/external/harfbuzz/src/ |
D | harfbuzz-hebrew.c | 78 int slen = 1; in HB_HebrewShape() local 137 shapedChars[slen] = 0x25cc; in HB_HebrewShape() 138 attributes[slen].clusterStart = TRUE; in HB_HebrewShape() 139 attributes[slen].mark = FALSE; in HB_HebrewShape() 140 attributes[slen].combiningClass = 0; in HB_HebrewShape() 141 cluster_start = slen; in HB_HebrewShape() 142 ++slen; in HB_HebrewShape() 153 shapedChars[slen] = uc[i]; in HB_HebrewShape() 156 attributes[slen].clusterStart = TRUE; in HB_HebrewShape() 157 attributes[slen].mark = FALSE; in HB_HebrewShape() [all …]
|
D | harfbuzz-greek.c | 364 int slen = 1; in HB_GreekShape() local 376 hb_uint16 base = shapedChars[slen-1]; in HB_GreekShape() 399 shapedChars[slen-1] = shaped; in HB_GreekShape() 408 shapedChars[slen] = uc[i]; in HB_GreekShape() 411 attributes[slen].clusterStart = TRUE; in HB_GreekShape() 412 attributes[slen].mark = FALSE; in HB_GreekShape() 413 attributes[slen].combiningClass = 0; in HB_GreekShape() 414 attributes[slen].dontPrint = HB_IsControlChar(uc[i]); in HB_GreekShape() 415 cluster_start = slen; in HB_GreekShape() 417 attributes[slen].clusterStart = FALSE; in HB_GreekShape() [all …]
|
/external/openssl/include/openssl/ |
D | asn1_mac.h | 111 c.slen = length; 125 (((c.inf&1) == 0)?(c.slen <= 0): \ 126 (c.eos=ASN1_const_check_infinite_end(&c.p,c.slen))) 131 if (func(&(b),&c.p,c.slen) == NULL) \ 133 c.slen-=(c.p-c.q); 138 if (((D2I_OF(type))func)(&(b),&c.p,c.slen) == NULL) \ 140 c.slen-=(c.p-c.q); 145 if (func(&(b),&c.p,c.slen) < 0) \ 147 c.slen-=(c.p-c.q); 150 if ((c.slen != 0) && ((M_ASN1_next & (~V_ASN1_CONSTRUCTED)) \ [all …]
|
/external/openssl/crypto/asn1/ |
D | asn1_mac.h | 111 c.slen = length; 125 (((c.inf&1) == 0)?(c.slen <= 0): \ 126 (c.eos=ASN1_const_check_infinite_end(&c.p,c.slen))) 131 if (func(&(b),&c.p,c.slen) == NULL) \ 133 c.slen-=(c.p-c.q); 138 if (((D2I_OF(type))func)(&(b),&c.p,c.slen) == NULL) \ 140 c.slen-=(c.p-c.q); 145 if (func(&(b),&c.p,c.slen) < 0) \ 147 c.slen-=(c.p-c.q); 150 if ((c.slen != 0) && ((M_ASN1_next & (~V_ASN1_CONSTRUCTED)) \ [all …]
|
D | a_d2i_fp.c | 192 c.inf=ASN1_get_object(&(c.p),&(c.slen),&(c.tag),&(c.xclass), in asn1_d2i_read_bio() 218 else if (eos && (c.slen == 0) && (c.tag == V_ASN1_EOC)) in asn1_d2i_read_bio() 230 want=c.slen; in asn1_d2i_read_bio() 260 if (off + c.slen < off) in asn1_d2i_read_bio() 265 off+=c.slen; in asn1_d2i_read_bio()
|
D | a_set.c | 189 c.inf=ASN1_get_object(&c.p,&c.slen,&c.tag,&c.xclass,c.max-c.p); in STACK_OF() 201 if ((c.slen+c.p) > c.max) in STACK_OF() 209 c.slen=length+ *pp-c.p; in STACK_OF() 210 c.max=c.p+c.slen; in STACK_OF() 219 if ((s=d2i(NULL,&c.p,c.slen)) == NULL) in STACK_OF()
|
D | f_int.c | 109 int num=0,slen=0,first=1; in a2i_ASN1_INTEGER() local 166 if (num+i > slen) in a2i_ASN1_INTEGER() 172 sp=OPENSSL_realloc_clean(s,slen,num+i*2); in a2i_ASN1_INTEGER() 180 slen=num+i*2; in a2i_ASN1_INTEGER()
|
D | evp_asn1.c | 162 if ((ai=d2i_ASN1_INTEGER(NULL,&c.p,c.slen)) == NULL) goto err; in ASN1_TYPE_get_int_octetstring() 163 c.slen-=(c.p-c.q); in ASN1_TYPE_get_int_octetstring() 165 if ((os=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) goto err; in ASN1_TYPE_get_int_octetstring() 166 c.slen-=(c.p-c.q); in ASN1_TYPE_get_int_octetstring()
