len + sizeof(struct cfm_tlv_header_t) > tlen) || 510 print_unknown_data(tptr,"\n\t ",tlen); 515 tlen [all...] |
H A D | print-rpki-rtr.c | 258 u_int encapsulated_pdu_length, text_length, tlen, error_code; local 263 tlen = pdu_len; 272 tlen -= sizeof(*pdu); 278 (encapsulated_pdu_length <= tlen)) { 284 tlen -= encapsulated_pdu_length; 290 if (tlen > 4) { 293 tlen -= 4; 295 if (text_length && (text_length <= tlen )) { 320 u_int tlen, pdu_type, pdu_len; local 325 tlen [all...] |
H A D | print-sflow.c | 475 u_int tlen; local 483 tlen = len; 487 if (tlen < sizeof(struct sflow_counter_record_t)) 502 tlen -= sizeof(struct sflow_counter_record_t); 504 if (tlen < counter_len) 509 if (print_sflow_counter_generic(tptr,tlen)) 513 if (print_sflow_counter_ethernet(tptr,tlen)) 517 if (print_sflow_counter_token_ring(tptr,tlen)) 521 if (print_sflow_counter_basevg(tptr,tlen)) 525 if (print_sflow_counter_vlan(tptr,tlen)) 668 u_int tlen; local 819 u_int tlen; local [all...] |
H A D | print-lwapp.c | 177 int tlen; local 212 tlen=EXTRACT_16BITS(lwapp_trans_header->length); 220 tlen); 230 while(tlen>0) { 289 tlen -= sizeof(struct lwapp_control_header) + msg_tlen; 302 int tlen; local 332 tlen=EXTRACT_16BITS(lwapp_trans_header->length); 340 tlen); 343 tlen-=sizeof(const struct lwapp_transport_header); 346 print_unknown_data(tptr, "\n\t", tlen); [all...] |
H A D | print-bgp.c | 960 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local 964 tlen=plen; 981 tlen-=12; 996 tlen-=15; 999 while (tlen>0) { 1000 if (tlen < 3) 1035 tlen-=(tlv_len<<3); /* the tlv-length is expressed in bits so lets shift it right */ 1300 u_int tlen; local 1307 tlen=len; 1425 while (tlen> [all...] |
H A D | print-slow.c | 340 void slow_marker_lacp_print(register const u_char *tptr, register u_int tlen) { argument 353 while(tlen>0) { 367 tlv_len > tlen) && 371 print_unknown_data(tptr+sizeof(struct tlv_header_t),"\n\t ",tlen); 449 tlen-=tlv_len; 456 void slow_oam_print(register const u_char *tptr, register u_int tlen) { argument 485 tlen -= sizeof(struct slow_oam_common_header_t); 495 while (tlen > 0) { 563 tlen -= ptr.slow_oam_tlv_header->length; 569 while (tlen > [all...] |
/external/chromium_org/third_party/cld/encodings/compact_lang_det/ |
H A D | getonescriptspan.cc | 290 int tlen, plen; local 311 tlen = ScanToPossibleLetter(src + skip, len - skip); 316 tlen = 1; // Over the > 323 temp, &tlen, &plen); 329 tlen = cld_UniLib::OneCharLen(src + skip); 336 skip += tlen; // Advance 365 int tlen, plen; local 411 script_buffer_ + put, &tlen, &plen); 417 tlen = plen = cld_UniLib::OneCharLen(next_byte_ + take); 454 int sc2 = getone::GetUTF8LetterScriptNum(next_byte_ + take + tlen); [all...] |
/external/bluetooth/bluedroid/stack/smp/ |
H A D | smp_cmac.c | 135 static BOOLEAN cmac_aes_k_calculate(BT_OCTET16 key, UINT8 *p_signature, UINT16 tlen) argument 160 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); 161 memcpy(p_signature, p_mac, tlen); 163 SMP_TRACE_DEBUG("tlen = %d p_mac = %d", tlen, p_mac); 283 ** Description This is the AES-CMAC Generation Function with tlen implemented. 288 ** tlen - lenth of mac desired 289 ** p_signature - data pointer to where signed data to be stored, tlen long. 295 UINT16 tlen, UINT8 *p_signature) 327 ret = cmac_aes_k_calculate(key, p_signature, tlen); 294 AES_CMAC( BT_OCTET16 key, UINT8 *input, UINT16 length, UINT16 tlen, UINT8 *p_signature) argument [all...] |
/external/srec/srec/crec/ |
H A D | text_parser.c | 34 const char* transcription, int tlen) 53 if (tlen > 0) 55 for (wd = transcription + tlen - 1; wd > transcription; wd--) 103 tlen--; 104 while (transcription[tlen] != ' ' && tlen > 0) tlen--; 33 check_word_path(srec_context* context, arc_token* atok, const char* transcription, int tlen) argument
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | rsa.h | 380 int RSA_padding_add_PKCS1_type_1(unsigned char *to,int tlen, 382 int RSA_padding_check_PKCS1_type_1(unsigned char *to,int tlen, 384 int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen, 386 int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, 390 int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, 393 int RSA_padding_check_PKCS1_OAEP(unsigned char *to,int tlen, 396 int RSA_padding_add_SSLv23(unsigned char *to,int tlen, 398 int RSA_padding_check_SSLv23(unsigned char *to,int tlen, 400 int RSA_padding_add_none(unsigned char *to,int tlen, 402 int RSA_padding_check_none(unsigned char *to,int tlen, [all...] |
/external/openssl/include/openssl/ |
H A D | rsa.h | 380 int RSA_padding_add_PKCS1_type_1(unsigned char *to,int tlen, 382 int RSA_padding_check_PKCS1_type_1(unsigned char *to,int tlen, 384 int RSA_padding_add_PKCS1_type_2(unsigned char *to,int tlen, 386 int RSA_padding_check_PKCS1_type_2(unsigned char *to,int tlen, 390 int RSA_padding_add_PKCS1_OAEP(unsigned char *to,int tlen, 393 int RSA_padding_check_PKCS1_OAEP(unsigned char *to,int tlen, 396 int RSA_padding_add_SSLv23(unsigned char *to,int tlen, 398 int RSA_padding_check_SSLv23(unsigned char *to,int tlen, 400 int RSA_padding_add_none(unsigned char *to,int tlen, 402 int RSA_padding_check_none(unsigned char *to,int tlen, [all...] |