/external/dropbear/libtomcrypt/src/encauth/eax/ |
D | eax_test.c | 33 msglen; in eax_test() 231 tests[x].plaintext, tests[x].msglen, outct, outtag, &len)) != CRYPT_OK) { in eax_test() 234 … if (XMEMCMP(outct, tests[x].ciphertext, tests[x].msglen) || XMEMCMP(outtag, tests[x].tag, len)) { in eax_test() 238 for (y = 0; y < (unsigned long)tests[x].msglen; ) { in eax_test() 240 if (y < (unsigned long)(tests[x].msglen-1)) printf(", "); in eax_test() 256 outct, tests[x].msglen, outct, outtag, len, &res)) != CRYPT_OK) { in eax_test() 259 if ((res != 1) || XMEMCMP(outct, tests[x].plaintext, tests[x].msglen)) { in eax_test() 263 for (y = 0; y < (unsigned long)tests[x].msglen; ) { in eax_test() 265 if (y < (unsigned long)(tests[x].msglen-1)) printf(", "); in eax_test()
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/channel/ |
D | ChannelManager.java | 783 public void msgChannelExtendedData(byte[] msg, int msglen) throws IOException in msgChannelExtendedData() argument 785 if (msglen <= 13) in msgChannelExtendedData() 786 throw new IOException("SSH_MSG_CHANNEL_EXTENDED_DATA message has wrong size (" + msglen + ")"); in msgChannelExtendedData() 800 if (len != (msglen - 13)) in msgChannelExtendedData() 801 … new IOException("SSH_MSG_CHANNEL_EXTENDED_DATA message has wrong len (calculated " + (msglen - 13) in msgChannelExtendedData() 1061 public void msgChannelData(byte[] msg, int msglen) throws IOException in msgChannelData() argument 1063 if (msglen <= 9) in msgChannelData() 1064 throw new IOException("SSH_MSG_CHANNEL_DATA message has wrong size (" + msglen + ")"); in msgChannelData() 1074 if (len != (msglen - 9)) in msgChannelData() 1075 …throw new IOException("SSH_MSG_CHANNEL_DATA message has wrong len (calculated " + (msglen - 9) + "… in msgChannelData() [all …]
|
/external/ppp/pppd/ |
D | upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); [all …]
|
D | eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr; [all …]
|
/external/qemu/android/ |
D | adb-server.c | 151 _adb_host_append_message(AdbHost* adb_host, const void* msg, int msglen) in _adb_host_append_message() argument 153 printf("Append %d bytes to ADB host buffer.\n", msglen); in _adb_host_append_message() 157 adb_host->pending_send_buffer = (uint8_t*)malloc(msglen); in _adb_host_append_message() 158 adb_host->pending_send_buffer_size = msglen; in _adb_host_append_message() 159 } else if ((adb_host->pending_send_data_size + msglen) > in _adb_host_append_message() 163 adb_host->pending_send_data_size + msglen); in _adb_host_append_message() 165 adb_host->pending_send_data_size + msglen; in _adb_host_append_message() 170 adb_host->pending_send_data_size + msglen); in _adb_host_append_message() 177 msg, msglen); in _adb_host_append_message() 513 adb_server_on_guest_message(void* opaque, const uint8_t* msg, int msglen) in adb_server_on_guest_message() argument [all …]
|
D | hw-qemud.c | 223 typedef void (*QemudSerialReceive)( void* opaque, int channel, uint8_t* msg, int msglen); 522 int msglen ) in qemud_serial_send() argument 526 int avail, len = msglen; in qemud_serial_send() 528 if (msglen <= 0 || channel < 0) in qemud_serial_send() 532 __FUNCTION__, channel, msglen, in qemud_serial_send() 533 quote_bytes((const void*)msg, msglen)); in qemud_serial_send() 564 int2hex(frame, FRAME_HEADER_SIZE, msglen); in qemud_serial_send() 717 qemud_client_recv( void* opaque, uint8_t* msg, int msglen ) in qemud_client_recv() argument 724 c->clie_recv( c->clie_opaque, msg, msglen, c ); in qemud_client_recv() 735 if (msglen > FRAME_HEADER_SIZE && in qemud_client_recv() [all …]
|
D | adb-qemud.c | 179 _adb_client_recv(void* opaque, uint8_t* msg, int msglen, QemudClient* client) in _adb_client_recv() argument 184 adb_client, adb_client->opaque, msglen, QB(msg, msglen)); in _adb_client_recv() 191 adb_server_on_guest_message(adb_client->opaque, msg, msglen); in _adb_client_recv() 196 if (msglen == 6 && !memcmp(msg, "accept", 6)) { in _adb_client_recv() 213 if (msglen == 5 && !memcmp(msg, "start", 5)) { in _adb_client_recv() 223 QB(msg, msglen), adb_client->state); in _adb_client_recv() 302 _adb_dbg_client_recv(void* opaque, uint8_t* msg, int msglen, QemudClient* client) in _adb_dbg_client_recv() argument
|
D | hw-qemud.h | 73 typedef void (*QemudClientRecv) ( void* opaque, uint8_t* msg, int msglen, QemudClient* client ); 107 extern void qemud_client_send ( QemudClient* client, const uint8_t* msg, int msglen ); 147 int msglen );
|
D | hw-sensors.c | 252 _hwSensorClient_recv( void* opaque, uint8_t* msg, int msglen, in _hwSensorClient_recv() argument 257 _hwSensorClient_receive(cl, msg, msglen); in _hwSensorClient_recv() 272 _hwSensorClient_send( HwSensorClient* cl, const uint8_t* msg, int msglen ) in _hwSensorClient_send() argument 274 D("%s: '%s'", __FUNCTION__, quote_bytes((const void*)msg, msglen)); in _hwSensorClient_send() 275 qemud_client_send(cl->client, msg, msglen); in _hwSensorClient_send() 360 _hwSensorClient_receive( HwSensorClient* cl, uint8_t* msg, int msglen ) in _hwSensorClient_receive() argument 364 D("%s: '%.*s'", __FUNCTION__, msglen, msg); in _hwSensorClient_receive() 370 if (msglen == 12 && !memcmp(msg, "list-sensors", 12)) { in _hwSensorClient_receive() 388 if (msglen == 4 && !memcmp(msg, "wake", 4)) { in _hwSensorClient_receive() 396 if (msglen > 10 && !memcmp(msg, "set-delay:", 10)) { in _hwSensorClient_receive() [all …]
