/system/bluetooth/bluez-clean-headers/bluetooth/ |
hci_lib.h | 32 int rlen; member in struct:hci_request
|
/external/bluetooth/bluez/test/ |
hstest.c | 154 int maxfd, sel, rlen, wlen; local 267 rlen = read(rd, buf, sizeof(buf)); 268 if (rlen > 0) { 276 rlen = read(sd, buf, sizeof(buf)); 277 if (rlen > 0) 280 rlen = read(fd, buf, rlen); 284 while (rlen > sco_mtu) { 286 rlen -= sco_mtu; 289 wlen += write(sd, p, rlen); [all...] |
lmptest.c | 64 rq.rlen = 0; 97 rq.rlen = 0;
|
bdaddr.c | 75 rq.rlen = 0; 108 rq.rlen = 0; 148 rq.rlen = sizeof(rp); 189 rq.rlen = sizeof(rp); 217 rq.rlen = 0; 245 rq.rlen = 0; 273 rq.rlen = 0;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gtc.c | 104 size_t rlen; local 106 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 107 if (pos == NULL || rlen < 1) 110 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 116 if (rlen < 10) { 123 end = pos + rlen; 168 rlen = end - pos; 171 pos, rlen); 183 if (rlen != sm->user->password_len || 184 os_memcmp(pos, sm->user->password, rlen) != 0) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 104 size_t rlen; local 106 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 107 if (pos == NULL || rlen < 1) 110 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 116 if (rlen < 10) { 123 end = pos + rlen; 168 rlen = end - pos; 171 pos, rlen); 183 if (rlen != sm->user->password_len || 184 os_memcmp(pos, sm->user->password, rlen) != 0) [all...] |
/external/ipsec-tools/src/racoon/ |
kmpstat.c | 141 int len, rlen; local 163 rlen = ((u_int32_t)h.ac_len) + (((u_int32_t)h.ac_len_high) << 16); 165 rlen = h.ac_len; 168 if ((*combufp = vmalloc(rlen)) == NULL) 173 while (l < rlen) { 174 if ((len = recv(so, p, rlen - l, 0)) < 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_write.c | 51 size_t rlen; local 145 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 151 pos = rhdr + rlen; 163 size_t rlen; local 229 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 235 pos = rhdr + rlen; 252 size_t rlen; local 423 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 429 pos = rhdr + rlen; 446 size_t rlen; local 511 size_t rlen; local 553 size_t rlen; local 587 size_t rlen, hlen; local [all...] |
tlsv1_record.c | 249 size_t i, rlen, hlen; local 285 rlen = WPA_GET_BE16(in_data + 3); 288 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 290 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 298 if (rlen > in_len) { 300 "(rlen=%lu > in_len=%lu)", 301 (unsigned long) rlen, (unsigned long) in_len); 306 in_len = rlen;
|
tlsv1_client_write.c | 136 size_t rlen; local 194 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 200 pos = rhdr + rlen; 382 size_t rlen; local 420 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 426 pos = rhdr + rlen; 439 size_t rlen, hlen, clen; local 541 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 547 pos = rhdr + rlen; 561 size_t rlen; local 595 size_t rlen, hlen; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 52 size_t rlen; local 146 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 152 pos = rhdr + rlen; 164 size_t rlen; local 230 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 236 pos = rhdr + rlen; 252 size_t rlen; local 421 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 427 pos = rhdr + rlen; 441 size_t rlen; local 506 size_t rlen; local 548 size_t rlen; local 582 size_t rlen, hlen; local [all...] |
tlsv1_record.c | 249 size_t i, rlen, hlen; local 285 rlen = WPA_GET_BE16(in_data + 3); 288 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 290 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 298 if (rlen > in_len) { 300 "(rlen=%lu > in_len=%lu)", 301 (unsigned long) rlen, (unsigned long) in_len); 306 in_len = rlen;
|
