/external/openssh/openbsd-compat/ |
H A D | realpath.c | 58 int serrno, slen; local 150 slen = readlink(resolved, symlink, sizeof(symlink) - 1); 151 if (slen < 0) 153 symlink[slen] = '\0'; 171 if (symlink[slen - 1] != '/') { 172 if (slen + 1 >= sizeof(symlink)) { 176 symlink[slen] = '/'; 177 symlink[slen + 1] = 0;
|
H A D | mktemp.c | 47 mktemp_internal(char *path, int slen, int mode) argument 57 if (len == 0 || slen < 0 || (size_t)slen >= len) { 61 ep = path + len - slen; 127 mkstemps(char *path, int slen) argument 129 return(mktemp_internal(path, slen, MKTEMP_FILE));
|
/external/toybox/toys/posix/ |
H A D | nl.c | 46 int w = TT.w, slen = strlen(TT.s); local 64 } else printf("%*c", (int)w+slen, ' ');
|
/external/libselinux/src/ |
H A D | label_internal.h | 36 int slen; member in struct:selabel_sub
|
/external/openssh/ |
H A D | kexc25519c.c | 81 size_t slen, pklen, sbloblen, hashlen; local 109 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 || 144 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen,
|
H A D | kexdhc.c | 104 size_t klen = 0, slen, sbloblen, hashlen; local 134 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 || 178 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen,
|
H A D | auth2-hostbased.c | 65 u_int alen, blen, slen; local 77 sig = packet_get_string(&slen); 79 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 80 cuser, chost, pkalg, slen); 84 buffer_append(&b, sig, slen); 142 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b),
|
H A D | kexc25519s.c | 65 size_t slen, pklen, sbloblen, hashlen; local 137 &signature, &slen, hash, hashlen, ssh->compat)) < 0) 144 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
|
H A D | kexdhs.c | 95 size_t sbloblen, slen; local 185 &signature, &slen, hash, hashlen, ssh->compat)) < 0) 194 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
|
H A D | kexecdhc.c | 110 size_t slen, sbloblen; local 145 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 || 191 if ((r = sshkey_verify(server_host_key, signature, slen, hash,
|
H A D | kexecdhs.c | 74 size_t slen, sbloblen; local 173 &signature, &slen, hash, hashlen, ssh->compat)) < 0) 183 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
|
H A D | kexgexc.c | 161 size_t klen = 0, slen, sbloblen, hashlen; local 196 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 || 245 if ((r = sshkey_verify(server_host_key, signature, slen, hash,
|
H A D | kexgexs.c | 154 size_t sbloblen, slen; local 247 &signature, &slen, hash, hashlen, ssh->compat)) < 0) 256 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
|
H A D | ssh-dss.c | 55 size_t rlen, slen, len, dlen = ssh_digest_bytes(SSH_DIGEST_SHA1); local 80 slen = BN_num_bytes(sig->s); 81 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { 87 BN_bn2bin(sig->s, sigblob + SIGBLOB_LEN - slen);
|
H A D | ssh-ed25519.c | 40 size_t slen = 0, len; local 55 smlen = slen = datalen + crypto_sign_ed25519_BYTES; 56 if ((sig = malloc(slen)) == NULL) 87 explicit_bzero(sig, slen);
|
H A D | ssh-keysign.c | 177 size_t slen, dlen; local 284 if ((r = sshkey_sign(keys[i], &signature, &slen, data, dlen, 0)) != 0) 290 if ((r = sshbuf_put_string(b, signature, slen)) != 0)
|
H A D | ssh-pkcs11-client.c | 111 u_int blen, slen = 0; local 131 signature = buffer_get_string(&msg, &slen); 132 if (slen <= (u_int)RSA_size(rsa)) { 133 memcpy(to, signature, slen); 134 ret = slen;
|
H A D | ssh-rsa.c | 46 size_t slen; local 59 slen = RSA_size(key->rsa); 60 if (slen <= 0 || slen > SSHBUF_MAX_BIGNUM) 72 if ((sig = malloc(slen)) == NULL) { 81 if (len < slen) { 82 size_t diff = slen - len; 85 } else if (len > slen) { 95 (ret = sshbuf_put_string(b, sig, slen)) != 0) 111 explicit_bzero(sig, slen); [all...] |
/external/boringssl/src/crypto/asn1/ |
H A D | f_enum.c | 103 int num=0,slen=0,first=1; local 151 if (num+i > slen) 165 slen=num+i*2;
|
H A D | f_int.c | 108 int num=0,slen=0,first=1; local 156 if (num+i > slen) 162 sp=OPENSSL_realloc_clean(s,slen,num+i*2); 169 slen=num+i*2;
|
H A D | f_string.c | 103 int num=0,slen=0,first=1; local 149 if (num+i > slen) 163 slen=num+i*2;
|
/external/selinux/libselinux/src/ |
H A D | label_internal.h | 36 int slen; member in struct:selabel_sub
|
/external/boringssl/src/crypto/pem/ |
H A D | pem_pkey.c | 83 int slen; local 125 } else if ((slen = pem_check_suffix(nm, "PRIVATE KEY")) > 0) 128 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); 184 int slen; local 192 if ((slen = pem_check_suffix(nm, "PARAMETERS")) > 0) 197 if (!set_pkey_type_from_str(ret, nm, slen)
|
/external/dnsmasq/src/ |
H A D | netlink.c | 42 socklen_t slen = sizeof(addr); local 65 getsockname(daemon->netlinkfd, (struct sockaddr *)&addr, &slen) == 1)
|
/external/icu/icu4c/source/test/intltest/ |
H A D | mnkytst.cpp | 82 int32_t slen = checkValue((rand() - source.length()) % source.length()); local 86 source.extract(MIN(s, slen), MAX(s, slen), subs); 157 int32_t slen = checkValue((rand() - source.length()) % source.length()); local 161 source.extract(MIN(s, slen), MAX(s, slen), subs);
|