/external/openssh/ |
H A D | deattack.c | 98 deattack_init(struct deattack_ctx *dctx) argument 100 bzero(dctx, sizeof(*dctx)); 101 dctx->n = HASH_MINSIZE / HASH_ENTRYSIZE; 106 detect_attack(struct deattack_ctx *dctx, const u_char *buf, u_int32_t len) argument 115 for (l = dctx->n; l < HASH_FACTOR(len / SSH_BLOCKSIZE); l = l << 2) 118 if (dctx->h == NULL) { 119 if ((dctx->h = calloc(l, HASH_ENTRYSIZE)) == NULL) 121 dctx->n = l; 123 if (l > dctx [all...] |
/external/boringssl/src/crypto/evp/ |
H A D | p_ec.c | 83 EC_PKEY_CTX *dctx; local 84 dctx = OPENSSL_malloc(sizeof(EC_PKEY_CTX)); 85 if (!dctx) { 88 OPENSSL_memset(dctx, 0, sizeof(EC_PKEY_CTX)); 90 ctx->data = dctx; 96 EC_PKEY_CTX *dctx, *sctx; local 101 dctx = dst->data; 103 dctx->md = sctx->md; 109 EC_PKEY_CTX *dctx = ctx->data; local 110 if (!dctx) { 178 EC_PKEY_CTX *dctx = ctx->data; local [all...] |
H A D | p_rsa.c | 113 RSA_PKEY_CTX *dctx, *sctx; local 118 dctx = dst->data; 119 dctx->nbits = sctx->nbits; 121 dctx->pub_exp = BN_dup(sctx->pub_exp); 122 if (!dctx->pub_exp) { 127 dctx->pad_mode = sctx->pad_mode; 128 dctx->md = sctx->md; 129 dctx->mgf1md = sctx->mgf1md; 131 OPENSSL_free(dctx->oaep_label); 132 dctx [all...] |
/external/syslinux/gpxe/src/net/80211/ |
H A D | wpa_tkip.c | 208 * @v dctx TKIP directional context 212 * This recomputes the TTAK in @a dctx if necessary, and sets 213 * @c dctx->ttak_ok. 215 static void tkip_mix_1 ( struct tkip_dir_ctx *dctx, struct tkip_tk *tk, u8 *mac ) argument 219 if ( dctx->ttak_ok && ! memcmp ( mac, dctx->mac, ETH_ALEN ) ) 222 memcpy ( dctx->mac, mac, ETH_ALEN ); 224 dctx->ttak[0] = dctx->tsc_hi & 0xFFFF; 225 dctx 255 tkip_mix_2( struct tkip_dir_ctx *dctx, struct tkip_tk *tk, void *key ) argument [all...] |
/external/lz4/examples/ |
H A D | frameCompress.c | 134 LZ4F_dctx *dctx = NULL; local 139 ret = LZ4F_createDecompressionContext(&dctx, 100); 159 ret = LZ4F_getFrameInfo(dctx, &info, src, &srcSize); 181 ret = LZ4F_decompress(dctx, dst, &dstSize, srcPtr, &srcSize, /* LZ4F_decompressOptions_t */ NULL); 213 return LZ4F_freeDecompressionContext(dctx); /* note : free works on NULL */
|
/external/lz4/lib/ |
H A D | lz4frame.h | 280 * dctx memory can be released using LZ4F_freeDecompressionContext(); 285 LZ4FLIB_API LZ4F_errorCode_t LZ4F_freeDecompressionContext(LZ4F_dctx* const dctx); 302 LZ4FLIB_API size_t LZ4F_getFrameInfo(LZ4F_dctx* dctx, 327 * After a frame is fully decoded, dctx can be used again to decompress another frame. 329 LZ4FLIB_API size_t LZ4F_decompress(LZ4F_dctx* dctx,
|
/external/dhcpcd-6.8.2/ |
H A D | ipv6nd.c | 158 ipv6nd_open(struct dhcpcd_ctx *dctx) argument 164 ctx = dctx->ipv6; 214 eloop_event_add(dctx->eloop, ctx->nd_fd, 215 ipv6nd_handledata, dctx, NULL, NULL); 220 eloop_event_delete(dctx->eloop, ctx->nd_fd, 0); 725 ipv6nd_handlera(struct dhcpcd_ctx *dctx, struct interface *ifp, argument 728 struct ipv6_ctx *ctx = dctx->ipv6; 753 logger(dctx, LOG_ERR, 759 logger(dctx, LOG_ERR, 766 logger(dctx, LOG_DEBU 1552 ipv6nd_handlena(struct dhcpcd_ctx *dctx, struct interface *ifp, struct icmp6_hdr *icp, size_t len) argument 1630 struct dhcpcd_ctx *dctx; local [all...] |
H A D | dhcp6.c | 2602 struct dhcpcd_ctx *dctx; local 2620 dctx = arg; 2621 ctx = dctx->ipv6; 2625 logger(dctx, LOG_ERR, "%s: recvmsg: %m", __func__); 2627 eloop_event_delete(dctx->eloop, ctx->dhcp_fd, 0); 2635 logger(dctx, LOG_ERR, 2655 logger(dctx, LOG_ERR, 2660 TAILQ_FOREACH(ifp, dctx->ifaces, next) { 2667 logger(dctx, LOG_DEBUG, 2707 logger(dctx, LOG_DEBU 3086 dhcp6_open(struct dhcpcd_ctx *dctx) argument [all...] |
H A D | eloop.c | 457 eloop_init(struct dhcpcd_ctx *dctx) argument 468 ctx->ctx = dctx;
|
/external/curl/src/ |
H A D | tool_metalink.c | 599 digest_context *dctx; local 615 dctx = Curl_digest_init(digest_def->dparams); 616 if(!dctx) { 637 Curl_digest_final(dctx, result); 641 Curl_digest_update(dctx, buf, (unsigned int)len); 643 Curl_digest_final(dctx, result);
|