/ndk/build/platforms/android-8/arch-arm/usr/include/linux/ |
socket.h | 63 #define __CMSG_NXTHDR(ctl, len, cmsg) __cmsg_nxthdr((ctl),(len),(cmsg)) 66 #define CMSG_ALIGN(len) ( ((len)+sizeof(long)-1) & ~(sizeof(long)-1) ) 69 #define CMSG_SPACE(len) (CMSG_ALIGN(sizeof(struct cmsghdr)) + CMSG_ALIGN(len)) 70 #define CMSG_LEN(len) (CMSG_ALIGN(sizeof(struct cmsghdr)) + (len)) 72 #define __CMSG_FIRSTHDR(ctl,len) ((len) >= sizeof(struct cmsghdr) ? (struct cmsghdr *)(ctl) : (struct cmsghdr *)NULL [all...] |
/ndk/build/platforms/android-8/arch-x86/usr/include/linux/ |
socket.h | 63 #define __CMSG_NXTHDR(ctl, len, cmsg) __cmsg_nxthdr((ctl),(len),(cmsg)) 66 #define CMSG_ALIGN(len) ( ((len)+sizeof(long)-1) & ~(sizeof(long)-1) ) 69 #define CMSG_SPACE(len) (CMSG_ALIGN(sizeof(struct cmsghdr)) + CMSG_ALIGN(len)) 70 #define CMSG_LEN(len) (CMSG_ALIGN(sizeof(struct cmsghdr)) + (len)) 72 #define __CMSG_FIRSTHDR(ctl,len) ((len) >= sizeof(struct cmsghdr) ? (struct cmsghdr *)(ctl) : (struct cmsghdr *)NULL [all...] |
/system/core/libcutils/ |
strdup8to16.c | 46 size_t len; local 50 len = strlen8to16(s); 53 if (len && SIZE_MAX/len < sizeof(char16_t)) 57 ret = (char16_t *) malloc (sizeof(char16_t) * len); 70 size_t len = 0; local 85 len++; 88 len++; 93 len++; 98 return len; [all...] |
dir_hash.c | 58 int len; local 60 len = readlink(path, buf, sizeof(buf)); 61 if (len < 0) { 66 SHA1Update(&context, (unsigned char *) buf, len); 71 int len; local 79 while ((len = fread(buf, 1, sizeof(buf), f)) > 0) { 80 SHA1Update(&context, (unsigned char *) buf, len); 200 int len = get_file_hash(algorithm, name, local 202 if (len < 0) { 207 keep = malloc(len + strlen(name) + 3) 271 int len = 0; local [all...] |
/external/wpa_supplicant/ |
eap_fast.c | 59 u16 len; member in struct:pac_tlv_hdr 254 size_t len; local 260 len = l_end - rc->pos; 261 if (len >= buf_len) 262 len = buf_len - 1; 263 os_memcpy(buf, rc->pos, len); 264 buf[len] = '\0'; 282 static u8 * eap_fast_parse_hex(const char *value, size_t *len) 292 *len = hlen / 2; 293 buf = os_malloc(*len); 1049 size_t len = be_to_host16(hdr->length); local 1383 size_t left, len; local 1528 int len_decrypted, len; local 2004 int len, ret; local [all...] |
/external/e2fsprogs/util/ |
subst.c | 81 static char *get_subst_symbol(const char *begin, size_t len, char prefix) 90 if (len > sizeof(replace_name)-2) 92 memcpy(start, begin, len); 93 start[len] = 0; 111 int replace_len, len; local 114 len = end - begin; 117 else if (replace_len != len+1) 118 memmove(end+(replace_len-len-1), end, 128 size_t len; local 149 len = end_ptr - name_ptr [all...] |
/external/ipsec-tools/src/racoon/ |
security.c | 67 int len = 0; local 88 len = sa->l - sizeof(*sab); 90 pbuf = isakmp_parsewoh(ISAKMP_NPTYPE_P, (struct isakmp_gen *)bp, len); 103 if (pa->len == 0) { 105 "invalid proposal with length %d\n", pa->len); 115 len = ntohs(prop->h.len) - 117 tbuf = isakmp_parsewoh(ISAKMP_NPTYPE_T, (struct isakmp_gen *)bp, len); 130 len = ntohs(trns->h.len) - sizeof(struct isakmp_pl_t) [all...] |
algorithm.c | 484 alg_oakley_encdef_keylen(doi, len) 485 int doi, len; 493 return (f->keylen)(len); 611 alg_ipsec_encdef_keylen(doi, len) 612 int doi, len; 620 return (f->keylen)(len); 815 check_keylen(class, type, len) 816 int class, type, len; 839 if (len % 8 != 0) { 841 "key length %d is not multiple of 8\n", len); [all...] |
/external/srec/srec/Recognizer/src/ |
RecognizerResultImpl.c | 148 const LCHAR* key, LCHAR* value, size_t* len) 183 if (actualLen + 1 > *len) 190 if ( ( *len ) != 0 ) 191 PLogError(L("Buffer Overflow while fetching value for %s of choice %d Len %d"), 192 key, nbest, *len ); 193 *len = actualLen + 1; 196 *len = actualLen; 212 int len = LSTRLEN(value); local 213 value[len] = MULTIPLE_MEANING_JOIN_CHAR; 214 value[len+1] = 0 244 size_t len; local [all...] |
