/external/ipsec-tools/src/racoon/ |
D | privsep.c | 290 size_t *buflen; in privsep_init() local 309 data += combuf->bufs.buflen[i]; in privsep_init() 310 totallen += combuf->bufs.buflen[i]; in privsep_init() 345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 361 reply->bufs.buflen[0] = privkey->l; in privsep_init() 392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 398 if (combuf->bufs.buflen[count] == 0) in privsep_init() 401 [combuf->bufs.buflen[count] - 1] = '\0'; in privsep_init() 433 if (combuf->bufs.buflen[count] != sizeof(name)) { in privsep_init() 440 for (i = 0; combuf->bufs.buflen[count]; count++) in privsep_init() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | main_winsvc.c | 73 DWORD buflen, val; in read_interface() local 87 buflen = sizeof(ctrl_interface); in read_interface() 89 (LPBYTE) ctrl_interface, &buflen); in read_interface() 94 (int) buflen, (char *) ctrl_interface); in read_interface() 98 buflen = sizeof(adapter); in read_interface() 100 (LPBYTE) adapter, &buflen); in read_interface() 105 (int) buflen, (char *) adapter); in read_interface() 109 buflen = sizeof(config); in read_interface() 111 (LPBYTE) config, &buflen); in read_interface() 116 (int) buflen, (char *) config); in read_interface() [all …]
|
D | ctrl_iface.c | 167 size_t buflen) in wpa_supplicant_ctrl_iface_wps_pin() argument 189 ret = os_snprintf(buf, buflen, "%s", pin); in wpa_supplicant_ctrl_iface_wps_pin() 190 if (ret < 0 || (size_t) ret >= buflen) in wpa_supplicant_ctrl_iface_wps_pin() 200 ret = os_snprintf(buf, buflen, "%08d", ret); in wpa_supplicant_ctrl_iface_wps_pin() 201 if (ret < 0 || (size_t) ret >= buflen) in wpa_supplicant_ctrl_iface_wps_pin() 317 char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_status() argument 324 end = buf + buflen; in wpa_supplicant_ctrl_iface_status() 428 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_blacklist() argument 438 end = buf + buflen; in wpa_supplicant_ctrl_iface_blacklist() 482 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_log_level() argument [all …]
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
D | gcm_add_aad.c | 41 if (gcm->buflen > 16 || gcm->buflen < 0) { in gcm_add_aad() 52 if (gcm->ivmode || gcm->buflen != 12) { in gcm_add_aad() 53 for (x = 0; x < (unsigned long)gcm->buflen; x++) { in gcm_add_aad() 56 if (gcm->buflen) { in gcm_add_aad() 57 gcm->totlen += gcm->buflen * CONST64(8); in gcm_add_aad() 81 gcm->buflen = 0; in gcm_add_aad() 86 if (gcm->mode != GCM_MODE_AAD || gcm->buflen >= 16) { in gcm_add_aad() 92 if (gcm->buflen == 0) { in gcm_add_aad() 107 gcm->X[gcm->buflen++] ^= *adata++; in gcm_add_aad() 109 if (gcm->buflen == 16) { in gcm_add_aad() [all …]
|
D | gcm_process.c | 44 if (gcm->buflen > 16 || gcm->buflen < 0) { in gcm_process() 55 if (gcm->buflen) { in gcm_process() 56 gcm->totlen += gcm->buflen * CONST64(8); in gcm_process() 69 gcm->buflen = 0; in gcm_process() 79 if (gcm->buflen == 0) { in gcm_process() 122 if (gcm->buflen == 16) { in gcm_process() 133 gcm->buflen = 0; in gcm_process() 137 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen]; in gcm_process() 140 pt[x] = ct[x] ^ gcm->buf[gcm->buflen]; in gcm_process() 142 gcm->X[gcm->buflen++] ^= b; in gcm_process()
|
D | gcm_add_iv.c | 43 if (gcm->buflen >= 16 || gcm->buflen < 0) { in gcm_add_iv() 53 if (IVlen + gcm->buflen > 12) { in gcm_add_iv() 59 if (gcm->buflen == 0) { in gcm_add_iv() 73 gcm->buf[gcm->buflen++] = *IV++; in gcm_add_iv() 75 if (gcm->buflen == 16) { in gcm_add_iv() 81 gcm->buflen = 0; in gcm_add_iv()
