/external/chromium/third_party/icu/source/test/cintltst/ |
cg7coll.c | 142 int32_t i, rlen, j, n; local 157 defRules = ucol_getRules(myCollation, &rlen); 159 tblColl1 = ucol_openRules(defRules, rlen, UCOL_OFF,
|
callcoll.c | 635 uint32_t rlen = u_unescape(rules, rlz, RULE_BUFFER_LEN); local 638 UCollator *coll = ucol_openRules(rlz, rlen, UCOL_DEFAULT, UCOL_DEFAULT,NULL, &status); 684 uint32_t rlen = u_unescape(rules, rlz, RULE_BUFFER_LEN); local 687 coll = ucol_openRules(rlz, rlen, UCOL_DEFAULT, UCOL_DEFAULT,NULL, &status); 1060 int rlen = 0; local [all...] |
/external/icu4c/test/cintltst/ |
cg7coll.c | 146 int32_t i, rlen, j, n; local 161 defRules = ucol_getRules(myCollation, &rlen); 163 tblColl1 = ucol_openRules(defRules, rlen, UCOL_OFF,
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 249 size_t i, rlen, hlen; local 285 rlen = WPA_GET_BE16(in_data + 3); 288 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 290 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 298 if (rlen > in_len) { 300 "(rlen=%lu > in_len=%lu)", 301 (unsigned long) rlen, (unsigned long) in_len); 306 in_len = rlen;
|
tlsv1_server_write.c | 51 size_t rlen; local 145 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 151 pos = rhdr + rlen; 163 size_t rlen; local 229 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 235 pos = rhdr + rlen; 252 size_t rlen; local 423 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 429 pos = rhdr + rlen; 446 size_t rlen; local 511 size_t rlen; local 553 size_t rlen; local 587 size_t rlen, hlen; local [all...] |
tlsv1_client.c | 225 size_t rlen; local 233 out_data, out_len, in_len, &rlen) < 0) { 240 return rlen;
|
tlsv1_client_write.c | 136 size_t rlen; local 194 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 200 pos = rhdr + rlen; 382 size_t rlen; local 420 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 426 pos = rhdr + rlen; 439 size_t rlen, hlen, clen; local 541 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 547 pos = rhdr + rlen; 561 size_t rlen; local 595 size_t rlen, hlen; local [all...] |
tlsv1_server.c | 199 size_t rlen; local 207 out_data, out_len, in_len, &rlen) < 0) { 214 return rlen;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gtc.c | 104 size_t rlen; local 106 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 107 if (pos == NULL || rlen < 1) 110 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 116 if (rlen < 10) { 123 end = pos + rlen; 168 rlen = end - pos; 171 pos, rlen); 183 if (rlen != sm->user->password_len || 184 os_memcmp(pos, sm->user->password, rlen) != 0) [all...] |
eap_tnc.c | 101 size_t rlen; local 119 rlen = start_len + imv_len + end_len; 120 req = wpabuf_alloc(rlen);
|
/external/bluetooth/bluez/lib/bluetooth/ |
hci_lib.h | 40 int rlen; member in struct:hci_request
|
/external/bluetooth/bluez/test/ |
hstest.c | 154 int maxfd, sel, rlen, wlen; local 265 rlen = read(rd, buf, sizeof(buf)); 266 if (rlen > 0) { 274 rlen = read(sd, buf, sizeof(buf)); 275 if (rlen > 0) 278 rlen = read(fd, buf, rlen); 282 while (rlen > sco_mtu) { 284 rlen -= sco_mtu; 287 wlen += write(sd, p, rlen); [all...] |
/external/qemu/audio/ |
wavcapture.c | 34 uint8_t rlen[4]; local 40 le_store (rlen, rifflen, 4); 44 qemu_put_buffer (wav->f, rlen, 4);
