/external/wpa_supplicant/ |
radius.c | 210 int i, len; local 221 len = hdr->length - sizeof(struct radius_attr_hdr); 227 for (i = 0; i < len; i++) 233 if (len == 4) { 238 printf(" Invalid IP address length %d\n", len); 243 if (len == 16) { 250 printf(" Invalid IPv6 address length %d\n", len); 257 for (i = 0; i < len; i++) 263 if (len == 4) 266 printf(" Invalid INT32 length %d\n", len); 325 size_t len[4]; local 364 size_t len[2]; local 524 int len; local 545 size_t len, i; local 633 size_t len[4]; local 721 size_t i, len; local 853 int i, len, first = 1; local 1050 size_t len[2]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 216 int i, len; local 227 len = hdr->length - sizeof(struct radius_attr_hdr); 233 for (i = 0; i < len; i++) 239 if (len == 4) { 244 printf(" Invalid IP address length %d\n", len); 249 if (len == 16) { 256 printf(" Invalid IPv6 address length %d\n", len); 263 for (i = 0; i < len; i++) 269 if (len == 4) 272 printf(" Invalid INT32 length %d\n", len); 333 size_t len[4]; local 372 size_t len[2]; local 527 int len; local 548 size_t len, i; local 638 size_t len[4]; local 726 size_t i, len; local 858 int i, len, first = 1; local 1054 size_t len[2]; local [all...] |
/external/kernel-headers/original/linux/ |
skbuff.h | 199 * @len: Length of actual data 273 unsigned int len, member in struct:sk_buff 366 extern void skb_over_panic(struct sk_buff *skb, int len, 368 extern void skb_under_panic(struct sk_buff *skb, int len, 374 if (unlikely((int)skb->truesize < sizeof(struct sk_buff) + skb->len)) 380 int len,int odd, struct sk_buff *skb), 791 return skb->len - skb->data_len; 796 int i, len = 0; local 799 len += skb_shinfo(skb)->frags[i].size; 800 return len + skb_headlen(skb) [all...] |
/external/dropbear/libtomcrypt/testprof/ |
rsa_test.c | 81 unsigned long len; local 87 len = sizeof(buf); 88 DO(rsa_export(buf, &len, PK_PRIVATE, &key)); 89 if (len != sizeof(openssl_private_rsa) || memcmp(buf, openssl_private_rsa, len)) { 90 fprintf(stderr, "RSA private export failed to match OpenSSL output, %lu, %lu\n", len, (unsigned long)sizeof(openssl_private_rsa)); 94 len = sizeof(buf); 95 DO(rsa_export(buf, &len, PK_PUBLIC, &key)); 96 if (len != sizeof(openssl_public_rsa_stripped) || memcmp(buf, openssl_public_rsa_stripped, len)) { 130 unsigned long rsa_msgsize, len, len2, cnt; local [all...] |
/external/ppp/pppd/ |
utils.c | 81 int len; member in struct:buffer_info 86 * always leaves destination null-terminated (for len > 0). 89 strlcpy(dest, src, len) 92 size_t len; 96 if (len != 0) { 97 if (ret < len) 100 strncpy(dest, src, len - 1); 101 dest[len-1] = 0; 109 * always leaves destination null-terminated (for len > 0). 112 strlcat(dest, src, len) 167 int base, len, neg, quoted; local [all...] |
/external/qemu/ |
charpipe.c | 96 charpipehalf_write( CharDriverState* cs, const uint8_t* buf, int len ) 104 len, ph, quote_bytes( buf, len )); 108 while (len > 0) { 116 if (size > len) 117 size = len; 119 size = len; 123 len -= size; 128 if (len == 0) 137 while (len > 0) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_dev_attr.c | 25 size_t len; local 28 len = dev->manufacturer ? os_strlen(dev->manufacturer) : 0; 29 if (len == 0) { 38 wpabuf_put_be16(msg, len); 39 wpabuf_put_data(msg, dev->manufacturer, len); 48 size_t len; local 51 len = dev->model_name ? os_strlen(dev->model_name) : 0; 52 if (len == 0) { 61 wpabuf_put_be16(msg, len); 62 wpabuf_put_data(msg, dev->model_name, len); 71 size_t len; local 94 size_t len; local 130 size_t len; local [all...] |
/dalvik/libcore/crypto/src/main/java/javax/crypto/spec/ |
IvParameterSpec.java | 53 * Creates a new <code>IvParameterSpec</code> instance with <code>len</code> 61 * @param len 65 * <code>len</code> do not specify a valid chunk in the 68 * if <code>offset</code> or <code>len</code> are negative. 70 public IvParameterSpec(byte[] iv, int offset, int len) { 71 if ((iv == null) || (iv.length - offset < len)) { 75 if (offset < 0 || len < 0) { 78 this.iv = new byte[len]; 79 System.arraycopy(iv, offset, this.iv, 0, len);
