/external/wpa_supplicant_8/src/utils/ |
D | base64.c | 34 size_t olen; in base64_encode() local 37 olen = len * 4 / 3 + 4; /* 3-byte blocks to 4-byte */ in base64_encode() 38 olen += olen / 72; /* line feeds */ in base64_encode() 39 olen++; /* nul termination */ in base64_encode() 40 if (olen < len) in base64_encode() 42 out = os_malloc(olen); in base64_encode() 103 size_t i, count, olen; in base64_decode() local 120 olen = count / 4 * 3; in base64_decode() 121 pos = out = os_malloc(olen); in base64_decode()
|
/external/toybox/toys/posix/ |
D | uudecode.c | 49 int olen; local 58 olen = 0; 60 if (!m) olen = (*(in++) - 32) & 0x3f; 67 if (olen < 1) break; 68 if (olen < 3) len = olen + 1; 92 olen--;
|
/external/openssh/ |
D | rsa.c | 78 int len, ilen, olen, r = SSH_ERR_INTERNAL_ERROR; in rsa_public_encrypt() local 83 olen = BN_num_bytes(key->n); in rsa_public_encrypt() 84 if ((outbuf = malloc(olen)) == NULL) { in rsa_public_encrypt() 110 explicit_bzero(outbuf, olen); in rsa_public_encrypt() 124 int len, ilen, olen, r = SSH_ERR_INTERNAL_ERROR; in rsa_private_decrypt() local 126 olen = BN_num_bytes(key->n); in rsa_private_decrypt() 127 if ((outbuf = malloc(olen)) == NULL) { in rsa_private_decrypt() 150 explicit_bzero(outbuf, olen); in rsa_private_decrypt()
|
D | ssh-pkcs11-helper.c | 276 ssize_t len, olen, set_size; in main() local 320 olen = buffer_len(&oqueue); in main() 321 if (olen > 0) in main() 346 len = write(out, buffer_ptr(&oqueue), olen); in main()
|
D | sshbuf-getput-basic.c | 433 size_t len, olen; in sshbuf_get_bignum2_bytes_direct() local 436 if ((r = sshbuf_peek_string_direct(buf, &d, &olen)) < 0) in sshbuf_get_bignum2_bytes_direct() 438 len = olen; in sshbuf_get_bignum2_bytes_direct() 455 if (sshbuf_consume(buf, olen + 4) != 0) { in sshbuf_get_bignum2_bytes_direct()
|
/external/curl/lib/ |
D | escape.c | 145 char **ostring, size_t *olen, in Curl_urldecode() argument 194 if(olen) in Curl_urldecode() 196 *olen = strindex; in Curl_urldecode() 211 int length, int *olen) in curl_easy_unescape() argument 220 if(olen) in curl_easy_unescape() 221 *olen = curlx_uztosi(outputlen); in curl_easy_unescape()
|
D | dict.c | 101 int olen=0; in unescape_word() local 116 dictp[olen++] = '\\'; in unescape_word() 118 dictp[olen++] = ch; in unescape_word() 120 dictp[olen]=0; in unescape_word()
|
D | escape.h | 29 char **ostring, size_t *olen,
|
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/ |
D | edns.py | 36 def from_wire(cls, otype, wire, current, olen): argument 111 def from_wire(cls, otype, wire, current, olen): argument 112 return cls(otype, wire[current : current + olen]) 128 def option_from_wire(otype, wire, current, olen): argument 142 return cls.from_wire(otype, wire, current, olen)
|
/external/ppp/pppd/ |
D | cbcp.c | 233 int code, opt, id, len, olen, delay; local 259 GETCHAR(olen, p); 261 if (olen < 2 || olen > len) { 266 len -= olen; 273 if (olen > 2) { 278 if (olen > 3) { 283 memcpy(str, p, olen - 4); 284 str[olen - 4] = 0;
|
D | ipxcp.c | 1479 int code, id, len, olen; local 1507 GETCHAR(olen, p); 1509 if (olen < CILEN_VOID || olen > len) { 1513 len -= olen; 1514 optend = p + olen; 1517 if (olen == CILEN_NETN) { 1524 if (olen == CILEN_NODEN) { 1534 if (olen == CILEN_COMPRESS) { 1541 if (olen == CILEN_PROTOCOL) { 1548 if (olen >= CILEN_NAME) { [all …]
|
D | lcp.c | 2001 int code, id, len, olen, i; local 2029 GETCHAR(olen, p); 2031 if (olen < 2 || olen > len) { 2035 len -= olen; 2036 optend = p + olen; 2039 if (olen == CILEN_SHORT) { 2046 if (olen == CILEN_LONG) { 2053 if (olen >= CILEN_SHORT) { 2090 if (olen >= CILEN_SHORT) { 2104 if (olen >= CILEN_CHAR) { [all …]
|
D | ipv6cp.c | 1423 int code, id, len, olen; local 1451 GETCHAR(olen, p); 1453 if (olen < 2 || olen > len) { 1457 len -= olen; 1458 optend = p + olen; 1461 if (olen >= CILEN_COMPRESS) { 1469 if (olen == CILEN_IFACEID) {
