/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
D | der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; in der_decode_bit_string() local 62 dlen = 0; in der_decode_bit_string() 64 dlen = (dlen << 8) | (unsigned long)in[x++]; in der_decode_bit_string() 68 dlen = in[x++] & 0x7F; in der_decode_bit_string() 72 if ((dlen == 0) || (dlen + x > inlen)) { in der_decode_bit_string() 77 blen = ((dlen - 1) << 3) - (in[x++] & 7); in der_decode_bit_string()
|
/external/openssl/crypto/ecdsa/ |
D | ecs_sign.c | 62 ECDSA_SIG *ECDSA_do_sign(const unsigned char *dgst, int dlen, EC_KEY *eckey) in ECDSA_do_sign() argument 64 return ECDSA_do_sign_ex(dgst, dlen, NULL, NULL, eckey); in ECDSA_do_sign() 67 ECDSA_SIG *ECDSA_do_sign_ex(const unsigned char *dgst, int dlen, in ECDSA_do_sign_ex() argument 73 return ecdsa->meth->ecdsa_do_sign(dgst, dlen, kinv, rp, eckey); in ECDSA_do_sign_ex() 76 int ECDSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char in ECDSA_sign() argument 79 return ECDSA_sign_ex(type, dgst, dlen, sig, siglen, NULL, NULL, eckey); in ECDSA_sign() 82 int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char in ECDSA_sign_ex() argument 87 RAND_seed(dgst, dlen); in ECDSA_sign_ex() 88 s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey); in ECDSA_sign_ex()
|
/external/openssh/openbsd-compat/ |
D | strlcat.c | 40 size_t dlen; in strlcat() local 45 dlen = d - dst; in strlcat() 46 n = siz - dlen; in strlcat() 49 return(dlen + strlen(s)); in strlcat() 59 return(dlen + (s - src)); /* count does not include NUL */ in strlcat()
|
D | port-tun.c | 250 sys_tun_outfilter(struct Channel *c, u_char **data, u_int *dlen) in sys_tun_outfilter() argument 255 *data = buffer_get_string(&c->output, dlen); in sys_tun_outfilter() 256 if (*dlen < sizeof(*af)) in sys_tun_outfilter() 261 *dlen -= sizeof(u_int32_t); in sys_tun_outfilter()
|
/external/tcpdump/missing/ |
D | strlcat.c | 56 size_t dlen; in strlcat() local 61 dlen = d - dst; in strlcat() 62 n = siz - dlen; in strlcat() 65 return(dlen + strlen(s)); in strlcat() 75 return(dlen + (s - src)); /* count does not include NUL */ in strlcat()
|
/external/openssl/crypto/cmac/ |
D | cmac.c | 215 int CMAC_Update(CMAC_CTX *ctx, const void *in, size_t dlen) in CMAC_Update() argument 221 return FIPS_cmac_update(ctx, in, dlen); in CMAC_Update() 225 if (dlen == 0) in CMAC_Update() 233 if (dlen < nleft) in CMAC_Update() 234 nleft = dlen; in CMAC_Update() 236 dlen -= nleft; in CMAC_Update() 239 if (dlen == 0) in CMAC_Update() 247 while(dlen > bl) in CMAC_Update() 251 dlen -= bl; in CMAC_Update() 255 memcpy(ctx->last_block, data, dlen); in CMAC_Update() [all …]
|
/external/openssh/ |
D | ssh-ecdsa.c | 54 u_int len, dlen; in ssh_ecdsa_sign() local 65 EVP_DigestFinal(&md, digest, &dlen); in ssh_ecdsa_sign() 67 sig = ECDSA_do_sign(digest, dlen, key->ecdsa); in ssh_ecdsa_sign() 103 u_int len, dlen; in ssh_ecdsa_verify() local 156 EVP_DigestFinal(&md, digest, &dlen); in ssh_ecdsa_verify() 158 ret = ECDSA_do_verify(digest, dlen, sig, key->ecdsa); in ssh_ecdsa_verify()
|
D | ssh-dss.c | 53 u_int rlen, slen, len, dlen; in ssh_dss_sign() local 63 EVP_DigestFinal(&md, digest, &dlen); in ssh_dss_sign() 65 sig = DSA_do_sign(digest, dlen, key->dsa); in ssh_dss_sign() 116 u_int len, dlen; in ssh_dss_verify() local 177 EVP_DigestFinal(&md, digest, &dlen); in ssh_dss_verify() 179 ret = DSA_do_verify(digest, dlen, sig, key->dsa); in ssh_dss_verify()
|
