/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x509_obj.c | 77 char tmp_buf[80]; local 106 i2t_ASN1_OBJECT(tmp_buf,sizeof(tmp_buf),ne->object); 107 s=tmp_buf;
|
/external/openssl/crypto/evp/ |
H A D | digest.c | 293 unsigned char *tmp_buf; local 310 tmp_buf = out->md_data; 313 else tmp_buf = NULL; 319 if (tmp_buf) 320 out->md_data = tmp_buf;
|
/external/openssl/crypto/x509/ |
H A D | x509_obj.c | 77 char tmp_buf[80]; local 109 i2t_ASN1_OBJECT(tmp_buf,sizeof(tmp_buf),ne->object); 110 s=tmp_buf;
|
/external/libsepol/src/ |
H A D | node_record.c | 393 char *tmp_buf = malloc(node->addr_sz); local 394 if (!tmp_buf) { 399 memcpy(tmp_buf, node->addr, node->addr_sz); 400 *buffer = tmp_buf; 482 char *tmp_buf = malloc(node->mask_sz); local 483 if (!tmp_buf) { 488 memcpy(tmp_buf, node->mask, node->mask_sz); 489 *buffer = tmp_buf;
|
H A D | services.c | 217 char tmp_buf[128]; local 235 snprintf(tmp_buf, sizeof(tmp_buf), "(%s%s", src, op); 236 cat_expr_buf(expr_list[expr_counter], tmp_buf); 251 snprintf(tmp_buf, sizeof(tmp_buf), " %s", 255 snprintf(tmp_buf, sizeof(tmp_buf), " %s", 259 snprintf(tmp_buf, sizeof(tmp_buf), " 278 char tmp_buf[128]; local 395 char tmp_buf[128]; local [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/digest/ |
H A D | digest.c | 118 uint8_t *tmp_buf = NULL; local 130 tmp_buf = out->md_data; 138 if (tmp_buf) { 139 out->md_data = tmp_buf;
|
/external/openssl/ssl/ |
H A D | d1_clnt.c | 1003 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local 1028 tmp_buf[0]=s->client_version>>8; 1029 tmp_buf[1]=s->client_version&0xff; 1030 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0) 1033 s->session->master_key_length=sizeof tmp_buf; 1039 n=RSA_public_encrypt(sizeof tmp_buf, 1040 tmp_buf,p,rsa,RSA_PKCS1_PADDING); 1043 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70; 1061 tmp_buf,sizeo 1076 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local [all...] |
H A D | s3_clnt.c | 2560 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local 2585 tmp_buf[0]=s->client_version>>8; 2586 tmp_buf[1]=s->client_version&0xff; 2587 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0) 2590 s->session->master_key_length=sizeof tmp_buf; 2596 n=RSA_public_encrypt(sizeof tmp_buf, 2597 tmp_buf,p,rsa,RSA_PKCS1_PADDING); 2600 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70; 2618 tmp_buf,sizeo 2633 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 1974 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; local 1999 tmp_buf[0]=s->client_version>>8; 2000 tmp_buf[1]=s->client_version&0xff; 2001 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0) 2004 s->session->master_key_length=sizeof tmp_buf; 2010 n=RSA_public_encrypt(sizeof tmp_buf, 2011 tmp_buf,p,rsa,RSA_PKCS1_PADDING); 2020 p, n, tmp_buf, sizeof(tmp_buf))) [all...] |
/external/qemu/ |
H A D | block.c | 978 uint8_t tmp_buf[BDRV_SECTOR_SIZE]; local 990 if ((ret = bdrv_read(bs, sector_num, tmp_buf, 1)) < 0) 992 memcpy(buf, tmp_buf + (offset & (BDRV_SECTOR_SIZE - 1)), len); 1013 if ((ret = bdrv_read(bs, sector_num, tmp_buf, 1)) < 0) 1015 memcpy(buf, tmp_buf, count); 1023 uint8_t tmp_buf[BDRV_SECTOR_SIZE]; local 1035 if ((ret = bdrv_read(bs, sector_num, tmp_buf, 1)) < 0) 1037 memcpy(tmp_buf + (offset & (BDRV_SECTOR_SIZE - 1)), buf, len); 1038 if ((ret = bdrv_write(bs, sector_num, tmp_buf, 1)) < 0) 1060 if ((ret = bdrv_read(bs, sector_num, tmp_buf, [all...] |