/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 401 size_t blen; in scard_get_aid() local 404 blen = sizeof(buf); in scard_get_aid() 405 if (scard_select_file(scard, SCARD_FILE_EF_DIR, buf, &blen)) { in scard_get_aid() 409 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR select", buf, blen); in scard_get_aid() 419 blen = sizeof(buf); in scard_get_aid() 420 if (rlen > (int) blen) { in scard_get_aid() 509 size_t blen; in scard_init() local 613 blen = sizeof(buf); in scard_init() 618 if (_scard_select_file(scard, SCARD_FILE_MF, buf, &blen, in scard_init() 632 blen = sizeof(buf); in scard_init() [all …]
|
D | wpabuf.c | 271 size_t blen; in wpabuf_zeropad() local 276 blen = wpabuf_len(buf); in wpabuf_zeropad() 277 if (blen >= len) in wpabuf_zeropad() 282 os_memset(wpabuf_put(ret, len - blen), 0, len - blen); in wpabuf_zeropad()
|
D | edit_readline.c | 131 size_t blen = os_strlen(ps) + 3; in edit_init() local 132 char *ps2 = os_malloc(blen); in edit_init() 134 os_snprintf(ps2, blen, "%s> ", ps); in edit_init()
|
/external/iproute2/lib/ |
D | ll_addr.c | 32 const char *ll_addr_n2a(unsigned char *addr, int alen, int type, char *buf, int blen) in ll_addr_n2a() argument 39 return inet_ntop(AF_INET, addr, buf, blen); in ll_addr_n2a() 42 return inet_ntop(AF_INET6, addr, buf, blen); in ll_addr_n2a() 47 snprintf(buf+l, blen, "%02x", addr[i]); in ll_addr_n2a() 48 blen -= 2; in ll_addr_n2a() 51 snprintf(buf+l, blen, ":%02x", addr[i]); in ll_addr_n2a() 52 blen -= 3; in ll_addr_n2a()
|
D | utils.c | 631 char *hexstring_n2a(const __u8 *str, int len, char *buf, int blen) in hexstring_n2a() argument 637 if (blen < 3) in hexstring_n2a() 641 blen -= 2; in hexstring_n2a() 642 if (i != len-1 && blen > 1) { in hexstring_n2a() 644 blen--; in hexstring_n2a() 650 __u8* hexstring_a2n(const char *str, __u8 *buf, int blen) in hexstring_a2n() argument 675 if (cnt < blen) { in hexstring_a2n() 683 if (cnt < blen) in hexstring_a2n() 684 memset(buf+cnt, 0, blen-cnt); in hexstring_a2n()
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
D | der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; in der_decode_bit_string() local 77 blen = ((dlen - 1) << 3) - (in[x++] & 7); in der_decode_bit_string() 80 if (blen > *outlen) { in der_decode_bit_string() 81 *outlen = blen; in der_decode_bit_string() 86 for (y = 0; y < blen; y++) { in der_decode_bit_string() 94 *outlen = blen; in der_decode_bit_string()
|
/external/svox/pico/lib/ |
D | picodata.c | 53 picoos_uint16 *blen); 57 picoos_uint16 *blen, const picoos_uint8 issd); 83 picoos_uint16 *blen); 87 picoos_uint16 *blen, const picoos_uint8 issd); 178 picoos_uint16 *blen, const picoos_uint8 issd) in data_cbGetItem() argument 183 *blen = 0; in data_cbGetItem() 192 *blen = PICODATA_ITEM_HEADSIZE + (picoos_uint8)(this->buf[((this->front) + in data_cbGetItem() 201 for (i=0; i<*blen; i++) { in data_cbGetItem() 206 *blen = 0; in data_cbGetItem() 211 if (*blen > this->len) { /* item in cb not complete? */ in data_cbGetItem() [all …]
|
D | picodata.h | 303 picoos_uint16 *blen); 315 picoos_uint16 *blen); 326 picoos_uint16 *blen); 374 picoos_uint8 *buf, const picoos_uint16 blenmax, picoos_uint16 *blen);
|
/external/openssh/ |
