/external/libmicrohttpd/src/microhttpd/ |
H A D | basicauth.c | 121 size_t hlen = strlen(realm) + strlen("Basic realm=\"\"") + 1; local 124 header = (char*)malloc(hlen); 134 hlen,
|
/external/toybox/toys/pending/ |
H A D | watch.c | 29 int i = 0, hlen; local 42 hlen = strlen(header); 50 if (width > (hlen + len)) xprintf("%s", header); 52 xprintf("%*s\n",width + ((width > (hlen + len))?-hlen:0) + 1, ctime(&t));
|
/external/openssh/ |
H A D | ssh-rsa.c | 216 size_t ret, rsasize = 0, oidlen = 0, hlen = 0; local 226 hlen = 20; 231 if (hashlen != hlen) { 250 if (len < 0 || (size_t)len != hlen + oidlen) { 255 hashmatch = timingsafe_bcmp(decrypted + oidlen, hash, hlen) == 0;
|
/external/tcpdump/ |
H A D | print-sl.c | 124 u_int hlen; local 151 hlen = IP_HL(ip); 152 hlen += TH_OFF((struct tcphdr *)&((int *)ip)[hlen]); 153 lastlen[dir][lastconn] = length - (hlen << 2); 204 register u_int flags, hlen; local 240 * 'hlen' is the length of the uncompressed TCP/IP header (in words). 242 * 'length - hlen' is the amount of data in the packet. 244 hlen = IP_HL(ip); 245 hlen [all...] |
H A D | print-ip.c | 524 u_int hlen; local 545 hlen = IP_HL(ipds->ip) * 4; 546 if (hlen < sizeof (struct ip)) { 547 ND_PRINT((ndo, "bad-hlen %u", hlen)); 555 if (ipds->len < hlen) { 578 ipds->len -= hlen; 616 if ((hlen - sizeof(struct ip)) > 0) { 618 ip_optprint(ndo, (u_char *)(ipds->ip + 1), hlen - sizeof(struct ip)); 622 if (!ndo->ndo_Kflag && (u_char *)ipds->ip + hlen < [all...] |
H A D | print-mobility.c | 192 unsigned mhlen, hlen; local 229 hlen = IP6M_MINLEN; 235 hlen = IP6M_MINLEN; 237 ND_TCHECK2(*mh, hlen + 8); 240 EXTRACT_32BITS(&bp[hlen]), 241 EXTRACT_32BITS(&bp[hlen + 4]))); 243 hlen += 8; 251 hlen = IP6M_MINLEN; 253 ND_TCHECK2(*mh, hlen + 8); 256 EXTRACT_32BITS(&bp[hlen]), [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 451 hlen = sizeof(hash); 452 if (crypto_hash_finish(hmac, hash, &hlen) < 0) { 458 if (hlen != rl->hash_size || 459 os_memcmp_const(hash, out_data + plen, hlen) != 0 ||
|
H A D | tlsv1_client_write.c | 577 size_t rlen, hlen, clen; local 619 hlen = SHA256_MAC_LEN; 621 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 644 os_memmove(hash + 19, hash, hlen); 645 hlen += 19; 651 hlen = MD5_MAC_LEN; 653 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 664 hlen = SHA1_MAC_LEN; 666 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 674 hlen 782 size_t rlen, hlen; local [all...] |
H A D | tlsv1_common.c | 344 size_t hlen; local 351 hlen = SHA256_MAC_LEN; 355 hlen = 48; 359 hlen = 64; 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 373 return hlen; 384 size_t hlen; local 395 hlen = MD5_MAC_LEN; 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 398 hpos += hlen; [all...] |
H A D | tlsv1_server_read.c | 862 size_t hlen; local 958 hlen = SHA256_MAC_LEN; 960 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 971 hlen = MD5_MAC_LEN; 973 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 984 hlen = SHA1_MAC_LEN; 986 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 994 hlen += MD5_MAC_LEN; 1000 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 1003 hash, hlen, po 1071 size_t left, len, hlen; local [all...] |
H A D | tlsv1_server_write.c | 564 int hlen; local 568 hlen = tlsv12_key_x_server_params_hash( 584 if (hlen < 0 || end - pos < 2) { 606 hlen += 19; 617 hlen = tls_key_x_server_params_hash( 623 if (hlen < 0) { 630 hash, hlen); 634 hash[hlen - 1] ^= 0x80; 654 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 832 size_t rlen, hlen; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 451 hlen = sizeof(hash); 452 if (crypto_hash_finish(hmac, hash, &hlen) < 0) { 458 if (hlen != rl->hash_size || 459 os_memcmp_const(hash, out_data + plen, hlen) != 0 ||