/external/v8/src/ |
utils.cc | 96 int len = StrLength(line_buf); local 97 if (len > 1 && 98 line_buf[len - 2] == '\\' && 99 line_buf[len - 1] == '\n') { 102 line_buf[len - 2] = '\n'; 103 line_buf[len - 1] = 0; 104 len -= 1; 105 } else if ((len > 0) && (line_buf[len - 1] == '\n')) { 112 result = NewArray<char>(len + 1) [all...] |
array.js | 71 function SparseJoin(array, len, convert) { 72 var keys = GetSortedArrayKeys(array, %GetArrayKeys(array, len)); 183 function SmartSlice(array, start_i, del_count, len, deleted_elements) { 226 function SmartMove(array, start_i, del_count, len, num_additional_args) { 228 var new_array = new $Array(len - del_count + num_additional_args); 229 var intervals = %GetArrayKeys(array, len); 289 function SimpleSlice(array, start_i, del_count, len, deleted_elements) { 302 function SimpleMove(array, start_i, del_count, len, num_additional_args) { 307 for (var i = len - del_count; i > start_i; i--) { 321 for (var i = start_i; i < len - del_count; i++) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_common.c | 31 size_t len[4]; local 39 len[0] = sizeof(i_buf); 41 len[1] = label_prefix_len; 43 len[2] = os_strlen(label); 45 len[3] = sizeof(key_bits); 53 hmac_sha256_vector(key, SHA256_MAC_LEN, 4, addr, len, hash); 69 size_t len[3]; local 99 len[0] = wpabuf_len(dh_shared); 100 sha256_vector(1, addr, len, dhkey); 106 len[0] = WPS_NONCE_LEN [all...] |
/frameworks/base/tests/CoreTests/android/core/ |
ArrayListPerformanceTest.java | 94 int i = 0, len; local 96 len = mList.size(); 97 len = mList.size(); 98 len = mList.size(); 99 len = mList.size(); 100 len = mList.size(); 101 len = mList.size(); 102 len = mList.size(); 103 len = mList.size(); 104 len = mList.size() 111 int len = mList.size(); local [all...] |
/system/core/libzipfile/ |
centraldir.c | 9 EOCD_LEN = 22, // EndOfCentralDir len, excl. comment
15 ENTRY_LEN = 46, // CentralDirEnt len, excl. var fields
34 read_central_dir_values(Zipfile* file, const unsigned char* buf, int len)
36 if (len < EOCD_LEN) {
39 EOCD_LEN, len);
52 if (EOCD_LEN + file->commentLen > len) {
53 fprintf(stderr, "EOCD(%d) + comment(%d) exceeds len (%d)\n",
54 EOCD_LEN, file->commentLen, len);
65 const unsigned char** buf, ssize_t* len)
90 if (*len < ENTRY_LEN) { 190 ssize_t len; local [all...] |
/external/libpcap/bpf/net/ |
bpf_filter.c | 120 #define MINDEX(len, _m, _k) \ 122 len = MLEN(m); \ 123 while ((_k) >= len) { \ 124 (_k) -= len; \ 128 len = MLEN(m); \ 137 register int len; local 141 MINDEX(len, m, k); 143 if (len - k >= 4) { 148 if (m0 == 0 || MLEN(m0) + len - k < 4) 152 switch (len - k) 173 register int len; local 213 int merr, len; local [all...] |
/external/openssl/crypto/asn1/ |
asn1_par.c | 109 int ASN1_parse(BIO *bp, const unsigned char *pp, long len, int indent) 111 return(asn1_parse2(bp,&pp,len,0,0,indent,0)); 114 int ASN1_parse_dump(BIO *bp, const unsigned char *pp, long len, int indent, int dump) 116 return(asn1_parse2(bp,&pp,len,0,0,indent,dump)); 123 long len; local 142 j=ASN1_get_object(&p,&len,&tag,&xclass,length); 162 depth,(long)hl,len) <= 0) 175 ep=p+len; 177 if (len > length) 184 if ((j == 0x21) && (len == 0) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 33 * @len: Length of the EAPOL frame (from EAPOL header to the end of the frame) 46 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, 53 hmac_md5(key, 16, buf, len, mic); 56 hmac_sha1(key, 16, buf, len, hash); 61 return omac1_aes_128(key, buf, len, mic); 272 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 280 hdr->len != rsn_ie_len - 2 || 422 size_t len[2]; local 454 len[0] = 6; 456 len[1] = 16 473 size_t len[4]; local 531 size_t len[6]; local [all...] |
/hardware/broadcom/wlan/bcm4329/src/include/ |