D | ssh-pkcs11-client.c | 109 u_int blen, slen = 0; in pkcs11_rsa_private_encrypt() local 117 if (key_to_blob(&key, &blob, &blen) == 0) in pkcs11_rsa_private_encrypt() 121 buffer_put_string(&msg, blob, blen); in pkcs11_rsa_private_encrypt() 188 u_int blen; in pkcs11_add_provider() local 205 blob = buffer_get_string(&msg, &blen); in pkcs11_add_provider() 207 k = key_from_blob(blob, blen); in pkcs11_add_provider()
|
D | auth2-pubkey.c | 74 u_int alen, blen, slen; in userauth_pubkey() local 86 pkblob = packet_get_string(&blen); in userauth_pubkey() 88 buffer_append(&b, pkblob, blen); in userauth_pubkey() 94 pkblob = packet_get_string(&blen); in userauth_pubkey() 103 key = key_from_blob(pkblob, blen); in userauth_pubkey() 136 buffer_put_string(&b, pkblob, blen); in userauth_pubkey() 163 packet_put_string(pkblob, blen); in userauth_pubkey()
|
D | ssh-pkcs11-helper.c | 120 u_int blen; in process_add() local 130 key_to_blob(keys[i], &blob, &blen); in process_add() 131 buffer_put_string(&msg, blob, blen); in process_add() 170 u_int blen, dlen, slen = 0; in process_sign() local 175 blob = get_string(&blen); in process_sign() 179 if ((key = key_from_blob(blob, blen)) != NULL) { in process_sign()
|
D | auth2-hostbased.c | 63 u_int alen, blen, slen; in userauth_hostbased() local 72 pkblob = packet_get_string(&blen); in userauth_hostbased() 93 key = key_from_blob(pkblob, blen); in userauth_hostbased() 113 buffer_put_string(&b, pkblob, blen); in userauth_hostbased()
|
D | authfd.c | 319 u_int blen; in ssh_get_next_identity() local 343 blob = buffer_get_string(&auth->identities, &blen); in ssh_get_next_identity() 345 key = key_from_blob(blob, blen); in ssh_get_next_identity() 424 u_int blen; in ssh_agent_sign() local 428 if (key_to_blob(key, &blob, &blen) == 0) in ssh_agent_sign() 436 buffer_put_string(&msg, blob, blen); in ssh_agent_sign() 600 u_int blen; in ssh_remove_identity() local 612 key_to_blob(key, &blob, &blen); in ssh_remove_identity() 614 buffer_put_string(&msg, blob, blen); in ssh_remove_identity()
|
D | ssh-keysign.c | 68 u_int blen, len; in valid_request() local 103 pkblob = buffer_get_string(&b, &blen); in valid_request() 108 else if ((key = key_from_blob(pkblob, blen)) == NULL) in valid_request()
|
D | monitor_wrap.c | 469 mm_newkeys_from_blob(u_char *blob, int blen) in mm_newkeys_from_blob() argument 478 debug3("%s: %p(%d)", __func__, blob, blen); in mm_newkeys_from_blob() 480 dump_base64(stderr, blob, blen); in mm_newkeys_from_blob() 483 buffer_append(&b, blob, blen); in mm_newkeys_from_blob() 1088 u_int blen; in mm_auth_rsa_key_allowed() local 1107 blob = buffer_get_string(&m, &blen); in mm_auth_rsa_key_allowed() 1108 if ((key = key_from_blob(blob, blen)) == NULL) in mm_auth_rsa_key_allowed() 1124 u_int blen; in mm_auth_rsa_generate_challenge() local 1132 if (key_to_blob(key, &blob, &blen) == 0) in mm_auth_rsa_generate_challenge() 1137 buffer_put_string(&m, blob, blen); in mm_auth_rsa_generate_challenge() [all …]
|
/external/libxml2/ |
D | nanohttp.c | 1343 int blen; in xmlNanoHTTPMethodRedir() local 1381 blen = strlen(ctxt->hostname) * 2 + 16; in xmlNanoHTTPMethodRedir() 1385 blen = strlen(ctxt->hostname); in xmlNanoHTTPMethodRedir() 1398 blen += 36; in xmlNanoHTTPMethodRedir() 1401 blen += strlen(headers) + 2; in xmlNanoHTTPMethodRedir() 1404 blen += strlen(*contentType) + 16; in xmlNanoHTTPMethodRedir() 1407 blen += strlen(ctxt->query) + 1; in xmlNanoHTTPMethodRedir() 1408 blen += strlen(method) + strlen(ctxt->path) + 24; in xmlNanoHTTPMethodRedir() 1411 blen += 23; in xmlNanoHTTPMethodRedir() 1416 blen += 12; in xmlNanoHTTPMethodRedir() [all …]