|
H A D | tlsv1_client_write.c | 577 size_t rlen, hlen, clen; local 619 hlen = SHA256_MAC_LEN; 621 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 644 os_memmove(hash + 19, hash, hlen); 645 hlen += 19; 651 hlen = MD5_MAC_LEN; 653 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 664 hlen = SHA1_MAC_LEN; 666 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 674 hlen 782 size_t rlen, hlen; local [all...] |
H A D | tlsv1_common.c | 344 size_t hlen; local 351 hlen = SHA256_MAC_LEN; 355 hlen = 48; 359 hlen = 64; 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 373 return hlen; 384 size_t hlen; local 395 hlen = MD5_MAC_LEN; 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 398 hpos += hlen; [all...] |
H A D | tlsv1_server_read.c | 862 size_t hlen; local 958 hlen = SHA256_MAC_LEN; 960 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 971 hlen = MD5_MAC_LEN; 973 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 984 hlen = SHA1_MAC_LEN; 986 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 994 hlen += MD5_MAC_LEN; 1000 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 1003 hash, hlen, po 1071 size_t left, len, hlen; local [all...] |
H A D | tlsv1_server_write.c | 564 int hlen; local 568 hlen = tlsv12_key_x_server_params_hash( 584 if (hlen < 0 || end - pos < 2) { 606 hlen += 19; 617 hlen = tls_key_x_server_params_hash( 623 if (hlen < 0) { 630 hash, hlen); 634 hash[hlen - 1] ^= 0x80; 654 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 832 size_t rlen, hlen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 451 hlen = sizeof(hash); 452 if (crypto_hash_finish(hmac, hash, &hlen) < 0) { 458 if (hlen != rl->hash_size || 459 os_memcmp_const(hash, out_data + plen, hlen) != 0 ||
|
H A D | tlsv1_client_write.c | 577 size_t rlen, hlen, clen; local 619 hlen = SHA256_MAC_LEN; 621 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 644 os_memmove(hash + 19, hash, hlen); 645 hlen += 19; 651 hlen = MD5_MAC_LEN; 653 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 664 hlen = SHA1_MAC_LEN; 666 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 674 hlen 782 size_t rlen, hlen; local [all...] |
H A D | tlsv1_common.c | 344 size_t hlen; local 351 hlen = SHA256_MAC_LEN; 355 hlen = 48; 359 hlen = 64; 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 373 return hlen; 384 size_t hlen; local 395 hlen = MD5_MAC_LEN; 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) 398 hpos += hlen; [all...] |
H A D | tlsv1_server_read.c | 862 size_t hlen; local 958 hlen = SHA256_MAC_LEN; 960 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < 971 hlen = MD5_MAC_LEN; 973 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { 984 hlen = SHA1_MAC_LEN; 986 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { 994 hlen += MD5_MAC_LEN; 1000 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); 1003 hash, hlen, po 1071 size_t left, len, hlen; local [all...] |
H A D | tlsv1_server_write.c | 564 int hlen; local 568 hlen = tlsv12_key_x_server_params_hash( 584 if (hlen < 0 || end - pos < 2) { 606 hlen += 19; 617 hlen = tls_key_x_server_params_hash( 623 if (hlen < 0) { 630 hash, hlen); 634 hash[hlen - 1] ^= 0x80; 654 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, 832 size_t rlen, hlen; local [all...] |
/external/dnsmasq/contrib/wrt/ |
H A D | dhcp_lease_time.c | 62 u8 op, htype, hlen, hops; member in struct:dhcp_packet 159 packet.hlen = 0;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | dhcp_snoop.c | 26 u8 hlen; member in struct:bootp_pkt
|
/external/wpa_supplicant_8/src/ap/ |
H A D | dhcp_snoop.c | 26 u8 hlen; member in struct:bootp_pkt
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | dhcp_snoop.c | 26 u8 hlen; member in struct:bootp_pkt
|