D | ssh-rsa.c | 46 u_int slen, dlen, len; in ssh_rsa_sign() local 62 EVP_DigestFinal(&md, digest, &dlen); in ssh_rsa_sign() 67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); in ssh_rsa_sign() 115 u_int len, dlen, modlen; in ssh_rsa_verify() local 169 EVP_DigestFinal(&md, digest, &dlen); in ssh_rsa_verify() 171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa); in ssh_rsa_verify()
|
D | auth1.c | 119 u_int dlen; in auth1_process_password() local 126 password = packet_get_string(&dlen); in auth1_process_password() 138 memset(password, 0, dlen); in auth1_process_password() 226 u_int dlen; in auth1_process_tis_response() local 228 response = packet_get_string(&dlen); in auth1_process_tis_response() 231 memset(response, 'r', dlen); in auth1_process_tis_response()
|
D | ssh-keysign.c | 159 u_int slen, dlen; in main() local 233 data = buffer_get_string(&b, &dlen); in main() 234 if (valid_request(pw, host, &key, data, dlen) < 0) in main() 249 if (key_sign(keys[i], &signature, &slen, data, dlen) != 0) in main()
|
/external/skia/src/effects/ |
D | SkDashPathEffect.cpp | 105 SkScalar dlen = SkScalarMul(fInitialDashLength, scale); in filterPath() local 108 SkASSERT(dlen >= 0); in filterPath() 110 if (is_even(index) && dlen > 0 && !skipFirstSegment) { in filterPath() 112 meas.getSegment(distance, distance + dlen, dst, true); in filterPath() 114 distance += dlen; in filterPath() 127 dlen = SkScalarMul(intervals[index], scale); in filterPath()
|
/external/linux-tools-perf/util/ |
D | strbuf.c | 54 const void *data, size_t dlen) in strbuf_splice() argument 63 if (dlen >= len) in strbuf_splice() 64 strbuf_grow(sb, dlen - len); in strbuf_splice() 65 memmove(sb->buf + pos + dlen, in strbuf_splice() 68 memcpy(sb->buf + pos, data, dlen); in strbuf_splice() 69 strbuf_setlen(sb, sb->len + dlen - len); in strbuf_splice()
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | crypto_cryptoapi.c | 167 DWORD dlen; in des_encrypt() local 214 dlen = 8; in des_encrypt() 215 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { in des_encrypt() 303 DWORD dlen; in aes_encrypt() local 306 dlen = 16; in aes_encrypt() 307 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { in aes_encrypt() 335 DWORD dlen; in aes_decrypt() local 338 dlen = 16; in aes_decrypt() 340 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { in aes_decrypt() 603 DWORD dlen; in crypto_cipher_encrypt() local [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_cryptoapi.c | 159 DWORD dlen; in des_encrypt() local 206 dlen = 8; in des_encrypt() 207 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { in des_encrypt() 294 DWORD dlen; in aes_encrypt() local 297 dlen = 16; in aes_encrypt() 298 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { in aes_encrypt() 326 DWORD dlen; in aes_decrypt() local 329 dlen = 16; in aes_decrypt() 331 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { in aes_decrypt() 593 DWORD dlen; in crypto_cipher_encrypt() local [all …]
|
/external/dropbear/ |
D | compat.c | 135 size_t dlen; local 140 dlen = d - dst; 141 n = siz - dlen; 144 return(dlen + strlen(s)); 154 return(dlen + (s - src)); /* count does not include NUL */
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 161 size_t pad, dlen; in eap_ttls_avp_parse() local 182 dlen = avp_length - sizeof(*avp); in eap_ttls_avp_parse() 184 if (dlen < 4) { in eap_ttls_avp_parse() 193 dlen -= 4; in eap_ttls_avp_parse() 196 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); in eap_ttls_avp_parse() 201 parse->eap = os_malloc(dlen); in eap_ttls_avp_parse() 208 os_memcpy(parse->eap, dpos, dlen); in eap_ttls_avp_parse() 209 parse->eap_len = dlen; in eap_ttls_avp_parse() 212 parse->eap_len + dlen); in eap_ttls_avp_parse() 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); in eap_ttls_avp_parse() [all …]