|
/external/ipsec-tools/src/racoon/ |
D | policy.c | 444 int blen, i; local 446 blen = sizeof(buf) - 1; 456 i = snprintf(p, blen, "%s/%d[%s ", a, spidx->prefs, b); 457 if (i < 0 || i >= blen) 460 blen -= i; 469 i = snprintf(p, blen, "%s/%d[%s ", a, spidx->prefd, b); 470 if (i < 0 || i >= blen) 473 blen -= i; 475 i = snprintf(p, blen, "proto=%s dir=%s", 481 blen -= i; [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | win_if_list.c | 77 size_t blen = sizeof(*b) + 1024; in ndisuio_query_bindings() local 84 b = malloc(blen); in ndisuio_query_bindings() 89 memset(b, 0, blen); in ndisuio_query_bindings() 93 (DWORD) blen, &written, NULL)) { in ndisuio_query_bindings()
|
/external/webkit/Source/JavaScriptCore/tests/mozilla/js1_2/Array/ |
D | tostring_1.js | 108 for ( blen=0; blen<999; blen++) {
|
/external/openssl/crypto/bio/ |
D | bss_mem.c | 172 int blen; in mem_write() local 188 blen=bm->length; in mem_write() 189 if (BUF_MEM_grow_clean(bm,blen+inl) != (blen+inl)) in mem_write() 191 memcpy(&(bm->data[blen]),in,inl); in mem_write()
|
/external/grub/netboot/ |
D | sk_g16.h | 146 volatile short blen; /* Buffer Length (two's complement) */ member 164 unsigned short blen; /* Buffer Length (two's complement) */ member
|
/external/openssl/crypto/asn1/ |
D | asn_mime.c | 103 static int mime_bound_check(char *line, int linelen, char *bound, int blen); 611 int len, blen; in multi_split() local 617 blen = strlen(bound); in multi_split() 624 state = mime_bound_check(linebuf, len, bound, blen); in multi_split() 921 static int mime_bound_check(char *line, int linelen, char *bound, int blen) in mime_bound_check() argument 924 if(blen == -1) blen = strlen(bound); in mime_bound_check() 926 if(blen + 2 > linelen) return 0; in mime_bound_check() 928 if(!strncmp(line, "--", 2) && !strncmp(line + 2, bound, blen)) { in mime_bound_check() 929 if(!strncmp(line + blen + 2, "--", 2)) return 2; in mime_bound_check()
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_hostap.c | 403 size_t blen; in wpa_driver_hostap_set_key() local 406 blen = sizeof(*param) + key_len; in wpa_driver_hostap_set_key() 407 buf = os_zalloc(blen); in wpa_driver_hostap_set_key() 443 if (hostapd_ioctl(drv, param, blen)) { in wpa_driver_hostap_set_key() 459 size_t blen; in hostap_get_seqnum() local 462 blen = sizeof(*param) + 32; in hostap_get_seqnum() 463 buf = os_zalloc(blen); in hostap_get_seqnum() 475 if (hostapd_ioctl(drv, param, blen)) { in hostap_get_seqnum() 706 size_t blen, elem_len; in hostapd_ioctl_set_generic_elem() local 709 blen = PRISM2_HOSTAPD_GENERIC_ELEMENT_HDR_LEN + elem_len; in hostapd_ioctl_set_generic_elem() [all …]
|
/external/openssl/crypto/dh/ |
D | dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; in main() local 178 blen=DH_size(b); in main() 179 bbuf=(unsigned char *)OPENSSL_malloc(blen); in main()
|
/external/openssl/crypto/ecdh/ |
D | ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; in test_ecdh_curve() local 226 blen=KDF1_SHA1_len; in test_ecdh_curve() 227 bbuf=(unsigned char *)OPENSSL_malloc(blen); in test_ecdh_curve() 228 bout=ECDH_compute_key(bbuf,blen,EC_KEY_get0_public_key(a),b,KDF1_SHA1); in test_ecdh_curve()
|