|
/external/wpa_supplicant/ |
D | main_winsvc.c | 73 DWORD buflen; in read_interface() local 86 buflen = sizeof(ctrl_interface); in read_interface() 88 (LPBYTE) ctrl_interface, &buflen); in read_interface() 93 (int) buflen, (char *) ctrl_interface); in read_interface() 97 buflen = sizeof(adapter); in read_interface() 99 (LPBYTE) adapter, &buflen); in read_interface() 104 (int) buflen, (char *) adapter); in read_interface() 108 buflen = sizeof(config); in read_interface() 110 (LPBYTE) config, &buflen); in read_interface() 115 (int) buflen, (char *) config); in read_interface() [all …]
|
D | ctrl_iface.c | 206 char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_status() argument 213 end = buf + buflen; in wpa_supplicant_ctrl_iface_status() 319 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_blacklist() argument 330 end = buf + buflen; in wpa_supplicant_ctrl_iface_blacklist() 374 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_list_networks() argument 381 end = buf + buflen; in wpa_supplicant_ctrl_iface_list_networks() 532 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_scan_results() argument 545 end = buf + buflen; in wpa_supplicant_ctrl_iface_scan_results() 712 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_add_network() argument 725 ret = os_snprintf(buf, buflen, "%d\n", ssid->id); in wpa_supplicant_ctrl_iface_add_network() [all …]
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
D | pelican.c | 50 pelmac->buflen = 0; in pelican_init() 107 if (pelmac->buflen < 0 || pelmac->buflen > 15) { in pelican_process() 112 if (pelmac->buflen == 0) { in pelican_process() 126 pelmac->state[pelmac->buflen++] ^= *in++; in pelican_process() 127 if (pelmac->buflen == 16) { in pelican_process() 129 pelmac->buflen = 0; in pelican_process() 147 if (pelmac->buflen < 0 || pelmac->buflen > 16) { in pelican_done() 151 if (pelmac->buflen == 16) { in pelican_done() 153 pelmac->buflen = 0; in pelican_done() 155 pelmac->state[pelmac->buflen++] ^= 0x80; in pelican_done()
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
D | omac_process.c | 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_process() 40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_process() 45 if (omac->buflen == 0 && inlen > 16) { in omac_process() 62 if (omac->buflen == omac->blklen) { in omac_process() 69 omac->buflen = 0; in omac_process() 73 n = MIN(inlen, (unsigned long)(omac->blklen - omac->buflen)); in omac_process() 74 XMEMCPY(omac->block + omac->buflen, in, n); in omac_process() 75 omac->buflen += n; in omac_process()
|
D | omac_done.c | 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_done() 40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_done() 45 if (omac->buflen != omac->blklen) { in omac_done() 47 omac->block[omac->buflen++] = 0x80; in omac_done() 50 while (omac->buflen < omac->blklen) { in omac_done() 51 omac->block[omac->buflen++] = 0x00; in omac_done()
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
D | pmac_process.c | 40 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || in pmac_process() 41 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { in pmac_process() 46 if (pmac->buflen == 0 && inlen > 16) { in pmac_process() 67 if (pmac->buflen == pmac->block_len) { in pmac_process() 78 pmac->buflen = 0; in pmac_process() 82 n = MIN(inlen, (unsigned long)(pmac->block_len - pmac->buflen)); in pmac_process() 83 XMEMCPY(pmac->block + pmac->buflen, in, n); in pmac_process() 84 pmac->buflen += n; in pmac_process()
