/external/libedit/src/ |
H A D | strlcat.c | 51 size_t dlen; local 59 dlen = d - dst; 60 n = siz - dlen; 63 return(dlen + strlen(s)); 73 return(dlen + (s - src)); /* count does not include NUL */ 81 size_t dlen = strnlen(dst, siz); 87 return dlen + strlcpy(dst + dlen, src, siz - dlen);
|
H A D | vis.c | 350 istrsenvisx(char *mbdst, size_t *dlen, const char *mbsrc, size_t mblength, argument 442 if (dlen && *dlen == 0) { 478 maxolen = dlen ? *dlen : (wcslen(start) * MB_LEN_MAX + 1); 559 snvis(char *mbdst, size_t dlen, int c, int flags, int nextc, const char *mbextra) argument 567 ret = istrsenvisx(mbdst, &dlen, cc, 1, flags, mbextra, NULL); 580 strsnvis(char *mbdst, size_t dlen, const char *mbsrc, int flags, const char *mbextra) argument 582 return istrsenvisx(mbdst, &dlen, mbsrc, 0, flags, mbextra, NULL); 592 strsnvisx(char *mbdst, size_t dlen, cons argument 599 strsenvisx(char *mbdst, size_t dlen, const char *mbsrc, size_t len, int flags, const char *mbextra, int *cerr_ptr) argument 626 nvis(char *mbdst, size_t dlen, int c, int flags, int nextc) argument 655 strnvis(char *mbdst, size_t dlen, const char *mbsrc, int flags) argument 678 strnvisx(char *mbdst, size_t dlen, const char *mbsrc, size_t len, int flags) argument 684 strenvisx(char *mbdst, size_t dlen, const char *mbsrc, size_t len, int flags, int *cerr_ptr) argument [all...] |
/external/kernel-headers/original/uapi/linux/ |
H A D | pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/external/tcpdump/missing/ |
H A D | strlcat.c | 56 size_t dlen; local 61 dlen = d - dst; 62 n = siz - dlen; 65 return(dlen + strlen(s)); 75 return(dlen + (s - src)); /* count does not include NUL */
|
/external/openssl/crypto/ecdsa/ |
H A D | ecs_sign.c | 63 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) argument 65 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); 68 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, argument 74 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); 77 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char argument 80 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); 83 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char argument 88 RAND_seed(dgst, dlen); 89 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
|
H A D | ecs_locl.h | 75 const unsigned char *dgst, int dlen);
|
/external/openssl/crypto/cmac/ |
H A D | cmac.c | 215 int CMAC_Update(CMAC_CTX *ctx, const void *in, size_t dlen) argument 221 return FIPS_cmac_update(ctx, in, dlen); 225 if (dlen == 0) 233 if (dlen < nleft) 234 nleft = dlen; 236 dlen -= nleft; 239 if (dlen == 0) 247 while(dlen > bl) 251 dlen -= bl; 255 memcpy(ctx->last_block, data, dlen); [all...] |
H A D | cmac.h | 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
H A D | strbuf.c | 55 const void *data, size_t dlen) 64 if (dlen >= len) 65 strbuf_grow(sb, dlen - len); 66 memmove(sb->buf + pos + dlen, 69 memcpy(sb->buf + pos, data, dlen); 70 strbuf_setlen(sb, sb->len + dlen - len); 54 strbuf_splice(struct strbuf *sb, size_t pos, size_t len, const void *data, size_t dlen) argument
|
/external/chromium_org/courgette/third_party/ |
H A D | bsdiff.h | 84 uint32 dlen; // Length of the result file. member in struct:courgette::MBSPatchHeader_
|
H A D | bsdiff_apply.cc | 49 if (!stream->ReadVarint32(&header->dlen)) return READ_ERROR; 83 if (header->dlen && !new_stream->Reserve(header->dlen))
|
/external/openssl/include/openssl/ |
H A D | cmac.h | 75 int CMAC_Update(CMAC_CTX *ctx, const void *data, size_t dlen);
|
/external/openssl/crypto/dsa/ |
H A D | dsa_sign.c | 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument 76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa);
|
