/external/qemu/slirp/ |
cksum.c | 51 register int mlen = 0; local 67 mlen = m->m_len; 69 if (len < mlen) 70 mlen = len; 71 len -= mlen; 75 if ((1 & (long) w) && (mlen > 0)) { 80 mlen--; 87 while ((mlen -= 32) >= 0) { 94 mlen += 32; 95 while ((mlen -= 8) >= 0) [all...] |
/external/qemu/slirp-android/ |
cksum.c | 51 register int mlen = 0; local 67 mlen = m->m_len; 69 if (len < mlen) 70 mlen = len; 71 len -= mlen; 75 if ((1 & (long) w) && (mlen > 0)) { 80 mlen--; 87 while ((mlen -= 32) >= 0) { 94 mlen += 32; 95 while ((mlen -= 8) >= 0) [all...] |
/external/ipsec-tools/src/racoon/ |
str2val.c | 51 val2str(buf, mlen) 53 size_t mlen; 56 size_t len = (mlen * 2) + mlen / 8 + 10; 61 for (i = 0, j = 0; i < mlen; i++) {
|
/external/openssl/crypto/rsa/ |
rsa_oaep.c | 95 int i, dblen, mlen = -1; local 159 mlen = dblen - ++i; 160 if (tlen < mlen) 163 mlen = -1; 166 memcpy(to, db + i, mlen); 170 return mlen;
|
/frameworks/base/tests/CoreTests/android/core/ |
VectorTest.java | 108 int mLen; 109 mLen = vector.size(); 110 mLen = vector.size(); 111 mLen = vector.size(); 112 mLen = vector.size(); 113 mLen = vector.size(); 114 mLen = vector.size(); 115 mLen = vector.size(); 116 mLen = vector.size(); 117 mLen = vector.size() [all...] |
/external/libpcap/bpf/net/ |
bpf_filter.c | 66 # define MLEN(m) ((m)->b_wptr - (m)->b_rptr) 69 # define MLEN(m) ((m)->m_len) 122 len = MLEN(m); \ 128 len = MLEN(m); \ 148 if (m0 == 0 || MLEN(m0) + len - k < 4) 218 buflen = MLEN(m);
|
/external/ppp/pppd/ |
upap.c | 620 int mlen, ulen, wlen; local 665 mlen = p[0]; 666 if (len < mlen + 1) 669 p += mlen + 1; 670 len -= mlen + 1; 672 print_string(msg, mlen, printer, arg);
|
chap-new.c | 313 int response_len, ok, mlen; local 365 mlen = strlen(message); 366 len = CHAP_HDRLEN + mlen; 371 if (mlen > 0) 372 memcpy(p + CHAP_HDRLEN, message, mlen);
|
/external/wpa_supplicant/ |
l2_packet_pcap.c | 99 size_t mlen = sizeof(*eth) + len; local 100 eth = os_malloc(mlen); 110 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); 112 ret = eth_send(l2->eth, (u8 *) eth, mlen);
|
l2_packet_winpcap.c | 90 size_t mlen = sizeof(*eth) + len; local 91 eth = os_malloc(mlen); 99 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen);
|
l2_packet_ndis.c | 122 size_t mlen = sizeof(*eth) + len; local 123 eth = os_malloc(mlen); 131 res = WriteFile(driver_ndis_get_ndisuio_handle(), eth, mlen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
l2_packet_pcap.c | 99 size_t mlen = sizeof(*eth) + len; local 100 eth = os_malloc(mlen); 110 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); 112 ret = eth_send(l2->eth, (u8 *) eth, mlen);
|
l2_packet_winpcap.c | 90 size_t mlen = sizeof(*eth) + len; local 91 eth = os_malloc(mlen); 99 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen);
|
l2_packet_ndis.c | 122 size_t mlen = sizeof(*eth) + len; local 123 eth = os_malloc(mlen); 131 res = WriteFile(driver_ndis_get_ndisuio_handle(), eth, mlen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 601 size_t mlen; local 605 mlen = eap_gpsk_mic_len(data->vendor, data->specifier); 607 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, 1 + 2 + mlen, 618 rpos = wpabuf_put(resp, mlen);
|
eap_pax.c | 339 u16 flen, mlen; local 349 mlen = wpabuf_len(reqData) - EAP_PAX_ICV_LEN; 418 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0, 422 wpabuf_head(reqData), mlen, NULL, 0, NULL, 0,
|
/bionic/libc/regex/ |
regcomp.c | 205 g->mlen = 0; [all...] |
/dalvik/libcore/luni/src/main/java/org/apache/harmony/luni/internal/util/ |
ZoneInfo.java | 157 int[] mlen = isLeap ? LEAP : NORMAL; local 159 calc += mlen[month] * MILLISECONDS_PER_DAY;
|
/development/tools/zoneinfo/ |
ZoneInfo.java | 168 int[] mlen = isLeap ? LEAP : NORMAL; local 170 calc += mlen[month] * MILLISECONDS_PER_DAY;
|
/external/bluetooth/bluez/src/ |
sdpd-request.c | 345 int status = 0, i, plen, mlen, mtu, scanned; local 367 mlen = scanned + sizeof(uint16_t) + 1; 369 if (plen < mlen || plen != mlen + *(uint8_t *)(pdata+sizeof(uint16_t))) { 628 int status = 0, plen, mlen; local 668 mlen = scanned + sizeof(uint32_t) + sizeof(uint16_t) + 1; 670 if (plen < mlen || plen != mlen + *(uint8_t *)pdata) {
|
/external/openssl/ssl/ |
t1_lib.c | 911 int slen, mlen, renew_ticket = 0; local 947 mlen = HMAC_size(&hctx); 948 eticklen -= mlen; 953 if (memcmp(tick_hmac, etick + eticklen, mlen)) 966 if (EVP_DecryptFinal(&ctx, sdec + slen, &mlen) <= 0) 968 slen += mlen;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 194 size_t len, mlen; local 203 mlen = sizeof(struct eap_hdr) + 1 + len; 270 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN;
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 336 size_t mlen; local 345 sizeof(*msg) + kde_len, &mlen, 386 mbuf, mlen, NULL); 393 size_t mlen; local 404 sizeof(*msg) + kde_len, &mlen, 441 ETH_P_EAPOL, mbuf, mlen, msg->key_mic); [all...] |
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_oaep_decode.c | 123 /* now DB == lhash || PS || 0x01 || M, PS == k - mlen - 2hlen - 2 zeroes */
|
pkcs_1_oaep_encode.c | 84 /* DB == lhash || PS || 0x01 || M, PS == k - mlen - 2hlen - 2 zeroes */
|