/external/qemu/slirp-android/ |
D | cksum.c | 51 register int mlen = 0; in cksum() local 67 mlen = m->m_len; in cksum() 69 if (len < mlen) in cksum() 70 mlen = len; in cksum() 71 len -= mlen; in cksum() 75 if ((1 & (long) w) && (mlen > 0)) { in cksum() 80 mlen--; in cksum() 87 while ((mlen -= 32) >= 0) { in cksum() 94 mlen += 32; in cksum() 95 while ((mlen -= 8) >= 0) { in cksum() [all …]
|
/external/qemu/slirp/ |
D | cksum.c | 51 register int mlen = 0; in cksum() local 67 mlen = m->m_len; in cksum() 69 if (len < mlen) in cksum() 70 mlen = len; in cksum() 71 len -= mlen; in cksum() 75 if ((1 & (long) w) && (mlen > 0)) { in cksum() 80 mlen--; in cksum() 87 while ((mlen -= 32) >= 0) { in cksum() 94 mlen += 32; in cksum() 95 while ((mlen -= 8) >= 0) { in cksum() [all …]
|
/external/ipsec-tools/src/racoon/ |
D | str2val.c | 51 val2str(buf, mlen) in val2str() argument 53 size_t mlen; 56 size_t len = (mlen * 2) + mlen / 8 + 10; 61 for (i = 0, j = 0; i < mlen; i++) {
|
/external/openssh/ |
D | msg.c | 47 u_int mlen = buffer_len(m); in ssh_msg_send() local 51 put_u32(buf, mlen + 1); in ssh_msg_send() 57 if (atomicio(vwrite, fd, buffer_ptr(m), mlen) != mlen) { in ssh_msg_send()
|
D | ssh-pkcs11-client.c | 52 int mlen = buffer_len(m); in send_msg() local 54 put_u32(buf, mlen); in send_msg() 59 buffer_consume(m, mlen); in send_msg()
|
D | ssh-pkcs11-helper.c | 106 int mlen = buffer_len(m); in send_msg() local 108 buffer_put_int(&oqueue, mlen); in send_msg() 109 buffer_append(&oqueue, buffer_ptr(m), mlen); in send_msg() 110 buffer_consume(m, mlen); in send_msg()
|
D | auth-pam.c | 722 size_t len, mlen; in sshpam_query() local 735 mlen = strlen(msg); in sshpam_query() 740 len = plen + mlen + 1; in sshpam_query() 743 plen += mlen; in sshpam_query() 750 len = plen + mlen + 2; in sshpam_query() 753 plen += mlen; in sshpam_query()
|
/external/openssl/crypto/modes/ |
D | ccm128.c | 77 const unsigned char *nonce,size_t nlen,size_t mlen) in CRYPTO_ccm128_setiv() argument 83 if (sizeof(mlen)==8 && L>=3) { in CRYPTO_ccm128_setiv() 84 ctx->nonce.c[8] = (u8)(mlen>>(56%(sizeof(mlen)*8))); in CRYPTO_ccm128_setiv() 85 ctx->nonce.c[9] = (u8)(mlen>>(48%(sizeof(mlen)*8))); in CRYPTO_ccm128_setiv() 86 ctx->nonce.c[10] = (u8)(mlen>>(40%(sizeof(mlen)*8))); in CRYPTO_ccm128_setiv() 87 ctx->nonce.c[11] = (u8)(mlen>>(32%(sizeof(mlen)*8))); in CRYPTO_ccm128_setiv() 92 ctx->nonce.c[12] = (u8)(mlen>>24); in CRYPTO_ccm128_setiv() 93 ctx->nonce.c[13] = (u8)(mlen>>16); in CRYPTO_ccm128_setiv() 94 ctx->nonce.c[14] = (u8)(mlen>>8); in CRYPTO_ccm128_setiv() 95 ctx->nonce.c[15] = (u8)mlen; in CRYPTO_ccm128_setiv()
|
D | gcm128.c | 890 u64 mlen = ctx->len.u[1]; local 902 n = (unsigned int)mlen%16; /* alternative to ctx->mres */ 904 mlen += len; 905 if (mlen>((U64(1)<<36)-32) || (sizeof(len)==8 && mlen<len)) 907 ctx->len.u[1] = mlen; 1040 u64 mlen = ctx->len.u[1]; local 1051 mlen += len; 1052 if (mlen>((U64(1)<<36)-32) || (sizeof(len)==8 && mlen<len)) 1054 ctx->len.u[1] = mlen; 1193 u64 mlen = ctx->len.u[1]; local [all …]
|
/external/openssl/crypto/rsa/ |
D | rsa_oaep.c | 98 int i, dblen, mlen = -1; in RSA_padding_check_PKCS1_OAEP() local 165 mlen = dblen - ++i; in RSA_padding_check_PKCS1_OAEP() 166 if (tlen < mlen) in RSA_padding_check_PKCS1_OAEP() 169 mlen = -1; in RSA_padding_check_PKCS1_OAEP() 172 memcpy(to, db + i, mlen); in RSA_padding_check_PKCS1_OAEP() 176 return mlen; in RSA_padding_check_PKCS1_OAEP()
|
/external/libppp/src/ |
D | pap.c | 119 int plen, mlen; in SendPapCode() local 123 mlen = strlen(message); in SendPapCode() 124 plen = mlen + 1; in SendPapCode() 134 *cp++ = mlen > 255 ? 255 : mlen; in SendPapCode() 135 memcpy(cp, message, mlen); in SendPapCode()
|