tlsv1_client_write.c | 137 size_t rlen; local 195 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 201 pos = rhdr + rlen; 378 size_t rlen; local 416 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 422 pos = rhdr + rlen; 435 size_t rlen, hlen, clen; local 537 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) { 543 pos = rhdr + rlen; 557 size_t rlen; local 591 size_t rlen, hlen; local [all...] |
/external/bluetooth/bluez/lib/ |
hci.c | 1165 r->rlen = MIN(len, r->rlen); 1166 memcpy(r->rparam, ptr, r->rlen); 1178 r->rlen = MIN(len, r->rlen); 1179 memcpy(r->rparam, ptr, r->rlen); 1192 r->rlen = MIN(len, r->rlen); 1193 memcpy(r->rparam, ptr, r->rlen); 1203 r->rlen = MIN(len, r->rlen) [all...] |
/external/bluetooth/bluez/attrib/ |
gatt.c | 395 static void read_blob_helper(guint8 status, const guint8 *rpdu, guint16 rlen, 405 if (status != 0 || rlen == 1) { 410 tmp = g_try_realloc(long_read->buffer, long_read->size + rlen - 1); 417 memcpy(&tmp[long_read->size], &rpdu[1], rlen - 1); 419 long_read->size += rlen - 1; 422 if (rlen < buflen) 444 guint16 rlen, gpointer user_data) 452 if (status != 0 || rlen < buflen) 455 long_read->buffer = g_malloc(rlen); 460 memcpy(long_read->buffer, rpdu, rlen); [all...] |
/external/bluetooth/bluez/plugins/ |
dbusoob.c | 134 int32_t hlen, rlen; local 141 DBUS_TYPE_ARRAY, DBUS_TYPE_BYTE, &randomizer, &rlen, 145 if (hlen != 16 || rlen != 16 || bachk(addr))
|
/external/qemu/audio/ |
wavcapture.c | 34 uint8_t rlen[4]; local 40 le_store (rlen, rifflen, 4); 44 qemu_put_buffer (wav->f, rlen, 4);
|
/external/wpa_supplicant/ |
pcsc_funcs.c | 328 int rlen, rec; local 349 rlen = scard_get_record_len(scard, rec, 351 if (rlen < 0) { 357 if (rlen > (int) blen) { 361 if (scard_read_record(scard, buf, rlen, rec, 367 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 376 if (efdir->appl_template_len > rlen - 2) { 378 "template (len=%d rlen=%d)", 379 efdir->appl_template_len, rlen); 679 unsigned long rlen; local 711 size_t len, rlen; local [all...] |
tlsv1_common.c | 393 size_t i, rlen, hlen; local 428 rlen = WPA_GET_BE16(in_data + 3); 431 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 433 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 441 if (rlen > in_len) { 443 "(rlen=%lu > in_len=%lu)", 444 (unsigned long) rlen, (unsigned long) in_len); 449 in_len = rlen;
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.c | 328 int rlen, rec; local 349 rlen = scard_get_record_len(scard, rec, 351 if (rlen < 0) { 357 if (rlen > (int) blen) { 361 if (scard_read_record(scard, buf, rlen, rec, 367 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 376 if (efdir->appl_template_len > rlen - 2) { 378 "template (len=%d rlen=%d)", 379 efdir->appl_template_len, rlen); 679 unsigned long rlen; local 711 size_t len, rlen; local [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 328 int rlen, rec; local 349 rlen = scard_get_record_len(scard, rec, 351 if (rlen < 0) { 357 if (rlen > (int) blen) { 361 if (scard_read_record(scard, buf, rlen, rec, 367 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 376 if (efdir->appl_template_len > rlen - 2) { 378 "template (len=%d rlen=%d)", 379 efdir->appl_template_len, rlen); 679 unsigned long rlen; local 711 size_t len, rlen; local [all...] |
/external/svox/pico/lib/ |
picopr.c | 263 picoos_int32 rlen; member in struct:pr_Path [all...] |
/external/openssl/include/openssl/ |
kssl.h | 167 krb5_principal *princ, int rlen, const char *realm,
|
/external/openssl/ssl/ |
kssl.h | 167 krb5_principal *princ, int rlen, const char *realm,
|
/external/libpcap/ |
pcap-dag.c | 259 unsigned short rlen; local 274 rlen = ntohs(header->rlen); 275 if (rlen < dag_record_size) 280 p->md.dag_mem_bottom += rlen; 288 caplen = rlen - dag_record_size; 302 caplen = rlen - dag_record_size - 4; 339 caplen = rlen - dag_record_size - 2; 354 caplen = rlen - dag_record_size; 366 caplen = rlen - dag_record_size - 4 [all...] |