bcmutils.h | 97 uint16 len; member in struct:pktq_prec 107 uint16 len; member in struct:pktq 117 uint16 len; member in struct:spktq 135 #define pktq_plen(pq, prec) ((pq)->q[prec].len) 136 #define pktq_pavail(pq, prec) ((pq)->q[prec].max - (pq)->q[prec].len) 137 #define pktq_pfull(pq, prec) ((pq)->q[prec].len >= (pq)->q[prec].max) 138 #define pktq_pempty(pq, prec) ((pq)->q[prec].len == 0) 162 #define pktq_len(pq) ((int)(pq)->len) 164 #define pktq_avail(pq) ((int)((pq)->max - (pq)->len)) 165 #define pktq_full(pq) ((pq)->len >= (pq)->max 475 uint8 len; member in struct:bcm_tlv 609 uint32 len; member in struct:fielddesc [all...] |
/system/core/adb/ |
jdwp_service.c | 128 int len; local 134 len = snprintf(p, end-p, "%d\n", proc->pid); 135 if (p + len >= end) 137 p += len; 148 int len = jdwp_process_list( buffer+4, bufferlen-4 ); local 149 snprintf(head, sizeof head, "%04x", len); 151 return len + 4; 245 int len = recv( socket, p, size, 0 ); local 246 if (len < 0) { 257 if (len == 0) { /* end of stream ? * 285 int len = recv(socket, buf, sizeof(buf), 0); local 613 int len; local [all...] |
/external/icu4c/tools/genrb/ |
derb.c | 63 static void printString(FILE *out, UConverter *converter, const UChar *str, int32_t len); 64 static void printCString(FILE *out, UConverter *converter, const char *str, int32_t len); 304 int32_t len; local 314 len = (int32_t)uprv_strlen(ext); 315 if (len) { 316 tp -= len - 1; 374 int len = u_strlen(string); local 375 int alen = len; 410 static void printString(FILE *out, UConverter *converter, const UChar *str, int32_t len) { 414 if (len < 0) 520 int32_t len = 0; local 562 int32_t len=0; local 624 int32_t len = 0; local 657 int32_t len = 0; local [all...] |
/bionic/libc/tzcode/ |
strptime.c | 107 size_t len = 0; local 209 len = strlen(_ctloc(day[i])); 210 if (strncasecmp(_ctloc(day[i]), (const char*)bp, len) == 0) 214 len = strlen(_ctloc(abday[i])); 215 if (strncasecmp(_ctloc(abday[i]), (const char*)bp, len) == 0) 224 bp += len; 233 len = strlen(_ctloc(mon[i])); 234 if (strncasecmp(_ctloc(mon[i]), (const char*)bp, len) == 0) 238 len = strlen(_ctloc(abmon[i])); 239 if (strncasecmp(_ctloc(abmon[i]), (const char*)bp, len) == 0 [all...] |
/dalvik/libcore/security/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 95 // offset + len > buf.length 101 // offset + len > Integer.MAX_VALUE 106 // offset<0 and len<0 are passed to provider 108 final int len = -1; local 114 assertEquals("len", len, arg2); 118 md.update(bytes, offset, len); 215 // offset + len > buf.length 221 // offset + len > Integer.MAX_VALUE 226 // offset<0 and len<0 are passed to provide 228 final int len = -1; local [all...] |
/external/bluetooth/hcidump/parser/ |
parser.c | 170 data = malloc(fr->len + frm->len); 177 if (fr->len > 0) 178 memcpy(data, fr->ptr, fr->len); 180 if (frm->len > 0) 181 memcpy(data + fr->len, frm->ptr, frm->len); 187 fr->data_len = fr->len + frm->len; 188 fr->len = fr->data_len [all...] |
/external/dropbear/ |
svr-authpubkey.c | 104 if (buf_verify(ses.payload, key, buf_getptr(signbuf, signbuf->len), 105 signbuf->len) == DROPBEAR_SUCCESS) { 161 unsigned int len, pos; local 181 len = strlen(ses.authstate.pw->pw_dir); 184 filename = m_malloc(len + 22); 185 snprintf(filename, len + 22, "%s/.ssh/authorized_keys", 206 if (line->len < MIN_AUTHKEYS_LINE) { 226 for (len = 0; line->pos < line->len; len++) 265 unsigned int len; local [all...] |
/external/iproute2/include/linux/ |
rtnetlink.h | 139 #define RTA_ALIGN(len) ( ((len)+RTA_ALIGNTO-1) & ~(RTA_ALIGNTO-1) ) 140 #define RTA_OK(rta,len) ((len) >= (int)sizeof(struct rtattr) && \ 142 (rta)->rta_len <= (len)) 145 #define RTA_LENGTH(len) (RTA_ALIGN(sizeof(struct rtattr)) + (len)) 146 #define RTA_SPACE(len) RTA_ALIGN(RTA_LENGTH(len)) 318 #define RTNH_ALIGN(len) ( ((len)+RTNH_ALIGNTO-1) & ~(RTNH_ALIGNTO-1) [all...] |