|
wavaudio.c | 185 uint8_t rlen[4]; local 194 le_store (rlen, rifflen, 4); 198 qemu_put_buffer (wav->f, rlen, 4);
|
/external/wpa_supplicant/ |
tlsv1_common.c | 393 size_t i, rlen, hlen; local 428 rlen = WPA_GET_BE16(in_data + 3); 431 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 433 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 441 if (rlen > in_len) { 443 "(rlen=%lu > in_len=%lu)", 444 (unsigned long) rlen, (unsigned long) in_len); 449 in_len = rlen;
|
pcsc_funcs.c | 328 int rlen, rec; local 349 rlen = scard_get_record_len(scard, rec, 351 if (rlen < 0) { 357 if (rlen > (int) blen) { 361 if (scard_read_record(scard, buf, rlen, rec, 367 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 376 if (efdir->appl_template_len > rlen - 2) { 378 "template (len=%d rlen=%d)", 379 efdir->appl_template_len, rlen); 679 unsigned long rlen; local 711 size_t len, rlen; local [all...] |
/external/openssl/ssl/ |
s3_lib.c | 2179 size_t rlen, wlen; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 200 size_t rlen; local 252 rlen = 2 + EAP_SAKE_RAND_LEN + 2 + EAP_SAKE_MIC_LEN; 254 rlen += 2 + data->peerid_len; 255 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen,
|
eap_tnc.c | 210 size_t len, rlen; local 383 rlen = start_len + imc_len + end_len; 384 resp = wpabuf_alloc(rlen);
|
/external/libpcap/ |
pcap-dag.c | 259 unsigned short rlen; local 274 rlen = ntohs(header->rlen); 275 if (rlen < dag_record_size) 280 p->md.dag_mem_bottom += rlen; 288 caplen = rlen - dag_record_size; 302 caplen = rlen - dag_record_size - 4; 339 caplen = rlen - dag_record_size - 2; 354 caplen = rlen - dag_record_size; 366 caplen = rlen - dag_record_size - 4 [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 71 size_t rlen; local 83 NULL, sizeof(*err) + kde_len, &rlen, 121 rbuf, rlen, err->key_mic); 132 size_t rlen; local 144 NULL, sizeof(*reply) + kde_len, &rlen, 173 rbuf, rlen, reply->key_mic); 1003 size_t rlen, kde_len; local 1082 sizeof(*req) + kde_len, &rlen, [all...] |
wpa.c | 143 size_t rlen; local 162 sizeof(*reply), &rlen, (void *) &reply); 185 error, pairwise, sm->ptk_set, (unsigned long) rlen); 187 rbuf, rlen, key_info & WPA_KEY_INFO_MIC ? 316 size_t rlen; local 330 &rlen, (void *) &reply); 352 rbuf, rlen, reply->key_mic); 905 size_t rlen; local 914 &rlen, (void *) &reply); 936 rbuf, rlen, reply->key_mic) 1174 size_t rlen; local [all...] |
/external/qemu/hw/ |
bt-hid.c | 207 int rlen, ret = -1; local 266 rlen = data[2] | (data[3] << 8); 268 rlen = INT_MAX; 276 s->datain.buffer, MIN(rlen, s->datain.len)); 280 s->dataout.buffer, MIN(rlen, s->dataout.len)); 284 s->feature.buffer, MIN(rlen, s->feature.len));
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.c | 328 int rlen, rec; local 349 rlen = scard_get_record_len(scard, rec, 351 if (rlen < 0) { 357 if (rlen > (int) blen) { 361 if (scard_read_record(scard, buf, rlen, rec, 367 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 376 if (efdir->appl_template_len > rlen - 2) { 378 "template (len=%d rlen=%d)", 379 efdir->appl_template_len, rlen); 679 unsigned long rlen; local 711 size_t len, rlen; local [all...] |
/external/freetype/src/base/ |
ftobjs.c | 1530 FT_Long rlen, temp; local 1671 FT_Long rlen; local [all...] |