Home
last modified time | relevance | path

Searched refs:buflen (Results 1 – 25 of 205) sorted by relevance

123456789

/external/ipsec-tools/src/racoon/
Dprivsep.c290 size_t *buflen; in privsep_init() local
309 data += combuf->bufs.buflen[i]; in privsep_init()
310 totallen += combuf->bufs.buflen[i]; in privsep_init()
345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init()
361 reply->bufs.buflen[0] = privkey->l; in privsep_init()
392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init()
398 if (combuf->bufs.buflen[count] == 0) in privsep_init()
401 [combuf->bufs.buflen[count] - 1] = '\0'; in privsep_init()
433 if (combuf->bufs.buflen[count] != sizeof(name)) { in privsep_init()
440 for (i = 0; combuf->bufs.buflen[count]; count++) in privsep_init()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/
Dmain_winsvc.c73 DWORD buflen, val; in read_interface() local
87 buflen = sizeof(ctrl_interface); in read_interface()
89 (LPBYTE) ctrl_interface, &buflen); in read_interface()
94 (int) buflen, (char *) ctrl_interface); in read_interface()
98 buflen = sizeof(adapter); in read_interface()
100 (LPBYTE) adapter, &buflen); in read_interface()
105 (int) buflen, (char *) adapter); in read_interface()
109 buflen = sizeof(config); in read_interface()
111 (LPBYTE) config, &buflen); in read_interface()
116 (int) buflen, (char *) config); in read_interface()
[all …]
Dctrl_iface.c167 size_t buflen) in wpa_supplicant_ctrl_iface_wps_pin() argument
189 ret = os_snprintf(buf, buflen, "%s", pin); in wpa_supplicant_ctrl_iface_wps_pin()
190 if (ret < 0 || (size_t) ret >= buflen) in wpa_supplicant_ctrl_iface_wps_pin()
200 ret = os_snprintf(buf, buflen, "%08d", ret); in wpa_supplicant_ctrl_iface_wps_pin()
201 if (ret < 0 || (size_t) ret >= buflen) in wpa_supplicant_ctrl_iface_wps_pin()
317 char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_status() argument
324 end = buf + buflen; in wpa_supplicant_ctrl_iface_status()
428 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_blacklist() argument
438 end = buf + buflen; in wpa_supplicant_ctrl_iface_blacklist()
482 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_log_level() argument
[all …]
/external/dropbear/libtomcrypt/src/encauth/gcm/
Dgcm_add_aad.c41 if (gcm->buflen > 16 || gcm->buflen < 0) { in gcm_add_aad()
52 if (gcm->ivmode || gcm->buflen != 12) { in gcm_add_aad()
53 for (x = 0; x < (unsigned long)gcm->buflen; x++) { in gcm_add_aad()
56 if (gcm->buflen) { in gcm_add_aad()
57 gcm->totlen += gcm->buflen * CONST64(8); in gcm_add_aad()
81 gcm->buflen = 0; in gcm_add_aad()
86 if (gcm->mode != GCM_MODE_AAD || gcm->buflen >= 16) { in gcm_add_aad()
92 if (gcm->buflen == 0) { in gcm_add_aad()
107 gcm->X[gcm->buflen++] ^= *adata++; in gcm_add_aad()
109 if (gcm->buflen == 16) { in gcm_add_aad()
[all …]
Dgcm_process.c44 if (gcm->buflen > 16 || gcm->buflen < 0) { in gcm_process()
55 if (gcm->buflen) { in gcm_process()
56 gcm->totlen += gcm->buflen * CONST64(8); in gcm_process()
69 gcm->buflen = 0; in gcm_process()
79 if (gcm->buflen == 0) { in gcm_process()
122 if (gcm->buflen == 16) { in gcm_process()
133 gcm->buflen = 0; in gcm_process()
137 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen]; in gcm_process()
140 pt[x] = ct[x] ^ gcm->buf[gcm->buflen]; in gcm_process()
142 gcm->X[gcm->buflen++] ^= b; in gcm_process()
Dgcm_add_iv.c43 if (gcm->buflen >= 16 || gcm->buflen < 0) { in gcm_add_iv()