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_sd.c | 242 u16 slen; in p2p_rx_gas_initial_req() local 275 slen = *pos++; in p2p_rx_gas_initial_req() 276 next = pos + slen; in p2p_rx_gas_initial_req() 277 if (next > end || slen < 2) { in p2p_rx_gas_initial_req() 295 slen = WPA_GET_LE16(pos); in p2p_rx_gas_initial_req() 297 if (pos + slen > end) in p2p_rx_gas_initial_req() 299 end = pos + slen; in p2p_rx_gas_initial_req() 311 slen = WPA_GET_LE16(pos); in p2p_rx_gas_initial_req() 313 if (pos + slen > end || slen < 3 + 1) { in p2p_rx_gas_initial_req() 404 u16 slen; in p2p_rx_gas_initial_resp() local [all …]
|
/external/openssh/openbsd-compat/ |
D | realpath.c | 58 int serrno, slen; in realpath() local 150 slen = readlink(resolved, symlink, sizeof(symlink) - 1); in realpath() 151 if (slen < 0) in realpath() 153 symlink[slen] = '\0'; in realpath() 171 if (symlink[slen - 1] != '/') { in realpath() 172 if (slen + 1 >= sizeof(symlink)) { in realpath() 176 symlink[slen] = '/'; in realpath() 177 symlink[slen + 1] = 0; in realpath()
|
D | mktemp.c | 51 mkstemps(char *path, int slen) in mkstemps() argument 55 return (_gettemp(path, &fd, 0, slen) ? fd : -1); in mkstemps() 73 _gettemp(path, doopen, domkdir, slen) in _gettemp() argument 77 int slen; 91 trv -= slen;
|
/external/openssh/ |
D | ssh-rsa.c | 46 u_int slen, dlen, len; in ssh_rsa_sign() local 64 slen = RSA_size(key->rsa); in ssh_rsa_sign() 65 sig = xmalloc(slen); in ssh_rsa_sign() 78 if (len < slen) { in ssh_rsa_sign() 79 u_int diff = slen - len; in ssh_rsa_sign() 80 debug("slen %u > len %u", slen, len); in ssh_rsa_sign() 83 } else if (len > slen) { in ssh_rsa_sign() 84 error("ssh_rsa_sign: slen %u slen2 %u", slen, len); in ssh_rsa_sign() 91 buffer_put_string(&b, sig, slen); in ssh_rsa_sign() 100 memset(sig, 's', slen); in ssh_rsa_sign()
|
D | ssh-pkcs11-client.c | 109 u_int blen, slen = 0; in pkcs11_rsa_private_encrypt() local 128 signature = buffer_get_string(&msg, &slen); in pkcs11_rsa_private_encrypt() 129 if (slen <= (u_int)RSA_size(rsa)) { in pkcs11_rsa_private_encrypt() 130 memcpy(to, signature, slen); in pkcs11_rsa_private_encrypt() 131 ret = slen; in pkcs11_rsa_private_encrypt()
|
D | auth2-hostbased.c | 63 u_int alen, blen, slen; in userauth_hostbased() local 75 sig = packet_get_string(&slen); in userauth_hostbased() 78 cuser, chost, pkalg, slen); in userauth_hostbased() 82 buffer_append(&b, sig, slen); in userauth_hostbased() 122 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b), in userauth_hostbased()
|
D | ssh-dss.c | 53 u_int rlen, slen, len, dlen; in ssh_dss_sign() local 74 slen = BN_num_bytes(sig->s); in ssh_dss_sign() 75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { in ssh_dss_sign() 76 error("bad sig size %u %u", rlen, slen); in ssh_dss_sign() 82 BN_bn2bin(sig->s, sigblob+ SIGBLOB_LEN - slen); in ssh_dss_sign()
|
D | kexdhc.c | 55 u_int klen, slen, sbloblen, hashlen; in kexdh_client() local 110 signature = packet_get_string(&slen); in kexdh_client() 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) in kexdh_client()
|
/external/iptables/extensions/ |
D | libxt_string.c | 93 int i=0, slen, sindex=0, schar; in parse_hex_string() local 97 slen = strlen(s); in parse_hex_string() 99 if (slen == 0) { in parse_hex_string() 104 while (i < slen) { in parse_hex_string() 119 if (i+1 >= slen) in parse_hex_string() 126 if (i+1 >= slen) { in parse_hex_string() 134 if (i+1 >= slen) { in parse_hex_string() 138 if (i+2 >= slen) { in parse_hex_string()
|
/external/chromium/base/ |