|
D | pmac_done.c | 30 if ((state->buflen > (int)sizeof(state->block)) || (state->buflen < 0) || in pmac_done() 31 (state->block_len > (int)sizeof(state->block)) || (state->buflen > state->block_len)) { in pmac_done() 38 if (state->buflen == state->block_len) { in pmac_done() 45 for (x = 0; x < state->buflen; x++) { in pmac_done()
|
/external/grub/stage2/ |
D | md5.c | 154 int buflen = length & 63; in md5_update() local 156 if (buflen + inputlen < 64) in md5_update() 158 memcpy (buffer + buflen, input, inputlen); in md5_update() 159 buflen += inputlen; in md5_update() 163 memcpy (buffer + buflen, input, 64 - buflen); in md5_update() 165 input += 64 - buflen; in md5_update() 166 inputlen -= 64 - buflen; in md5_update() 174 buflen = inputlen; in md5_update() 180 int i, buflen = length & 63; in md5_final() local 182 buffer[buflen++] = 0x80; in md5_final() [all …]
|
/external/ppp/pppd/ |
D | utils.c | 132 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() argument 141 int buflen; in slprintf() local 145 buflen = va_arg(args, int); in slprintf() 148 n = vslprintf(buf, buflen, fmt, args); in slprintf() 156 #define OUTCHAR(c) (buflen > 0? (--buflen, *buf++ = (c)): 0) 159 vslprintf(buf, buflen, fmt, args) in vslprintf() argument 161 int buflen; 178 --buflen; 179 while (buflen > 0) { 184 if (len > buflen) [all …]
|
/external/openssl/crypto/ecdh/ |
D | ech_ossl.c | 118 size_t buflen, len; in ecdh_compute_key() local 169 buflen = (EC_GROUP_get_degree(group) + 7)/8; in ecdh_compute_key() 171 if (len > buflen) in ecdh_compute_key() 176 if ((buf = OPENSSL_malloc(buflen)) == NULL) in ecdh_compute_key() 182 memset(buf, 0, buflen - len); in ecdh_compute_key() 183 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) in ecdh_compute_key() 191 if (KDF(buf, buflen, out, &outlen) == NULL) in ecdh_compute_key() 201 if (outlen > buflen) in ecdh_compute_key() 202 outlen = buflen; in ecdh_compute_key()
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
D | xcbc_process.c | 42 (xcbc->buflen > xcbc->blocksize) || (xcbc->buflen < 0)) { in xcbc_process() 47 if (xcbc->buflen == 0) { in xcbc_process() 60 if (xcbc->buflen == xcbc->blocksize) { in xcbc_process() 62 xcbc->buflen = 0; in xcbc_process() 64 xcbc->IV[xcbc->buflen++] ^= *in++; in xcbc_process()
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
D | f9_process.c | 39 (f9->buflen > f9->blocksize) || (f9->buflen < 0)) { in f9_process() 44 if (f9->buflen == 0) { in f9_process() 60 if (f9->buflen == f9->blocksize) { in f9_process() 65 f9->buflen = 0; in f9_process() 67 f9->IV[f9->buflen++] ^= *in++; in f9_process()
|
/external/tcpdump/ |
D | print-bgp.c | 428 decode_prefix4(const u_char *pptr, char *buf, u_int buflen) in decode_prefix4() argument 445 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen); in decode_prefix4() 453 decode_labeled_prefix4(const u_char *pptr, char *buf, u_int buflen) in decode_labeled_prefix4() argument 485 snprintf(buf, buflen, "%s/%d, label:%u %s", in decode_labeled_prefix4() 538 decode_rt_routing_info(const u_char *pptr, char *buf, u_int buflen) in decode_rt_routing_info() argument 564 snprintf(buf, buflen, "origin AS: %u, route target %s", in decode_rt_routing_info() 575 decode_labeled_vpn_prefix4(const u_char *pptr, char *buf, u_int buflen) in decode_labeled_vpn_prefix4() argument 599 snprintf(buf, buflen, "RD: %s, %s/%d, label:%u %s", in decode_labeled_vpn_prefix4() 622 #define UPDATE_BUF_BUFLEN(buf, buflen, strlen) \ argument 624 buflen=0; \ [all …]
