/external/openssh/openbsd-compat/ |
H A D | mktemp.c | 47 mktemp_internal(char *path, int slen, int mode) argument 57 if (len == 0 || slen < 0 || (size_t)slen >= len) { 61 ep = path + len - slen; 127 mkstemps(char *path, int slen) argument 129 return(mktemp_internal(path, slen, MKTEMP_FILE));
|
H A D | realpath.c | 58 int serrno, slen; local 150 slen = readlink(resolved, symlink, sizeof(symlink) - 1); 151 if (slen < 0) 153 symlink[slen] = '\0'; 171 if (symlink[slen - 1] != '/') { 172 if (slen + 1 >= sizeof(symlink)) { 176 symlink[slen] = '/'; 177 symlink[slen + 1] = 0;
|
/external/guava/guava/src/com/google/common/escape/ |
H A D | CharEscaper.java | 82 int slen = s.length(); 92 for (; index < slen; index++) { 108 destSize = sizeNeeded + DEST_PAD_MULTIPLIER * (slen - index); 127 int charsLeft = slen - lastEscape; 135 s.getChars(lastEscape, slen, dest, destIndex);
|
H A D | CharEscaperBuilder.java | 57 int slen = s.length(); 58 for (int index = 0; index < slen; index++) {
|
/external/jemalloc/src/ |
H A D | util.c | 321 #define APPEND_S(s, slen) do { \ 323 size_t cpylen = (slen <= size - i) ? slen : size - i; \ 326 i += slen; \ 328 #define APPEND_PADDED_S(s, slen, width, left_justify) do { \ 330 size_t pad_len = (width == -1) ? 0 : ((slen < (size_t)width) ? \ 331 (size_t)width - slen : 0); \ 338 APPEND_S(s, slen); \ 494 size_t slen; local 506 ' ' : '-')), buf, &slen); [all...] |
/external/openssh/ |
H A D | ssh-rsa.c | 46 size_t slen; local 59 slen = RSA_size(key->rsa); 60 if (slen <= 0 || slen > SSHBUF_MAX_BIGNUM) 72 if ((sig = malloc(slen)) == NULL) { 81 if (len < slen) { 82 size_t diff = slen - len; 85 } else if (len > slen) { 95 (ret = sshbuf_put_string(b, sig, slen)) != 0) 111 explicit_bzero(sig, slen); [all...] |
H A D | ssh-ed25519.c | 40 size_t slen = 0, len; local 55 smlen = slen = datalen + crypto_sign_ed25519_BYTES; 56 if ((sig = malloc(slen)) == NULL) 87 explicit_bzero(sig, slen);
|
H A D | auth2-hostbased.c | 65 u_int alen, blen, slen; local 77 sig = packet_get_string(&slen); 79 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 80 cuser, chost, pkalg, slen); 84 buffer_append(&b, sig, slen); 142 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b),
|
H A D | ssh-pkcs11-client.c | 111 u_int blen, slen = 0; local 131 signature = buffer_get_string(&msg, &slen); 132 if (slen <= (u_int)RSA_size(rsa)) { 133 memcpy(to, signature, slen); 134 ret = slen;
|
H A D | kexc25519c.c | 81 size_t slen, pklen, sbloblen, hashlen; local 109 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 || 144 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen,
|
H A D | kexc25519s.c | 65 size_t slen, pklen, sbloblen, hashlen; local 137 &signature, &slen, hash, hashlen, ssh->compat)) < 0) 144 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
|
/external/libvncserver/x11vnc/ |
H A D | selection.c | 304 int format, slen, dlen, len; 309 slen = 0; 321 if (slen + dlen > PROP_MAX) { 328 memcpy(cutbuffer_str+slen, data, dlen); 329 slen += dlen; 330 cutbuffer_str[slen] = '\0'; 381 int format, slen, dlen, oldlen, newlen, toobig = 0, len; 419 slen = 0; 429 if (slen + dlen > PROP_MAX) { 444 memcpy(selection_str+slen, dat [all...] |
/external/iputils/ninfod/ |
H A D | ninfod_name.c | 209 static int compare_dnsname(const char *s, size_t slen, argument 214 if (slen < 1 || nlen < 1) 217 if (slen == nlen && memcmp(s, n, slen) == 0) 219 if (*(s0 + slen - 1) || *(n0 + nlen - 1)) 221 while (s < s0 + slen && n < n0 + nlen) { 224 if (s + *s + 1 > s0 + slen || n + *n + 1 > n0 + nlen) 227 if (s == s0 + slen - 1) 229 else if (s + 1 == s0 + slen - 1)