D | file_util_android.cc | 23 mkstemps(char *path, int slen) in mkstemps() argument 27 return (_gettemp(path, &fd, 0, slen) ? fd : -1); in mkstemps() 65 _gettemp(char *path, int *doopen, int domkdir, int slen) in _gettemp() argument 79 trv -= slen; in _gettemp()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | interworking.c | 963 const u8 *data, size_t slen) in interworking_parse_rx_anqp_resp() argument 976 wpa_hexdump_ascii(MSG_DEBUG, "ANQP: Venue Name", pos, slen); in interworking_parse_rx_anqp_resp() 979 bss->anqp_venue_name = wpabuf_alloc_copy(pos, slen); in interworking_parse_rx_anqp_resp() 987 "Type", pos, slen); in interworking_parse_rx_anqp_resp() 991 wpabuf_alloc_copy(pos, slen); in interworking_parse_rx_anqp_resp() 998 pos, slen); in interworking_parse_rx_anqp_resp() 1002 wpabuf_alloc_copy(pos, slen); in interworking_parse_rx_anqp_resp() 1010 pos, slen); in interworking_parse_rx_anqp_resp() 1014 wpabuf_alloc_copy(pos, slen); in interworking_parse_rx_anqp_resp() 1020 wpa_hexdump_ascii(MSG_DEBUG, "ANQP: NAI Realm", pos, slen); in interworking_parse_rx_anqp_resp() [all …]
|
/external/openssl/crypto/pem/ |
D | pem_pkey.c | 81 int slen; in PEM_read_bio_PrivateKey() local 122 } else if ((slen = pem_check_suffix(nm, "PRIVATE KEY")) > 0) in PEM_read_bio_PrivateKey() 125 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); in PEM_read_bio_PrivateKey() 161 int slen; in PEM_read_bio_Parameters() local 169 if ((slen = pem_check_suffix(nm, "PARAMETERS")) > 0) in PEM_read_bio_Parameters() 174 if (!EVP_PKEY_set_type_str(ret, nm, slen) in PEM_read_bio_Parameters()
|
/external/openssl/crypto/pkcs7/ |
D | example.c | 138 if ((os1=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) in get_signed_seq2string() 140 c.slen-=(c.p-c.q); in get_signed_seq2string() 143 if ((os2=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) in get_signed_seq2string() 145 c.slen-=(c.p-c.q); in get_signed_seq2string() 305 if ((os1=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) in sk_get_seq2string() 307 c.slen-=(c.p-c.q); in sk_get_seq2string() 310 if ((os2=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) in sk_get_seq2string() 312 c.slen-=(c.p-c.q); in sk_get_seq2string()
|
/external/icu4c/test/intltest/ |
D | mnkytst.cpp | 82 int32_t slen = checkValue((rand() - source.length()) % source.length()); in TestCollationKey() local 86 source.extract(MIN(s, slen), MAX(s, slen), subs); in TestCollationKey() 157 int32_t slen = checkValue((rand() - source.length()) % source.length()); in TestCompare() local 161 source.extract(MIN(s, slen), MAX(s, slen), subs); in TestCompare()
|
/external/grub/stage2/ |
D | fsys_iso9660.c | 254 int slen; in iso9660_dir() 259 slen = rr_ptr.rr->len - (4+1); in iso9660_dir() 261 while (slen > 1) in iso9660_dir() 283 slen = 0; in iso9660_dir() 286 slen -= slp->len + 2; in iso9660_dir() 290 if (slen < 2) in iso9660_dir()
|
/external/mksh/src/ |
D | eval.c | 335 int slen = 0; in expand() local 339 type = varsub(&x, varname, sp, &stype, &slen); in expand() 375 sp += slen; in expand() 994 int slen; in varsub() local 1076 c = word[slen = 0] == CHAR ? word[1] : 0; in varsub() 1078 slen += 2; in varsub() 1080 c = word[slen + 0] == CHAR ? word[slen + 1] : 0; in varsub() 1083 slen += 2; in varsub() 1085 if (word[slen] == ADELIM) { in varsub() 1086 slen += 2; in varsub() [all …]
|
/external/ppp/pppd/ |
D | cbcp.c | 371 int slen; local 383 slen = strlen(us->us_number); 384 if (slen > 250) { 386 slen = 250; 389 len = 3 + 1 + slen + 1; 393 BCOPY(us->us_number, bufp, slen + 1);
|