|
/external/ipsec-tools/src/libipsec/ |
D | ipsec_dump_policy.c | 99 size_t off, buflen; local 187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir]) 197 if ((buf = malloc(buflen)) == NULL) { 204 snprintf(buf, buflen, "%s %s %c %u %s", 210 snprintf(buf, buflen, "%s %s %s", 216 snprintf(buf, buflen, "%s %s", 221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir], 256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1; 257 newbuf = (char *)realloc(buf, buflen); 264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf);
|
/external/chromium/third_party/libevent/ |
D | evutil.c | 224 evutil_snprintf(char *buf, size_t buflen, const char *format, ...) in evutil_snprintf() argument 229 r = evutil_vsnprintf(buf, buflen, format, ap); in evutil_snprintf() 235 evutil_vsnprintf(char *buf, size_t buflen, const char *format, va_list ap) in evutil_vsnprintf() argument 238 int r = _vsnprintf(buf, buflen, format, ap); in evutil_vsnprintf() 239 buf[buflen-1] = '\0'; in evutil_vsnprintf() 245 int r = vsnprintf(buf, buflen, format, ap); in evutil_vsnprintf() 246 buf[buflen-1] = '\0'; in evutil_vsnprintf()
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
D | wpa_debug.c | 300 const int buflen = 2048; in wpa_msg() local 303 buf = os_malloc(buflen); in wpa_msg() 310 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg() 323 const int buflen = 2048; in wpa_msg_ctrl() local 329 buf = os_malloc(buflen); in wpa_msg_ctrl() 336 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg_ctrl() 358 const int buflen = 2048; in hostapd_logger() local 361 buf = os_malloc(buflen); in hostapd_logger() 368 len = vsnprintf(buf, buflen, fmt, ap); in hostapd_logger()
|
/external/dropbear/ |
D | random.c | 41 static void readrand(unsigned char* buf, unsigned int buflen); 53 static void readrand(unsigned char* buf, unsigned int buflen) { in readrand() argument 87 if (buflen > 255) in readrand() 90 egdcmd[1] = (unsigned char)buflen; in readrand() 116 readlen = read(readfd, &buf[readpos], buflen - readpos); in readrand() 124 } while (readpos < buflen); in readrand()
|
D | signkey.c | 283 unsigned int buflen; in sign_key_md5_fingerprint() local 293 buflen = 4 + 3*MD5_HASH_SIZE; in sign_key_md5_fingerprint() 294 ret = (char*)m_malloc(buflen); in sign_key_md5_fingerprint() 296 memset(ret, 'Z', buflen); in sign_key_md5_fingerprint() 305 ret[buflen-1] = 0x0; in sign_key_md5_fingerprint() 318 unsigned int buflen; in sign_key_sha1_fingerprint() local 328 buflen = 5 + 3*SHA1_HASH_SIZE; in sign_key_sha1_fingerprint() 329 ret = (char*)m_malloc(buflen); in sign_key_sha1_fingerprint() 339 ret[buflen-1] = 0x0; in sign_key_sha1_fingerprint()
|
/external/bluetooth/glib/tests/ |
D | gio-test.c | 395 int buflen; in main() local 412 buflen = rand() % BUFSIZE; in main() 413 for (j = 0; j < buflen; j++) in main() 414 buf[j] = ' ' + ((buflen + j) % 95); in main() 417 (int)(sizeof(i) + sizeof(buflen)), buflen, writefd); in main() 420 write (writefd, &buflen, sizeof (buflen)); in main() 421 write (writefd, buf, buflen); in main()
|