H A D | dsa_ossl.c | 69 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa); 72 const unsigned char *dgst, int dlen); 133 static DSA_SIG *dsa_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) argument 159 if (!dsa->meth->dsa_sign_setup(dsa,ctx,&kinv,&r,dgst,dlen)) 172 if (dlen > BN_num_bytes(dsa->q)) 176 dlen = BN_num_bytes(dsa->q); 177 if (BN_bin2bn(dgst,dlen,&m) == NULL) 221 const unsigned char *dgst, int dlen) 255 dlen, ctx)) 219 dsa_sign_setup(DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const unsigned char *dgst, int dlen) argument
|
H A D | dsa_asn1.c | 153 int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, 157 RAND_seed(dgst, dlen); 158 s=DSA_do_sign(dgst,dlen,dsa);
|
/external/iproute2/tc/ |
H A D | tc_stab.c | 147 unsigned i, j, dlen; 149 dlen = RTA_PAYLOAD(tb[TCA_STAB_DATA]) / sizeof(__u16); 152 for (i = 0; i < dlen/12; i++) { 154 for (j = 0; i * 12 + j < dlen; j++)
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 161 size_t pad, dlen; local 182 dlen = avp_length - sizeof(*avp); 184 if (dlen < 4) { 193 dlen -= 4; 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 201 parse->eap = os_malloc(dlen); 208 os_memcpy(parse->eap, dpos, dlen); 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 161 size_t pad, dlen; local 182 dlen = avp_length - sizeof(*avp); 184 if (dlen < 4) { 193 dlen -= 4; 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 201 parse->eap = os_malloc(dlen); 208 os_memcpy(parse->eap, dpos, dlen); 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 161 size_t pad, dlen; local 182 dlen = avp_length - sizeof(*avp); 184 if (dlen < 4) { 193 dlen -= 4; 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); 201 parse->eap = os_malloc(dlen); 208 os_memcpy(parse->eap, dpos, dlen); 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); [all...] |
/external/tcpdump/ |
H A D | print-forces.c | 668 u_int dlen; local 674 dlen = len - TLV_HDRL; 675 if (dlen != RESLEN) { 676 printf("illegal RESULT-TLV: %d bytes!\n", dlen); 1235 u_int dlen; local 1242 dlen = len - TLV_HDRL; 1243 if (dlen != ASTDLN) { 1244 printf("illegal ASTresult-TLV: %d bytes!\n", dlen); 1292 u_int dlen; local 1299 dlen 1390 u_int dlen; local 1431 u_int dlen; local 1453 u_int dlen; local 1523 u_int dlen; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_cryptoapi.c | 159 DWORD dlen; local 206 dlen = 8; 207 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 294 DWORD dlen; local 297 dlen = 16; 298 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 326 DWORD dlen; local 329 dlen = 16; 331 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 593 DWORD dlen; local 610 DWORD dlen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_cryptoapi.c | 159 DWORD dlen; local 206 dlen = 8; 207 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 294 DWORD dlen; local 297 dlen = 16; 298 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 326 DWORD dlen; local 329 dlen = 16; 331 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 593 DWORD dlen; local 610 DWORD dlen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_cryptoapi.c | 159 DWORD dlen; local 206 dlen = 8; 207 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 294 DWORD dlen; local 297 dlen = 16; 298 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 326 DWORD dlen; local 329 dlen = 16; 331 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 593 DWORD dlen; local 610 DWORD dlen; local [all...] |
/external/chromium_org/third_party/skia/src/utils/ |
H A D | SkDashPath.cpp | 270 double dlen = initialDashLength; local 273 SkASSERT(dlen >= 0); 275 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 281 SkDoubleToScalar(distance + dlen), 285 SkDoubleToScalar(distance + dlen), 289 distance += dlen; 301 // fetch our next dlen 302 dlen = intervals[index];
|
/external/skia/src/utils/ |
H A D | SkDashPath.cpp | 269 double dlen = initialDashLength; local 272 SkASSERT(dlen >= 0); 274 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 280 SkDoubleToScalar(distance + dlen), 284 SkDoubleToScalar(distance + dlen), 288 distance += dlen; 300 // fetch our next dlen 301 dlen = intervals[index];
|