/external/tcpdump/ |
H A D | in_cksum.c | 61 register int mlen = 0; local 77 if (mlen == -1) { 89 mlen = vec->len - 1; 91 mlen = vec->len; 95 if ((1 & (uintptr_t) w) && (mlen > 0)) { 100 mlen--; 107 while ((mlen -= 32) >= 0) { 114 mlen += 32; 115 while ((mlen -= 8) >= 0) { 119 mlen [all...] |
/external/lz4/lib/ |
H A D | lz4opt.h | 49 int mlen; member in struct:__anon14085 63 /* requires mlen >= MINMATCH */ 64 FORCE_INLINE size_t LZ4HC_sequencePrice(size_t litlen, size_t mlen) argument 70 mlen -= MINMATCH; 71 if (mlen >= (size_t)ML_MASK) price+=8*(1+(mlen-ML_MASK)/255); 195 #define SET_PRICE(pos, mlen, offset, litlen, price) \ 198 opt[pos].mlen = (int)mlen; \ 220 size_t i, llen, litlen, mlen, best_mle local [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | str2val.c | 51 val2str(buf, mlen) 53 size_t mlen; 56 size_t len = (mlen * 2) + mlen / 8 + 10; 61 for (i = 0, j = 0; i < mlen; i++) {
|
/external/openssh/ |
H A D | ed25519.c | 53 const unsigned char *m,unsigned long long mlen, 71 *smlen = mlen+64; 72 for(i=0;i<mlen;i++) 77 crypto_hash_sha512(hmg, sm+32, mlen+32); /* Generate k as h(extsk[32],...,extsk[63],m) */ 88 get_hram(hram, sm, sk+32, sm, mlen+64); 104 unsigned char *m,unsigned long long *mlen, 116 *mlen = (unsigned long long) -1; 136 *mlen = smlen-64; 51 crypto_sign_ed25519( unsigned char *sm,unsigned long long *smlen, const unsigned char *m,unsigned long long mlen, const unsigned char *sk ) argument 103 crypto_sign_ed25519_open( unsigned char *m,unsigned long long *mlen, const unsigned char *sm,unsigned long long smlen, const unsigned char *pk ) argument
|
H A D | msg.c | 48 u_int mlen = sshbuf_len(m); local 52 put_u32(buf, mlen + 1); 58 if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(m), mlen) != mlen) {
|
H A D | hmac.h | 31 int ssh_hmac_update(struct ssh_hmac_ctx *ctx, const void *m, size_t mlen)
|
H A D | digest.h | 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 62 int ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen)
|
H A D | ssh-ed25519.c | 104 unsigned long long smlen = 0, mlen = 0; local 136 mlen = smlen; 137 if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) { 143 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen, 148 if (ret != 0 || mlen != datalen) { 161 explicit_bzero(m, smlen); /* NB mlen may be invalid if r != 0 */
|
H A D | digest-openssl.c | 142 ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen) argument 144 if (EVP_DigestUpdate(&ctx->mdctx, m, mlen) != 1) 183 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 195 if (!EVP_Digest(m, mlen, d, &mdlen, digest->mdfunc(), NULL))
|
H A D | digest-libc.c | 40 typedef void md_update_fn(void *mdctx, const u_int8_t *m, size_t mlen); 198 ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen) argument 204 digest->md_update(ctx->mdctx, m, mlen); 246 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 252 if (ssh_digest_update(ctx, m, mlen) != 0 ||
|
H A D | hmac.c | 93 ssh_hmac_update(struct ssh_hmac_ctx *ctx, const void *m, size_t mlen) argument 95 return ssh_digest_update(ctx->digest, m, mlen); 141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) argument 150 ssh_hmac_update(ctx, m, mlen) < 0 ||
|
H A D | ssh-pkcs11-helper.c | 106 int mlen = buffer_len(m); local 108 buffer_put_int(&oqueue, mlen); 109 buffer_append(&oqueue, buffer_ptr(m), mlen); 110 buffer_consume(m, mlen);
|
/external/kernel-headers/original/uapi/scsi/ |
H A D | scsi_netlink.h | 113 #define INIT_SCSI_NL_HDR(hdr, t, mtype, mlen) \ 119 (hdr)->msglen = mlen; \
|
/external/libconstrainedcrypto/test/ |