|
/external/iproute2/tc/ |
D | tc_stab.c | 147 unsigned i, j, dlen; in print_size_table() 149 dlen = RTA_PAYLOAD(tb[TCA_STAB_DATA]) / sizeof(__u16); in print_size_table() 152 for (i = 0; i < dlen/12; i++) { in print_size_table() 154 for (j = 0; i * 12 + j < dlen; j++) in print_size_table()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_ttls.c | 179 size_t pad, dlen; in eap_ttls_avp_parse() local 200 dlen = avp_length - sizeof(*avp); in eap_ttls_avp_parse() 202 if (dlen < 4) { in eap_ttls_avp_parse() 211 dlen -= 4; in eap_ttls_avp_parse() 214 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen); in eap_ttls_avp_parse() 219 parse->eap = os_malloc(dlen); in eap_ttls_avp_parse() 226 os_memcpy(parse->eap, dpos, dlen); in eap_ttls_avp_parse() 227 parse->eap_len = dlen; in eap_ttls_avp_parse() 230 parse->eap_len + dlen); in eap_ttls_avp_parse() 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); in eap_ttls_avp_parse() [all …]
|
/external/qemu/telephony/ |
D | sms.c | 501 int dlen, adjust = 0; in sms_get_sc_address() local 520 for (dlen = 0; dlen < len; dlen+=1) in sms_get_sc_address() 522 int c = cur[dlen]; in sms_get_sc_address() 526 if (dlen >= sizeof(address->data)) { in sms_get_sc_address() 536 address->data[dlen] = (byte_t) c; in sms_get_sc_address() 543 address->len = 2*dlen + adjust; in sms_get_sc_address() 582 int len, dlen; in sms_get_address() local 587 dlen = *cur++; in sms_get_address() 589 if (dlen == 0) { in sms_get_address() 596 if (cur + 1 + (dlen+1)/2 > end) in sms_get_address() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_ttls.c | 788 static int eap_ttls_parse_attr_eap(const u8 *dpos, size_t dlen, in eap_ttls_parse_attr_eap() argument 793 parse->eapdata = os_malloc(dlen); in eap_ttls_parse_attr_eap() 799 os_memcpy(parse->eapdata, dpos, dlen); in eap_ttls_parse_attr_eap() 800 parse->eap_len = dlen; in eap_ttls_parse_attr_eap() 802 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); in eap_ttls_parse_attr_eap() 808 os_memcpy(neweap + parse->eap_len, dpos, dlen); in eap_ttls_parse_attr_eap() 810 parse->eap_len += dlen; in eap_ttls_parse_attr_eap() 823 size_t dlen; in eap_ttls_parse_avp() local 848 dlen = avp_length - sizeof(*avp); in eap_ttls_parse_avp() 850 if (dlen < 4) { in eap_ttls_parse_avp() [all …]
|
/external/openssl/crypto/dsa/ |
D | dsa_asn1.c | 153 int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, in DSA_sign() argument 157 RAND_seed(dgst, dlen); in DSA_sign() 158 s=DSA_do_sign(dgst,dlen,dsa); in DSA_sign()
|
D | dsa_sign.c | 66 DSA_SIG * DSA_do_sign(const unsigned char *dgst, int dlen, DSA *dsa) in DSA_do_sign() argument 76 return dsa->meth->dsa_do_sign(dgst, dlen, dsa); in DSA_do_sign()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.c | 1264 size_t i, dlen; in radius_msg_get_attr() local 1277 dlen = attr->length - sizeof(*attr); in radius_msg_get_attr() 1279 os_memcpy(buf, (attr + 1), dlen > len ? len : dlen); in radius_msg_get_attr() 1280 return dlen; in radius_msg_get_attr() 1344 size_t dlen; in radius_msg_get_vlanid() local 1353 dlen = attr->length - sizeof(*attr); in radius_msg_get_vlanid() 1377 dlen--; in radius_msg_get_vlanid() 1379 if (dlen >= sizeof(buf)) in radius_msg_get_vlanid() 1381 os_memcpy(buf, data, dlen); in radius_msg_get_vlanid() 1382 buf[dlen] = '\0'; in radius_msg_get_vlanid() [all …]
|
/external/qemu/audio/ |
D | wavcapture.c | 35 uint8_t dlen[4]; in wav_destroy() local 41 le_store (dlen, datalen, 4); in wav_destroy() 47 qemu_put_buffer (wav->f, dlen, 4); in wav_destroy()
|