53 if (IVlen + gcm->buflen > 12) { in gcm_add_iv()
59 if (gcm->buflen == 0) { in gcm_add_iv()
73 gcm->buf[gcm->buflen++] = *IV++; in gcm_add_iv()
75 if (gcm->buflen == 16) { in gcm_add_iv()
81 gcm->buflen = 0; in gcm_add_iv()
/external/wpa_supplicant/
Dmain_winsvc.c73 DWORD buflen; in read_interface() local
86 buflen = sizeof(ctrl_interface); in read_interface()
88 (LPBYTE) ctrl_interface, &buflen); in read_interface()
93 (int) buflen, (char *) ctrl_interface); in read_interface()
97 buflen = sizeof(adapter); in read_interface()
99 (LPBYTE) adapter, &buflen); in read_interface()
104 (int) buflen, (char *) adapter); in read_interface()
108 buflen = sizeof(config); in read_interface()
110 (LPBYTE) config, &buflen); in read_interface()
115 (int) buflen, (char *) config); in read_interface()
[all …]
Dctrl_iface.c206 char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_status() argument
213 end = buf + buflen; in wpa_supplicant_ctrl_iface_status()
319 struct wpa_supplicant *wpa_s, char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_blacklist() argument
330 end = buf + buflen; in wpa_supplicant_ctrl_iface_blacklist()
374 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_list_networks() argument
381 end = buf + buflen; in wpa_supplicant_ctrl_iface_list_networks()
532 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_scan_results() argument
545 end = buf + buflen; in wpa_supplicant_ctrl_iface_scan_results()
712 struct wpa_supplicant *wpa_s, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_add_network() argument
725 ret = os_snprintf(buf, buflen, "%d\n", ssid->id); in wpa_supplicant_ctrl_iface_add_network()
[all …]
/external/dropbear/libtomcrypt/src/mac/pelican/
Dpelican.c50 pelmac->buflen = 0; in pelican_init()
107 if (pelmac->buflen < 0 || pelmac->buflen > 15) { in pelican_process()
112 if (pelmac->buflen == 0) { in pelican_process()
126 pelmac->state[pelmac->buflen++] ^= *in++; in pelican_process()
127 if (pelmac->buflen == 16) { in pelican_process()
129 pelmac->buflen = 0; in pelican_process()
147 if (pelmac->buflen < 0 || pelmac->buflen > 16) { in pelican_done()
151 if (pelmac->buflen == 16) { in pelican_done()
153 pelmac->buflen = 0; in pelican_done()
155 pelmac->state[pelmac->buflen++] ^= 0x80; in pelican_done()
/external/dropbear/libtomcrypt/src/mac/omac/
Domac_process.c39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_process()
40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_process()
45 if (omac->buflen == 0 && inlen > 16) { in omac_process()
62 if (omac->buflen == omac->blklen) { in omac_process()
69 omac->buflen = 0; in omac_process()
73 n = MIN(inlen, (unsigned long)(omac->blklen - omac->buflen)); in omac_process()
74 XMEMCPY(omac->block + omac->buflen, in, n); in omac_process()
75 omac->buflen += n; in omac_process()
Domac_done.c39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_done()
40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_done()
45 if (omac->buflen != omac->blklen) { in omac_done()
47 omac->block[omac->buflen++] = 0x80; in omac_done()
50 while (omac->buflen < omac->blklen) { in omac_done()
51 omac->block[omac->buflen++] = 0x00; in omac_done()
/external/dropbear/libtomcrypt/src/mac/pmac/
Dpmac_process.c40 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || in pmac_process()
41 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { in pmac_process()