|
D | ipcp.c | 2153 int code, id, len, olen; local 2181 GETCHAR(olen, p); 2183 if (olen < 2 || olen > len) { 2187 len -= olen; 2188 optend = p + olen; 2191 if (olen == CILEN_ADDRS) { 2200 if (olen >= CILEN_COMPRESS) { 2217 if (olen == CILEN_ADDR) {
|
/external/curl/src/ |
D | mkhelp.pl | 50 my $olen=0; 72 if($wline && ($olen == $tlen)) { 81 $olen = $tlen;
|
/external/speex/libspeex/ |
D | resample.c | 677 spx_uint32_t olen = old_length; in update_filter() local 683 olen = old_length + 2*st->magic_samples[i]; in update_filter() 690 if (st->filt_len > olen) in update_filter() 694 for (j=0;j<olen-1;j++) in update_filter() 695 … st->mem[i*st->mem_alloc_size+(st->filt_len-2-j)] = st->mem[i*st->mem_alloc_size+(olen-2-j)]; in update_filter() 700 st->last_sample[i] += (st->filt_len - olen)/2; in update_filter() 703 st->magic_samples[i] = (olen - st->filt_len)/2; in update_filter() 856 spx_uint32_t olen = *out_len; in speex_resampler_process_int() local 863 olen -= speex_resampler_magic(st, channel_index, &out, olen); in speex_resampler_process_int() 865 while (ilen && olen) { in speex_resampler_process_int() [all …]
|
/external/tcpdump/ |
D | print-pim.c | 651 uint16_t otype, olen; in pimv2_print() local 656 olen = EXTRACT_16BITS(&bp[2]); in pimv2_print() 657 ND_TCHECK2(bp[0], 4 + olen); in pimv2_print() 661 olen)); in pimv2_print() 670 if (olen != 4) { in pimv2_print() 671 ND_PRINT((ndo, "ERROR: Option Length != 4 Bytes (%u)", olen)); in pimv2_print() 686 switch (olen) { in pimv2_print() 694 ND_PRINT((ndo, "ERROR: Option Length != 4 Bytes (%u)", olen)); in pimv2_print() 721 while (ptr < (bp+olen)) { in pimv2_print() 736 print_unknown_data(ndo, bp, "\n\t ", olen); in pimv2_print() [all …]
|
D | print-fr.c | 770 int olen; in q933_print() local 806 olen = length; /* preserve the original length for non verbose mode */ in q933_print() 823 ND_PRINT((ndo, ", length %u", olen)); in q933_print() 861 ND_PRINT((ndo, ", length %u", olen)); in q933_print()
|
/external/libedit/src/ |
D | vis.c | 354 size_t len, olen; in istrsenvisx() local 479 olen = 0; in istrsenvisx() 505 if (olen + clen > (size_t)maxolen) in istrsenvisx() 512 olen += clen; in istrsenvisx() 526 return (int)olen; in istrsenvisx()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_server.c | 265 size_t olen; in tlsv1_server_decrypt() local 274 olen = out_end - out_pos; in tlsv1_server_decrypt() 276 out_pos, &olen, &alert); in tlsv1_server_decrypt() 291 if (olen < 2) { in tlsv1_server_decrypt() 328 out_pos += olen; in tlsv1_server_decrypt()
|
D | tlsv1_client.c | 313 size_t olen; in tlsv1_client_decrypt() local 341 olen = wpabuf_tailroom(buf); in tlsv1_client_decrypt() 343 out_pos, &olen, &alert); in tlsv1_client_decrypt() 368 if (olen < 2) { in tlsv1_client_decrypt() 394 wpabuf_put(buf, olen); in tlsv1_client_decrypt()
|
/external/iproute2/misc/ |
D | rtacct.c | 415 socklen_t olen = sizeof(cred); in verify_forging() local 417 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || in verify_forging() 418 olen < sizeof(cred)) in verify_forging()
|
D | nstat.c | 475 socklen_t olen = sizeof(cred); in verify_forging() local 477 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || in verify_forging() 478 olen < sizeof(cred)) in verify_forging()
|
/external/boringssl/src/crypto/asn1/ |
D | a_object.c | 86 int a2d_ASN1_OBJECT(unsigned char *out, int olen, const char *buf, int num) in a2d_ASN1_OBJECT() argument 205 if (len+i > olen) in a2d_ASN1_OBJECT()
|
/external/iptables/utils/ |
D | nfnl_osf.c | 150 static void xt_osf_parse_opt(struct xt_osf_opt *opt, __u16 *optnum, char *obuf, int olen) in xt_osf_parse_opt() argument 158 while (ptr != NULL && i < olen && *ptr != 0) { in xt_osf_parse_opt()
|