|
/dalvik/libcore/nio/src/main/java/java/nio/ |
CharSequenceAdapter.java | 79 public final CharBuffer get(char[] dest, int off, int len) { 81 if ((off < 0) || (len < 0) || (long) off + (long) len > length) { 84 if (len > remaining()) { 87 int newPosition = position + len; 134 public final CharBuffer put(char[] src, int off, int len) { 135 if ((off < 0) || (len < 0) || (long) off + (long) len > src.length) { 139 if (len > remaining()) {
|
/dalvik/libcore/xml/src/main/java/javax/xml/parsers/ |
FilePathToURI.java | 42 int len = escChs.length; typedefs 44 for (int i = 0; i < len; i++) { 63 int len = path.length(), ch; local 64 StringBuffer buffer = new StringBuffer(len*3); 67 if (len >= 2 && path.charAt(1) == ':') { 76 for (; i < len; i++) { 93 if (i < len) { 103 len = bytes.length; 106 for (i = 0; i < len; i++) {
|
/dalvik/libcore/xml/src/main/java/javax/xml/transform/stream/ |
FilePathToURI.java | 42 int len = escChs.length; typedefs 44 for (int i = 0; i < len; i++) { 63 int len = path.length(), ch; local 64 StringBuffer buffer = new StringBuffer(len*3); 67 if (len >= 2 && path.charAt(1) == ':') { 76 for (; i < len; i++) { 93 if (i < len) { 103 len = bytes.length; 106 for (i = 0; i < len; i++) {
|
/external/bluetooth/glib/tests/ |
asyncqueue-test.c | 60 gint len; local 76 len = g_async_queue_length (async_queue); 78 PRINT_MSG (("sorted queue (for %d/%d times, size:%d)...", sorts, MAX_SORTS, len)); 81 len = g_async_queue_length (async_queue); 82 DEBUG_MSG (("printing queue (size:%d)...", len)); 85 for (i = 0, last_p = NULL; i < len; i++) { 106 gint len; local 123 len = g_async_queue_length (async_queue); 126 id, len));
|
mainloop-test.c | 58 read_all (GIOChannel *channel, char *buf, gsize len) 64 while (bytes_read < len) 66 err = g_io_channel_read (channel, buf + bytes_read, len - bytes_read, &count); 82 write_all (GIOChannel *channel, char *buf, gsize len) 88 while (bytes_written < len) 90 err = g_io_channel_write (channel, buf + bytes_written, len - bytes_written, &count); 151 if (context_array->len == NTHREADS) 186 if (context_array->len == 0) 307 if (crawler_array->len > 0) 309 other_source = crawler_array->pdata[g_random_int_range (0, crawler_array->len)]; [all...] |
/external/dropbear/ |
cli-authpasswd.c | 49 int p[2], maxlen, len, status; local 90 len = read(p[0], buf + sizeof(buf) - maxlen, maxlen); 91 if (len > 0) { 92 maxlen -= len; 106 len = sizeof(buf) - maxlen; 107 buf[len] = '\0'; 108 if (len > 0 && buf[len - 1] == '\n') 109 buf[len - 1] = '\0';
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_encrypt.c | 25 @param len Length of plaintext (octets) 29 int ctr_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CTR *ctr) 54 if ((ctr->padlen == ctr->blocklen) && cipher_descriptor[ctr->cipher].accel_ctr_encrypt != NULL && (len >= (unsigned long)ctr->blocklen)) { 55 if ((err = cipher_descriptor[ctr->cipher].accel_ctr_encrypt(pt, ct, len/ctr->blocklen, ctr->ctr, ctr->mode, &ctr->key)) != CRYPT_OK) { 58 len %= ctr->blocklen; 61 while (len) { 90 if (ctr->padlen == 0 && len >= (unsigned long)ctr->blocklen) { 97 len -= ctr->blocklen; 103 --len;
|
/external/icu4c/common/ |
uenum.c | 23 int32_t len; /* number of bytes available starting at 'data' */ member in struct:__anon2133 35 if (((_UEnumBuffer*) en->baseContext)->len < capacity) { 42 ((_UEnumBuffer*) en->baseContext)->len = capacity; 50 ((_UEnumBuffer*) en->baseContext)->len = capacity; 92 int32_t len = 0; local 94 const char *cstr = en->next(en, &len, status); 96 ustr = (UChar*) _getBuffer(en, (len+1) * sizeof(UChar)); 100 u_charsToUChars(cstr, ustr, len+1); 107 *resultLength = len;
|
/external/icu4c/i18n/ |
inputext.cpp | 49 void InputText::setText(const char *in, int32_t len) 54 fRawLength = len == -1? uprv_strlen(in) : len; 57 void InputText::setDeclaredEncoding(const char* encoding, int32_t len) 60 if (len == -1) { 61 len = uprv_strlen(encoding); 64 len += 1; // to make place for the \0 at the end. 66 fDeclaredEncoding = NEW_ARRAY(char, len); 67 uprv_strncpy(fDeclaredEncoding, encoding, len);