46 if (pmac->buflen == 0 && inlen > 16) { in pmac_process()
67 if (pmac->buflen == pmac->block_len) { in pmac_process()
78 pmac->buflen = 0; in pmac_process()
82 n = MIN(inlen, (unsigned long)(pmac->block_len - pmac->buflen)); in pmac_process()
83 XMEMCPY(pmac->block + pmac->buflen, in, n); in pmac_process()
84 pmac->buflen += n; in pmac_process()
Dpmac_done.c30 if ((state->buflen > (int)sizeof(state->block)) || (state->buflen < 0) || in pmac_done()
31 (state->block_len > (int)sizeof(state->block)) || (state->buflen > state->block_len)) { in pmac_done()
38 if (state->buflen == state->block_len) { in pmac_done()
45 for (x = 0; x < state->buflen; x++) { in pmac_done()
/external/grub/stage2/
Dmd5.c154 int buflen = length & 63; in md5_update() local
156 if (buflen + inputlen < 64) in md5_update()
158 memcpy (buffer + buflen, input, inputlen); in md5_update()
159 buflen += inputlen; in md5_update()
163 memcpy (buffer + buflen, input, 64 - buflen); in md5_update()
165 input += 64 - buflen; in md5_update()
166 inputlen -= 64 - buflen; in md5_update()
174 buflen = inputlen; in md5_update()
180 int i, buflen = length & 63; in md5_final() local
182 buffer[buflen++] = 0x80; in md5_final()
[all …]
/external/ppp/pppd/
Dutils.c132 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() argument
141 int buflen; in slprintf() local
145 buflen = va_arg(args, int); in slprintf()
148 n = vslprintf(buf, buflen, fmt, args); in slprintf()
156 #define OUTCHAR(c) (buflen > 0? (--buflen, *buf++ = (c)): 0)
159 vslprintf(buf, buflen, fmt, args) in vslprintf() argument
161 int buflen;
178 --buflen;
179 while (buflen > 0) {
184 if (len > buflen)
[all …]
/external/openssl/crypto/ecdh/
Dech_ossl.c118 size_t buflen, len; in ecdh_compute_key() local
169 buflen = (EC_GROUP_get_degree(group) + 7)/8; in ecdh_compute_key()
171 if (len > buflen) in ecdh_compute_key()
176 if ((buf = OPENSSL_malloc(buflen)) == NULL) in ecdh_compute_key()
182 memset(buf, 0, buflen - len); in ecdh_compute_key()
183 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) in ecdh_compute_key()
191 if (KDF(buf, buflen, out, &outlen) == NULL) in ecdh_compute_key()
201 if (outlen > buflen) in ecdh_compute_key()
202 outlen = buflen; in ecdh_compute_key()
/external/dropbear/libtomcrypt/src/mac/xcbc/
Dxcbc_process.c42 (xcbc->buflen > xcbc->blocksize) || (xcbc->buflen < 0)) { in xcbc_process()
47 if (xcbc->buflen == 0) { in xcbc_process()
60 if (xcbc->buflen == xcbc->blocksize) { in xcbc_process()
62 xcbc->buflen = 0; in xcbc_process()
64 xcbc->IV[xcbc->buflen++] ^= *in++; in xcbc_process()
/external/dropbear/libtomcrypt/src/mac/f9/
Df9_process.c39 (f9->buflen > f9->blocksize) || (f9->buflen < 0)) { in f9_process()
44 if (f9->buflen == 0) { in f9_process()
60 if (f9->buflen == f9->blocksize) { in f9_process()
65 f9->buflen = 0; in f9_process()
67 f9->IV[f9->buflen++] ^= *in++; in f9_process()
/external/tcpdump/
Dprint-bgp.c428 decode_prefix4(const u_char *pptr, char *buf, u_int buflen) in decode_prefix4() argument
445 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen); in decode_prefix4()
453 decode_labeled_prefix4(const u_char *pptr, char *buf, u_int buflen) in decode_labeled_prefix4() argument
485 snprintf(buf, buflen, "%s/%d, label:%u %s", in decode_labeled_prefix4()
538 decode_rt_routing_info(const u_char *pptr, char *buf, u_int buflen) in decode_rt_routing_info() argument