|
D | hw-control.c | 57 int msglen, in _hw_control_qemud_client_recv() argument 60 hw_control_do_query(opaque, msg, msglen); in _hw_control_qemud_client_recv()
|
D | boot-properties.c | 296 int msglen, in boot_property_client_recv() argument 302 if (msglen == 4 && !memcmp(msg, "list", 4)) { in boot_property_client_recv() 315 D("%s: ignoring unknown command: %.*s", __FUNCTION__, msglen, msg); in boot_property_client_recv()
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
D | pkcs_1_v1_5_decode.c | 33 unsigned long msglen, in pkcs_1_v1_5_decode() argument 50 if ((msglen > modulus_len) || (modulus_len < 11)) { in pkcs_1_v1_5_decode() 90 if (*outlen < (msglen - (2 + ps_len + 1))) { in pkcs_1_v1_5_decode() 91 *outlen = msglen - (2 + ps_len + 1); in pkcs_1_v1_5_decode() 96 *outlen = (msglen - (2 + ps_len + 1)); in pkcs_1_v1_5_decode()
|
D | pkcs_1_v1_5_encode.c | 34 unsigned long msglen, in pkcs_1_v1_5_encode() argument 61 if ((msglen + 11) > modulus_len) { in pkcs_1_v1_5_encode() 73 ps_len = modulus_len - msglen - 3; in pkcs_1_v1_5_encode() 99 XMEMCPY(&out[2 + ps_len + 1], msg, msglen); in pkcs_1_v1_5_encode()
|
D | pkcs_1_oaep_encode.c | 34 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, in pkcs_1_oaep_encode() argument 62 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { in pkcs_1_oaep_encode() 99 y = modulus_len - msglen - 2*hLen - 2; in pkcs_1_oaep_encode() 107 XMEMCPY(DB+x, msg, msglen); in pkcs_1_oaep_encode() 108 x += msglen; in pkcs_1_oaep_encode()
|
D | pkcs_1_oaep_decode.c | 33 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen, in pkcs_1_oaep_decode() argument 59 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) { in pkcs_1_oaep_decode()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_pkcs.h | 28 unsigned long msglen, 37 unsigned long msglen, 45 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, 51 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen,
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
D | ctr_test.c | 26 int keylen, msglen; in ctr_test() 66 if ((err = ctr_encrypt(tests[x].pt, buf, tests[x].msglen, &ctr)) != CRYPT_OK) { in ctr_test() 70 if (XMEMCMP(buf, tests[x].ct, tests[x].msglen)) { in ctr_test()
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
D | f9_test.c | 29 int msglen; in f9_test() 61 … if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { in f9_test()
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
D | xcbc_test.c | 29 int msglen; in xcbc_test() 111 …if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK)… in xcbc_test()
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
D | omac_test.c | 30 int keylen, msglen; in omac_test() 89 …if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &le… in omac_test()
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
D | pmac_test.c | 31 int msglen; in pmac_test() 137 …if ((err = pmac_memory(idx, tests[x].key, 16, tests[x].msg, tests[x].msglen, outtag, &len)) != CRY… in pmac_test()
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
D | SFTPv3Client.java | 204 int msglen = len + 1; in sendMessage() local 208 msglen += 4; in sendMessage() 211 os.write(msglen >> 24); in sendMessage() 212 os.write(msglen >> 16); in sendMessage() 213 os.write(msglen >> 8); in sendMessage() 214 os.write(msglen); in sendMessage() 265 byte[] msglen = new byte[4]; in receiveMessage() 267 readBytes(msglen, 0, 4); in receiveMessage() 269 …int len = (((msglen[0] & 0xff) << 24) | ((msglen[1] & 0xff) << 16) | ((msglen[2] & 0xff) << 8) | (… in receiveMessage()
|
/external/ipsec-tools/src/libipsec/ |
D | policy_parse.y | 586 policy_parse(msg, msglen) in policy_parse() argument 588 int msglen; 619 ipsec_set_policy(msg, msglen) in ipsec_set_policy() argument 621 int msglen; 625 policy = policy_parse(msg, msglen);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
D | TransportManager.java | 717 int msglen; in receiveLoop() local 720 msglen = tc.receiveMessage(msg, 0, msg.length); in receiveLoop() 745 TypesReader tr = new TypesReader(msg, 0, msglen); in receiveLoop() 774 TypesReader tr = new TypesReader(msg, 0, msglen); in receiveLoop() 822 km.handleMessage(msg, msglen); in receiveLoop() 843 mh.handleMessage(msg, msglen); in receiveLoop()
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | preauth.c | 142 size_t msglen; in rsn_preauth_eapol_send() local 151 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send() 155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send() 157 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()
|