/external/openssl/crypto/x509v3/ |
v3_conf.c | 77 static unsigned char *generic_asn1(char *value, X509V3_CTX *ctx, long *ext_len); 179 int ext_len; local 186 ext_len = ASN1_item_i2d(ext_struc, &ext_der, ASN1_ITEM_ptr(method->it)); 187 if (ext_len < 0) goto merr; 192 ext_len = method->i2d(ext_struc, NULL); 193 if(!(ext_der = OPENSSL_malloc(ext_len))) goto merr; 199 ext_oct->length = ext_len; 265 long ext_len; local 277 ext_der = string_to_hex(value, &ext_len); 279 ext_der = generic_asn1(value, ctx, &ext_len); [all...] |
/packages/inputmethods/PinyinIME/jni/include/ |
searchutility.h | 63 // 1. splids = {w, m}; splids_extended = 1; ext_len = 1; step_no = 1; 66 // 2. splids = {m}; splids_extended = 0; ext_len = 1; step_no = 1; 71 // splids = {wo, men}, splids_extended = 1, ext_len = 3 (length of "men"), 87 uint16 ext_len; member in struct:ime_pinyin::__anon16863
|
matrixsearch.h | 299 // Extend a DMI node with a spelling id. ext_len is the length of the rows
|
/external/e2fsprogs/misc/ |
filefrag.c | 119 unsigned long ext_len; local 126 ext_len = fm_extent->fe_length >> blk_shift; 158 ext_len, flags); 163 ext_len, flags); 227 unsigned long ext_len; local 230 ext_len = fm_ext[i].fe_length >> blk_shift; 239 last_blk = phy_blk + ext_len - 1;
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_read.c | 43 u16 ext_type, ext_len; local 188 ext_len = WPA_GET_BE16(pos); 192 "extensions", ext_len); 193 if (end - pos != ext_len) { 196 ext_len, (unsigned int) (end - pos)); 223 ext_len = WPA_GET_BE16(pos); 226 if (end - pos < ext_len) { 235 "Extension data", pos, ext_len); 239 conn->session_ticket = os_malloc(ext_len); 242 ext_len); [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_read.c | 43 u16 ext_type, ext_len; local 188 ext_len = WPA_GET_BE16(pos); 192 "extensions", ext_len); 193 if (end - pos != ext_len) { 196 ext_len, (unsigned int) (end - pos)); 223 ext_len = WPA_GET_BE16(pos); 226 if (end - pos < ext_len) { 235 "Extension data", pos, ext_len); 239 conn->session_ticket = os_malloc(ext_len); 242 ext_len); [all...] |
/packages/inputmethods/PinyinIME/jni/share/ |
matrixsearch.cpp | 976 // Extend the search matrix, from the oldest unfixed row. ext_len means 978 for (uint16 ext_len = kMaxPinyinSize + 1; ext_len > 0; ext_len--) { 979 if (ext_len > pys_decoded_len_ - spl_start_[fixed_hzs_]) 986 if (ext_len > 1 && 0 != longest_ext && 987 0 == matrix_[pys_decoded_len_ - ext_len].dmi_has_full_id) { 994 uint16 oldrow = pys_decoded_len_ - ext_len; 1006 // 2. Get spelling id(s) for the last ext_len chars. 1010 ext_len, &is_pre) [all...] |
/external/openssl/ssl/ |
ssl_sess.c | 868 int SSL_set_session_ticket_ext(SSL *s, void *ext_data, int ext_len) 878 s->tlsext_session_ticket = OPENSSL_malloc(sizeof(TLS_SESSION_TICKET_EXT) + ext_len); 887 s->tlsext_session_ticket->length = ext_len; 889 memcpy(s->tlsext_session_ticket->data, ext_data, ext_len); [all...] |
ssl.h | [all...] |
/external/chromium/net/base/ |
mime_util.cc | 126 size_t ext_len = strlen(ext); local 132 if (end_pos == ext_len && 133 base::strncasecmp(extensions, ext, ext_len) == 0)
|
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 136 printf("kdebug_sadb: invalid ext_len=0 was passed.\n"); 140 printf("kdebug_sadb: ext_len exceeds end of buffer.\n");
|
/external/openssl/include/openssl/ |
ssl.h | [all...] |