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_sd.c | 327 u16 slen; local 357 slen = *pos++; 358 next = pos + slen; 359 if (next > end || slen < 2) { 375 slen = WPA_GET_LE16(pos); 377 if (pos + slen > end) 379 end = pos + slen; 390 slen = WPA_GET_LE16(pos); 392 if (pos + slen > end || slen < 474 u16 slen; local 681 u16 slen; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_sd.c | 327 u16 slen; local 357 slen = *pos++; 358 next = pos + slen; 359 if (next > end || slen < 2) { 375 slen = WPA_GET_LE16(pos); 377 if (pos + slen > end) 379 end = pos + slen; 390 slen = WPA_GET_LE16(pos); 392 if (pos + slen > end || slen < 474 u16 slen; local 681 u16 slen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_sd.c | 327 u16 slen; local 357 slen = *pos++; 358 next = pos + slen; 359 if (next > end || slen < 2) { 375 slen = WPA_GET_LE16(pos); 377 if (pos + slen > end) 379 end = pos + slen; 390 slen = WPA_GET_LE16(pos); 392 if (pos + slen > end || slen < 474 u16 slen; local 681 u16 slen; local [all...] |
/external/toybox/toys/posix/ |
H A D | nl.c | 46 int w = TT.w, slen = strlen(TT.s); local 64 } else printf("%*c", (int)w+slen, ' ');
|
/external/selinux/libselinux/src/ |
H A D | label.c | 49 if (strncmp(src, ptr->src, ptr->slen) == 0 ) { 50 if (src[ptr->slen] == '/' || 51 src[ptr->slen] == 0) { 52 if ((src[ptr->slen] == '/') && 54 len = ptr->slen + 1; 56 len = ptr->slen; 113 sub->slen = strlen(src);
|
/external/boringssl/src/crypto/asn1/ |
H A D | f_string.c | 103 int num=0,slen=0,first=1; local 149 if (num+i > slen) 163 slen=num+i*2;
|
H A D | f_int.c | 108 int num=0,slen=0,first=1; local 156 if (num+i > slen) 162 sp=OPENSSL_realloc_clean(s,slen,num+i*2); 169 slen=num+i*2;
|
H A D | a_d2i_fp.c | 193 c.inf=ASN1_get_object(&(c.p),&(c.slen),&(c.tag),&(c.xclass), 219 else if (eos && (c.slen == 0) && (c.tag == V_ASN1_EOC)) 230 /* suck in c.slen bytes of data */ 231 want=c.slen; 260 if (off + c.slen < off) 265 off+=c.slen;
|
H A D | f_enum.c | 103 int num=0,slen=0,first=1; local 151 if (num+i > slen) 165 slen=num+i*2;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | hs20_supplicant.c | 248 size_t slen) 258 if (slen < 4) { 268 slen--; 270 if ((size_t) 1 + pos[0] > slen) { 277 slen -= 1 + pos[0]; 280 if (slen < 2) { 287 slen -= 2; 289 if (data_len > slen) { 311 if (fwrite(pos, slen, 1, f) != 1) { 361 const u8 *data, size_t slen) 246 hs20_process_icon_binary_file(struct wpa_supplicant *wpa_s, const u8 *sa, const u8 *pos, size_t slen) argument 359 hs20_parse_rx_hs20_anqp_resp(struct wpa_supplicant *wpa_s, struct wpa_bss *bss, const u8 *sa, const u8 *data, size_t slen) argument [all...] |
/external/iptables/extensions/ |
H A D | libxt_string.c | 94 int i=0, slen, sindex=0, schar; local 98 slen = strlen(s); 100 if (slen == 0) { 105 while (i < slen) { 120 if (i+1 >= slen) 127 if (i+1 >= slen) { 135 if (i+1 >= slen) { 139 if (i+2 >= slen) {
|
/external/boringssl/src/crypto/pem/ |
H A D | pem_pkey.c | 83 int slen; local 125 } else if ((slen = pem_check_suffix(nm, "PRIVATE KEY")) > 0) 128 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); 184 int slen; local 192 if ((slen = pem_check_suffix(nm, "PARAMETERS")) > 0) 197 if (!set_pkey_type_from_str(ret, nm, slen)
|