|
/external/icu4c/test/perf/collperf/ |
CollPerf.pl | 45 #"Key Gen ICU len", ["$p TestIcu_KeyGen_len"], 49 #"Iteration icu forward len", ["$p TestIcu_ForwardIter_len"], 51 #"Iteration icu backward len", ["$p TestIcu_BackwardIter_len"], 53 #"Iteration/all icu forward len", ["$p TestIcu_ForwardIter_all_len"], 55 #"Iteration/all icu backward len", ["$p TestIcu_BackwardIter_all_len"], 57 #"qsort icu strcoll len", ["$p TestIcu_qsort_strcoll_len"], 62 #"qsort win CompareStringW len", ["$p TestWin_qsort_CompareStringW_len"], 65 #"Binary Search icu strcoll len", ["$p TestIcu_BinarySearch_strcoll_len"], 72 #"Binary Search win CompareStringW len", ["$p TestWin_BinarySearch_CompareStringW_len"],
|
/external/iproute2/include/ |
libnetlink.h | 26 extern int rtnl_dump_request(struct rtnl_handle *rth, int type, void *req, int len); 55 extern int addraw_l(struct nlmsghdr *n, int maxlen, const void *data, int len); 58 extern struct rtattr *addattr_nest_compat(struct nlmsghdr *n, int maxlen, int type, const void *data, int len); 63 extern int parse_rtattr(struct rtattr *tb[], int max, struct rtattr *rta, int len); 64 extern int parse_rtattr_byindex(struct rtattr *tb[], int max, struct rtattr *rta, int len); 65 extern int __parse_rtattr_nested_compat(struct rtattr *tb[], int max, struct rtattr *rta, int len); 70 #define parse_rtattr_nested_compat(tb, max, rta, data, len) \ 71 ({ data = RTA_PAYLOAD(rta) >= len ? RTA_DATA(rta) : NULL; \ 72 __parse_rtattr_nested_compat(tb, max, rta, len); })
|
/external/qemu/hw/ |
usb-msd.c | 137 uint32_t len; local 138 len = s->usb_len; 139 if (len > s->scsi_len) 140 len = s->scsi_len; 142 memcpy(s->usb_buf, s->scsi_buf, len); 144 memcpy(s->scsi_buf, s->usb_buf, len); 146 s->usb_len -= len; 147 s->scsi_len -= len; 148 s->usb_buf += len; 149 s->scsi_buf += len; 358 int len = p->len; local 530 int len = MIN(p1 - p2, sizeof(fmt)); local [all...] |
/external/qemu/telephony/ |
modem_driver.c | 44 int len = strlen(message); local 46 qemu_chr_write(md->cs, (const uint8_t*)message, len); 60 modem_driver_read( void* _md, const uint8_t* src, int len ) 63 const uint8_t* end = src + len; 66 D( "%s: reading %d from %p bytes:", __FUNCTION__, len, src ); 67 for (nn = 0; nn < len; nn++) { 106 len = strlen(answer); 107 if (len == 2 && answer[0] == '>' && answer[1] == ' ') 110 qemu_chr_write(md->cs, (const uint8_t*)answer, len);
|
/external/v8/test/mjsunit/ |
string-indexof-2.js | 55 for(var len = 1; i + len < lipsum.length; len += 7) { 56 var substring = lipsum.substring(i, i + len); 61 "Lipsum substring " + i + ".." + (i + len-1) + " not found"); 62 assertEquals(lipsum.substring(index, index + len), substring, 63 "Wrong lipsum substring found: " + i + ".." + (i + len - 1) + "/" + 64 index + ".." + (index + len - 1)); 66 assertEquals(i, index, "Lipsum match at " + i + ".." + (i + len - 1));
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_identity.c | 92 size_t len; local 95 respData, &len); 110 size_t len; local 123 respData, &len); 127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 131 sm->identity = os_malloc(len ? len : 1); 135 os_memcpy(sm->identity, pos, len); 136 sm->identity_len = len;
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
ATResponseParser.java | 98 int len = line.length(); local 104 if (next >= len) { 117 if (next >= len) { 122 while (c != '"' && next < len) { 129 if (next < len && line.charAt(next++) != ',') { 139 if (next == len) { 155 int len; local 156 len = line.length(); 157 while (next < len && Character.isWhitespace(c)) {
|
/bionic/libc/inet/ |
inet_ntop.c | 105 struct { int base, len; } best, cur; member in struct:__anon60 119 best.len = 0; 121 cur.len = 0; 125 cur.base = i, cur.len = 1; 127 cur.len++; 130 if (best.base == -1 || cur.len > best.len) 137 if (best.base == -1 || cur.len > best.len) 140 if (best.base != -1 && best.len < 2 [all...] |