Home
last modified time | relevance | path

Searched refs:tmp_buf (Results 1 – 6 of 6) sorted by relevance

/external/oprofile/libop/
Dop_xml_out.c98 char tmp_buf[MAX_BUF_LEN]; in open_xml_element() local
100 if (max_len >= sizeof(tmp_buf)) in open_xml_element()
103 if (snprintf(tmp_buf, sizeof(tmp_buf), "<%s%s", tag_name, in open_xml_element()
108 strncat(buffer, tmp_buf, sizeof(tmp_buf)); in open_xml_element()
116 char tmp_buf[MAX_BUF_LEN]; in close_xml_element() local
118 if (max_len >= sizeof(tmp_buf)) in close_xml_element()
122 if (snprintf(tmp_buf, sizeof(tmp_buf), "%s\n", (has_nested ? ">" : "/>")) < 0) { in close_xml_element()
127 if (snprintf(tmp_buf, sizeof(tmp_buf), "</%s>\n", tag_name) < 0) { in close_xml_element()
132 strncat(buffer, tmp_buf, sizeof(tmp_buf)); in close_xml_element()
139 char tmp_buf[MAX_BUF_LEN]; in init_xml_int_attr() local
[all …]
/external/openssl/ssl/
Dd1_clnt.c813 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; in dtls1_send_client_key_exchange() local
831 tmp_buf[0]=s->client_version>>8; in dtls1_send_client_key_exchange()
832 tmp_buf[1]=s->client_version&0xff; in dtls1_send_client_key_exchange()
833 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0) in dtls1_send_client_key_exchange()
836 s->session->master_key_length=sizeof tmp_buf; in dtls1_send_client_key_exchange()
842 n=RSA_public_encrypt(sizeof tmp_buf, in dtls1_send_client_key_exchange()
843 tmp_buf,p,rsa,RSA_PKCS1_PADDING); in dtls1_send_client_key_exchange()
846 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70; in dtls1_send_client_key_exchange()
864 tmp_buf,sizeof tmp_buf); in dtls1_send_client_key_exchange()
865 OPENSSL_cleanse(tmp_buf,sizeof tmp_buf); in dtls1_send_client_key_exchange()
[all …]
Ds3_clnt.c2081 unsigned char tmp_buf[SSL_MAX_MASTER_KEY_LENGTH]; in ssl3_send_client_key_exchange() local
2099 tmp_buf[0]=s->client_version>>8; in ssl3_send_client_key_exchange()
2100 tmp_buf[1]=s->client_version&0xff; in ssl3_send_client_key_exchange()
2101 if (RAND_bytes(&(tmp_buf[2]),sizeof tmp_buf-2) <= 0) in ssl3_send_client_key_exchange()
2104 s->session->master_key_length=sizeof tmp_buf; in ssl3_send_client_key_exchange()
2110 n=RSA_public_encrypt(sizeof tmp_buf, in ssl3_send_client_key_exchange()
2111 tmp_buf,p,rsa,RSA_PKCS1_PADDING); in ssl3_send_client_key_exchange()
2114 if (s->options & SSL_OP_PKCS1_CHECK_2) tmp_buf[0]=0x70; in ssl3_send_client_key_exchange()
2132 tmp_buf,sizeof tmp_buf); in ssl3_send_client_key_exchange()
2133 OPENSSL_cleanse(tmp_buf,sizeof tmp_buf); in ssl3_send_client_key_exchange()
[all …]
/external/openssl/crypto/evp/
Ddigest.c271 unsigned char *tmp_buf; in EVP_MD_CTX_copy_ex() local
288 tmp_buf = out->md_data; in EVP_MD_CTX_copy_ex()
291 else tmp_buf = NULL; in EVP_MD_CTX_copy_ex()
297 if (tmp_buf) in EVP_MD_CTX_copy_ex()
298 out->md_data = tmp_buf; in EVP_MD_CTX_copy_ex()
/external/openssl/crypto/x509/
Dx509_obj.c77 char tmp_buf[80]; in X509_NAME_oneline() local
109 i2t_ASN1_OBJECT(tmp_buf,sizeof(tmp_buf),ne->object); in X509_NAME_oneline()
110 s=tmp_buf; in X509_NAME_oneline()
/external/qemu/
Dblock.c622 uint8_t tmp_buf[SECTOR_SIZE]; in bdrv_pread() local
633 if (bdrv_read(bs, sector_num, tmp_buf, 1) < 0) in bdrv_pread()
635 memcpy(buf, tmp_buf + (offset & (SECTOR_SIZE - 1)), len); in bdrv_pread()
656 if (bdrv_read(bs, sector_num, tmp_buf, 1) < 0) in bdrv_pread()
658 memcpy(buf, tmp_buf, count); in bdrv_pread()
666 uint8_t tmp_buf[SECTOR_SIZE]; in bdrv_pwrite() local
677 if (bdrv_read(bs, sector_num, tmp_buf, 1) < 0) in bdrv_pwrite()
679 memcpy(tmp_buf + (offset & (SECTOR_SIZE - 1)), buf, len); in bdrv_pwrite()
680 if (bdrv_write(bs, sector_num, tmp_buf, 1) < 0) in bdrv_pwrite()
702 if (bdrv_read(bs, sector_num, tmp_buf, 1) < 0) in bdrv_pwrite()
[all …]