D | auth.c | 464 size_t mlen = m_length(bp); in auth_ReadName() local 466 if (len > mlen) in auth_ReadName() 468 len, mlen); in auth_ReadName()
|
/external/qemu/distrib/sdl-1.2.15/test/ |
D | threadwin.c | 29 int mlen, i; in LoadIconSurface() local 61 mlen = icon->w*icon->h; in LoadIconSurface() 62 mask = (Uint8 *)malloc(mlen/8); in LoadIconSurface() 68 memset(mask, 0, mlen/8); in LoadIconSurface() 69 for ( i=0; i<mlen; ) { in LoadIconSurface()
|
D | testwm.c | 68 int mlen, i, j; in LoadIconSurface() local 103 mlen = (icon->w*icon->h + 7) / 8; in LoadIconSurface() 104 mask = (Uint8 *)malloc(mlen); in LoadIconSurface() 110 memset(mask, 0, mlen); in LoadIconSurface()
|
/external/ppp/pppd/ |
D | upap.c | 620 int mlen, ulen, wlen; local 665 mlen = p[0]; 666 if (len < mlen + 1) 669 p += mlen + 1; 670 len -= mlen + 1; 672 print_string(msg, mlen, printer, arg);
|
D | chap-new.c | 313 int response_len, ok, mlen; in chap_handle_response() local 365 mlen = strlen(message); in chap_handle_response() 366 len = CHAP_HDRLEN + mlen; in chap_handle_response() 371 if (mlen > 0) in chap_handle_response() 372 memcpy(p + CHAP_HDRLEN, message, mlen); in chap_handle_response()
|
/external/wpa_supplicant_8/src/l2_packet/ |
D | l2_packet_pcap.c | 93 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 94 eth = os_malloc(mlen); in l2_packet_send() 104 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send() 106 ret = eth_send(l2->eth, (u8 *) eth, mlen); in l2_packet_send()
|
D | l2_packet_winpcap.c | 84 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 85 eth = os_malloc(mlen); in l2_packet_send() 93 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send()
|
D | l2_packet_ndis.c | 116 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 117 eth = os_malloc(mlen); in l2_packet_send() 125 res = WriteFile(driver_ndis_get_ndisuio_handle(), eth, mlen, in l2_packet_send()
|
/external/llvm/lib/Support/ |
D | regcomp.c | 213 g->mlen = 0; in llvm_regcomp() 1492 if (newlen > g->mlen) { /* ends one */ in findmust() 1494 g->mlen = newlen; in findmust() 1501 if (g->mlen == 0) /* there isn't one */ in findmust() 1505 g->must = malloc((size_t)g->mlen + 1); in findmust() 1507 g->mlen = 0; in findmust() 1512 for (i = g->mlen; i > 0; i--) { in findmust() 1515 assert(cp < g->must + g->mlen); in findmust() 1518 assert(cp == g->must + g->mlen); in findmust()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_pax.c | 332 u16 flen, mlen; in eap_pax_process() local 342 mlen = wpabuf_len(reqData) - EAP_PAX_ICV_LEN; in eap_pax_process() 411 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0, in eap_pax_process() 415 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0, in eap_pax_process()
|
D | eap_gpsk.c | 611 size_t mlen; in eap_gpsk_send_gpsk_4() local 615 mlen = eap_gpsk_mic_len(data->vendor, data->specifier); in eap_gpsk_send_gpsk_4() 617 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, 1 + 2 + mlen, in eap_gpsk_send_gpsk_4() 628 rpos = wpabuf_put(resp, mlen); in eap_gpsk_send_gpsk_4()
|
/external/grub/netboot/ |
D | sk_g16.h | 147 unsigned short mlen; /* Message Byte Count */ member
|
/external/ppp/pppd/include/net/ |
D | vjcompress.h | 134 extern u_int vj_compress_tcp __P((struct ip *ip, u_int mlen,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | peerkey.c | 325 size_t mlen; in wpa_supplicant_send_stk_1_of_4() local 334 sizeof(*msg) + kde_len, &mlen, in wpa_supplicant_send_stk_1_of_4() 375 mbuf, mlen, NULL); in wpa_supplicant_send_stk_1_of_4() 382 size_t mlen; in wpa_supplicant_send_stk_3_of_4() local 393 sizeof(*msg) + kde_len, &mlen, in wpa_supplicant_send_stk_3_of_4() 430 ETH_P_EAPOL, mbuf, mlen, msg->key_mic); in wpa_supplicant_send_stk_3_of_4()
|