H A D | ecdsa_test.c | 223 int mlen; local 234 message = parsehex(sig, &mlen); \ 235 int result = dsa_sig_unpack(message, mlen, &r, &s); \ 266 message = parsehex(message_##n, &mlen); \ 267 SHA256_hash(message, mlen, hash_buf); \
|
H A D | rsa_test.c | 803 int mlen; local 808 message = parsehex(message_##n, &mlen); \ 809 SHA_hash(message, mlen, hash); \
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
H A D | brw_fs_generator.cpp | 329 fire_fb_write(inst, payload, implied_header, inst->mlen); 348 fire_fb_write(inst, offset(payload, 1), implied_header, inst->mlen-1); 351 fire_fb_write(inst, payload, implied_header, inst->mlen); 435 ((fs_inst *)inst->get_next())->mlen > 0) { 468 brw_inst_set_mlen(p->devinfo, send, inst->mlen); 496 brw_inst_set_mlen(p->devinfo, insn, inst->mlen); 614 inst->mlen, 770 assert(inst->mlen == 6); 772 assert(inst->mlen <= 4); 777 assert(inst->mlen 1282 uint32_t simd_mode, rlen, mlen; local [all...] |
H A D | brw_vec4_cse.cpp | 91 return inst->mlen == 0; 126 a->mlen == b->mlen && 149 if (is_expression(inst) && !inst->predicate && inst->mlen == 0 &&
|
H A D | brw_vec4_visitor.cpp | 54 this->mlen = 0; 262 inst->mlen = 2; 276 inst->mlen = 3; 361 math->mlen = src1.file == BAD_FILE ? 1 : 2; 800 pull->mlen = 2; 818 pull->mlen = 1; 825 pull->mlen = 1; 870 inst->mlen = 2; 874 inst->mlen = 1; 967 * - Sampleinfo message - takes no parameters, but mlen [all...] |
/external/autotest/client/cros/cellular/ |
H A D | sms.py | 57 mlen = len(pdu)/2 - smsc_len - 1 63 '+CMGR: 1,,%d\r\n%s' % (mlen, pdu), '') 90 mlen = len(pdu)/2 - smsc_len - 1 91 response = response + '+CMGL: %d,1,,%d\r\n%s\r\n' % (i, mlen, pdu)
|
/external/ppp/pppd/include/net/ |
H A D | vjcompress.h | 134 extern u_int vj_compress_tcp __P((struct ip *ip, u_int mlen,
|
/external/dhcpcd-6.8.2/ |
H A D | auth.c | 101 * m and mlen refer to the whole message. 107 const uint8_t *m, size_t mlen, int mp, int mt, 125 if (data < m || data > m + mlen || data + dlen > m + mlen) { 315 mm = malloc(mlen); 318 memcpy(mm, m, mlen); 330 hmac_md5(mm, mlen, t->key, t->key_len, hmac); 469 * m and mlen refer to the whole message. 476 uint8_t *m, size_t mlen, int mp, int mt, 565 if (data < m || data > m + mlen || dat 106 dhcp_auth_validate(struct authstate *state, const struct auth *auth, const uint8_t *m, size_t mlen, int mp, int mt, const uint8_t *data, size_t dlen) argument 475 dhcp_auth_encode(struct auth *auth, const struct token *t, uint8_t *m, size_t mlen, int mp, int mt, uint8_t *data, size_t dlen) argument [all...] |
/external/boringssl/src/crypto/fipsmodule/modes/ |
H A D | gcm.c | 556 uint64_t mlen = ctx->len.u[1]; local 566 mlen += len; 567 if (mlen > ((UINT64_C(1) << 36) - 32) || 568 (sizeof(len) == 8 && mlen < len)) { 571 ctx->len.u[1] = mlen; 686 uint64_t mlen = ctx->len.u[1]; local 696 mlen += len; 697 if (mlen > ((UINT64_C(1) << 36) - 32) || 698 (sizeof(len) == 8 && mlen < len)) { 701 ctx->len.u[1] = mlen; 825 uint64_t mlen = ctx->len.u[1]; local 926 uint64_t mlen = ctx->len.u[1]; local [all...] |
/external/ppp/pppd/ |
H A D | upap.c | 619 int mlen, ulen, wlen; local 664 mlen = p[0]; 665 if (len < mlen + 1) 668 p += mlen + 1; 669 len -= mlen + 1; 671 print_string(msg, mlen, printer, arg);
|
/external/wpa_supplicant_8/hostapd/src/l2_packet/ |
H A D | l2_packet_pcap.c | 94 size_t mlen = sizeof(*eth) + len; local 95 eth = os_malloc(mlen); 105 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); 107 ret = eth_send(l2->eth, (u8 *) eth, mlen);
|
/external/wpa_supplicant_8/src/l2_packet/ |
H A D | l2_packet_pcap.c | 94 size_t mlen = sizeof(*eth) + len; local 95 eth = os_malloc(mlen); 105 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); 107 ret = eth_send(l2->eth, (u8 *) eth, mlen);
|