564 snprintf(buf, buflen, "origin AS: %u, route target %s", in decode_rt_routing_info()
575 decode_labeled_vpn_prefix4(const u_char *pptr, char *buf, u_int buflen) in decode_labeled_vpn_prefix4() argument
599 snprintf(buf, buflen, "RD: %s, %s/%d, label:%u %s", in decode_labeled_vpn_prefix4()
622 #define UPDATE_BUF_BUFLEN(buf, buflen, strlen) \ argument
624 buflen=0; \
[all …]
/external/ipsec-tools/src/libipsec/
Dipsec_dump_policy.c99 size_t off, buflen; local
187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir])
197 if ((buf = malloc(buflen)) == NULL) {
204 snprintf(buf, buflen, "%s %s %c %u %s",
210 snprintf(buf, buflen, "%s %s %s",
216 snprintf(buf, buflen, "%s %s",
221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir],
256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1;
257 newbuf = (char *)realloc(buf, buflen);
264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf);
/external/chromium/third_party/libevent/
Devutil.c224 evutil_snprintf(char *buf, size_t buflen, const char *format, ...) in evutil_snprintf() argument
229 r = evutil_vsnprintf(buf, buflen, format, ap); in evutil_snprintf()
235 evutil_vsnprintf(char *buf, size_t buflen, const char *format, va_list ap) in evutil_vsnprintf() argument
238 int r = _vsnprintf(buf, buflen, format, ap); in evutil_vsnprintf()
239 buf[buflen-1] = '\0'; in evutil_vsnprintf()
245 int r = vsnprintf(buf, buflen, format, ap); in evutil_vsnprintf()
246 buf[buflen-1] = '\0'; in evutil_vsnprintf()
/external/wpa_supplicant_6/wpa_supplicant/src/utils/
Dwpa_debug.c300 const int buflen = 2048; in wpa_msg() local
303 buf = os_malloc(buflen); in wpa_msg()
310 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg()
323 const int buflen = 2048; in wpa_msg_ctrl() local
329 buf = os_malloc(buflen); in wpa_msg_ctrl()
336 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg_ctrl()
358 const int buflen = 2048; in hostapd_logger() local
361 buf = os_malloc(buflen); in hostapd_logger()
368 len = vsnprintf(buf, buflen, fmt, ap); in hostapd_logger()
/external/dropbear/
Drandom.c41 static void readrand(unsigned char* buf, unsigned int buflen);
53 static void readrand(unsigned char* buf, unsigned int buflen) { in readrand() argument
87 if (buflen > 255) in readrand()
90 egdcmd[1] = (unsigned char)buflen; in readrand()
116 readlen = read(readfd, &buf[readpos], buflen - readpos); in readrand()
124 } while (readpos < buflen); in readrand()
Dsignkey.c283 unsigned int buflen; in sign_key_md5_fingerprint() local
293 buflen = 4 + 3*MD5_HASH_SIZE; in sign_key_md5_fingerprint()
294 ret = (char*)m_malloc(buflen); in sign_key_md5_fingerprint()
296 memset(ret, 'Z', buflen); in sign_key_md5_fingerprint()
305 ret[buflen-1] = 0x0; in sign_key_md5_fingerprint()
318 unsigned int buflen; in sign_key_sha1_fingerprint() local
328 buflen = 5 + 3*SHA1_HASH_SIZE; in sign_key_sha1_fingerprint()
329 ret = (char*)m_malloc(buflen); in sign_key_sha1_fingerprint()
339 ret[buflen-1] = 0x0; in sign_key_sha1_fingerprint()
/external/bluetooth/glib/tests/
Dgio-test.c395 int buflen; in main() local
412 buflen = rand() % BUFSIZE; in main()
413 for (j = 0; j < buflen; j++) in main()
414 buf[j] = ' ' + ((buflen + j) % 95); in main()
417 (int)(sizeof(i) + sizeof(buflen)), buflen, writefd); in main()
420 write (writefd, &buflen, sizeof (buflen)); in main()
421 write (writefd, buf, buflen); in main()

123456789