/external/liblzf/ |
lzf_d.c | 56 lzf_decompress (const void *const in_data, unsigned int in_len, 61 u8 const *const in_end = ip + in_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 972 u8 *in_data, size_t in_len) 991 if (in_len > sizeof(*hdr) && *pos == EAP_TYPE_NAK) { 992 left = in_len - sizeof(*hdr); 1020 wpabuf_set(&buf, in_data, in_len); 1094 u8 *in_data, size_t in_len) 1100 if (in_len < (int) sizeof(*hdr)) { 1102 "EAP frame (len=%lu)", (unsigned long) in_len); 1107 if (len > in_len) { 1110 (unsigned long) in_len, (unsigned long) len); [all...] |
eap_server_ttls.c | 941 u8 *in_data, size_t in_len) 960 if (in_len > sizeof(*hdr) && *pos == EAP_TYPE_NAK) { 961 left = in_len - sizeof(*hdr); 985 wpabuf_set(&buf, in_data, in_len); [all...] |
/external/chromium/net/http/ |
http_auth_handler_ntlm_portable.cc | 387 static int ParseType2Msg(const void* in_buf, uint32 in_len, Type2Msg* msg) { 397 if (in_len < NTLM_TYPE2_HEADER_LEN) 420 if (offset + target_len > offset && offset + target_len <= in_len) { 456 uint32 in_len, 464 rv = ParseType2Msg(in_buf, in_len, &msg);
|
/external/wpa_supplicant/ |
eap_peap.c | 394 const u8 *in_data, size_t in_len, 407 " Phase 2", (unsigned long) in_len); 425 msg = eap_tls_data_reassemble(sm, &data->ssl, in_data, in_len, 430 if (in_len == 0 && sm->workaround && data->phase2_success) { 443 buf_len = in_len;
|
tlsv1_common.h | 230 const u8 *in_data, size_t in_len,
|
tls_openssl.c | [all...] |
eap_ttls.c | 1076 const u8 *in_data, size_t in_len, 1093 " Phase 2", (unsigned long) in_len); 1116 if (in_len == 0 && data->phase2_start) { 1154 msg = eap_tls_data_reassemble(sm, &data->ssl, in_data, in_len, 1159 buf_len = in_len; [all...] |
eap_fast.c | [all...] |
/system/core/adb/ |
jdwp_service.c | 113 int in_len; /* number from JDWP process */ member in struct:JdwpProcess 217 proc->in_len = 0; 242 char* p = proc->in_buff + proc->in_len; 243 int size = 4 - proc->in_len; 263 proc->in_len += len;
|
/frameworks/base/opengl/libs/GLES2_dbg/src/ |
header.h | 130 void Compress(const void * in_data, unsigned in_len, std::string * const outStr);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_openssl.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_peap.c | 1036 size_t in_len; local 1039 in_len = wpabuf_len(in_buf); 1042 " Phase 2", (unsigned long) in_len); 1054 buf_len = in_len; 1071 in_data, in_len, [all...] |
/external/sqlite/android/ |
PhoneNumberUtils.cpp | 441 int in_len = strlen(in); local 444 for (int i = in_len; --i >= 0;) {
|
/hardware/msm7k/librpc/ |
clnt.c | 145 client->xdr->in_msg, client->xdr->in_len); 148 (*svc_xdr)->in_len = client->xdr->in_len;
|
/development/tools/emulator/system/qemud/ |
qemud.c | 1061 int in_len; /* current bytes in input packet */ member in struct:Serial 1094 int inpos = s->in_len; 1152 s->in_len = inpos; 1197 s->in_len = 0; [all...] |
/sdk/emulator/qemud/ |
qemud.c | 1061 int in_len; /* current bytes in input packet */ member in struct:Serial 1094 int inpos = s->in_len; 1152 s->in_len = inpos; 1197 s->in_len = 0; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 466 wpa_printf(MSG_DEBUG, "NSS: handshake: in_len=%u",
|
/hardware/msm7k/librpc/rpc/ |
types.h | 414 int in_len; member in struct:xdr_struct
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_ttls.c | [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | [all...] |
/external/e2fsprogs/lib/blkid/ |
probe.c | 1131 const unsigned char *buf, int in_len) 1136 for (i = j = 0; i + 2 <= in_len; i += 2) { [all...] |
/prebuilt/ndk/android-ndk-r4/platforms/android-3/arch-arm/usr/lib/ |
libc.so | |
/prebuilt/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/lib/ |
libc.so | |
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-arm/usr/lib/ |
libc.so | |