HomeSort by relevance Sort by last modified time
    Searched refs:nlen (Results 1 - 25 of 91) sorted by null

1 2 3 4

  /external/wpa_supplicant_8/src/utils/
ext_password_test.c 48 size_t nlen; local
55 nlen = os_strlen(name);
58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') {
60 pos += nlen + 1;
  /external/zlib/src/contrib/infback9/
inflate9.h 40 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
infback9.c 349 state->nlen = BITS(5) + 257;
355 if (state->nlen > 286) {
385 while (state->have < state->nlen + state->ndist) {
423 if (state->have + copy > state->nlen + state->ndist) {
449 ret = inflate_table9(LENS, state->lens, state->nlen,
458 ret = inflate_table9(DISTS, state->lens + state->nlen,
  /external/wpa_supplicant_8/wpa_supplicant/
autoscan.c 50 size_t nlen; local
63 nlen = os_strlen(name);
65 nlen = params - name;
70 if (os_strncmp(name, autoscan_modules[i]->name, nlen) == 0) {
bgscan.c 38 size_t nlen; local
49 nlen = os_strlen(name);
51 nlen = params - name;
56 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) {
  /external/openssl/crypto/x509v3/
v3_info.c 108 int i,nlen;
117 nlen = strlen(objtmp) + strlen(vtmp->name) + 5;
118 ntmp = OPENSSL_malloc(nlen);
124 BUF_strlcpy(ntmp, objtmp, nlen);
125 BUF_strlcat(ntmp, " - ", nlen);
126 BUF_strlcat(ntmp, vtmp->name, nlen);
  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.c 24 size_t nlen; local
30 nlen = i_nonce_len + r_nonce_len;
31 nonces = os_malloc(nlen);
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
  /external/qemu/distrib/zlib-1.2.3/
inflate.h 108 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
infback.c 352 state->nlen = BITS(5) + 257;
359 if (state->nlen > 286 || state->ndist > 30) {
390 while (state->have < state->nlen + state->ndist) {
428 if (state->have + copy > state->nlen + state->ndist) {
445 ret = inflate_table(LENS, state->lens, state->nlen, &(state->next),
454 ret = inflate_table(DISTS, state->lens + state->nlen, state->ndist,
  /external/zlib/src/
inflate.h 112 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
infback.c 361 state->nlen = BITS(5) + 257;
368 if (state->nlen > 286 || state->ndist > 30) {
399 while (state->have < state->nlen + state->ndist) {
436 if (state->have + copy > state->nlen + state->ndist) {
462 ret = inflate_table(LENS, state->lens, state->nlen, &(state->next),
471 ret = inflate_table(DISTS, state->lens + state->nlen, state->ndist,
  /external/zlib/src/contrib/puff/
puff.c 646 * - Given the number of literal/length code lengths (nlen) and distance code
647 * lengths (ndist), then they are treated as one long list of nlen + ndist
666 int nlen, ndist, ncode; /* number of lengths in descriptor */ local
683 nlen = bits(s, 5) + 257;
686 if (nlen > MAXLCODES || ndist > MAXDCODES)
702 while (index < nlen + ndist) {
721 if (index + symbol > nlen + ndist
    [all...]
  /external/ppp/pppd/
chap-new.c 285 int clen = 1, nlen, len; local
293 nlen = strlen(ss->name);
294 memcpy(p + 1 + clen, ss->name, nlen);
296 len = CHAP_HDRLEN + 1 + clen + nlen;
426 int clen, nlen; local
438 nlen = len - (clen + 1);
441 slprintf(rname, sizeof(rname), "%.*v", nlen, pkt + clen + 1);
462 nlen = strlen(cs->name);
463 memcpy(p + clen + 1, cs->name, nlen);
466 len = CHAP_HDRLEN + clen + 1 + nlen;
576 int clen, nlen; local
    [all...]
  /external/valgrind/main/exp-sgcheck/
h_intercepts.c 327 UWord nlen = 0; \
328 while (n[nlen]) nlen++; \
331 if (nlen == 0) return h; \
333 /* assert(nlen >= 1); */ \
342 for (i = 0; i < nlen; i++) { \
346 /* assert(i >= 0 && i <= nlen); */ \
347 if (i == nlen) \
  /external/chromium/third_party/libjingle/source/talk/base/
httpbase.h 68 virtual ProcessResult ProcessHeader(const char* name, size_t nlen,
170 virtual ProcessResult ProcessHeader(const char* name, size_t nlen,
httpbase.cc 162 size_t nlen = (value - line); local
168 if (MatchHeader(line, nlen, HH_CONTENT_LENGTH)) {
175 } else if (MatchHeader(line, nlen, HH_TRANSFER_ENCODING)) {
185 return ProcessHeader(line, nlen, value, vlen, error);
833 HttpBase::ProcessHeader(const char* name, size_t nlen, const char* value,
835 std::string sname(name, nlen), svalue(value, vlen);
  /system/core/toolbox/cp/
cp.c 335 size_t nlen; local
405 nlen = curr->fts_pathlen - base;
411 if (target_mid - to.p_path + nlen >= PATH_MAX) {
417 (void)strncat(target_mid, p, nlen);
418 to.p_end = target_mid + nlen;
  /external/tcpdump/
addrtoname.c 350 * with length 'nlen'
354 lookup_bytestring(register const u_char *bs, const unsigned int nlen)
359 if (nlen >= 6) {
363 } else if (nlen >= 4) {
375 memcmp((const char *)bs, (const char *)(tp->e_bs), nlen) == 0)
384 tp->e_bs = (u_char *) calloc(1, nlen + 1);
385 memcpy(tp->e_bs, bs, nlen);
399 unsigned int nlen = *nsap; local
401 const u_char *ensap = nsap + nlen - 6;
403 if (nlen > 6)
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_parse.c 22 size_t i, nlen; local
150 nlen = WPA_GET_BE16(pos);
152 if (data + len - pos < (int) nlen || nlen > 32) {
154 "length %d (buf len %d)", (int) nlen,
158 os_memcpy(msg->device_name, pos, nlen);
159 msg->device_name[nlen] = '\0';
160 for (i = 0; i < nlen; i++) {
  /external/libppp/src/
chap.c 133 size_t nlen, klen; local
135 nlen = strlen(name);
144 if ((result = malloc(1 + nlen + MS_CHAP_RESPONSE_LEN)) == NULL)
149 memcpy(digest + MS_CHAP_RESPONSE_LEN, name, nlen);
191 if ((result = malloc(1 + nlen + CHAP81_RESPONSE_LEN)) == NULL)
194 memset(result, 0, 1 + nlen + CHAP81_RESPONSE_LEN);
228 memcpy(digest + CHAP81_RESPONSE_LEN, name, nlen);
231 if ((result = malloc(nlen + 17)) != NULL) {
244 memcpy(digest + 16, name, nlen);
699 size_t nlen; local
    [all...]
pap.c 184 u_char nlen, klen, *key; local
225 bp = mbuf_Read(bp, &nlen, 1);
229 * nlen (a one-byte length). Show the rest of the ack packet
236 bp = auth_ReadName(authp, bp, nlen);
  /external/strace/
system.c     [all...]
  /external/valgrind/main/memcheck/
mc_replace_strmem.c     [all...]
  /system/core/sh/
var.c 276 int nlen; local
280 vp = find_var(s, &vpp, &nlen);
307 vp->name_len = nlen;
  /external/kernel-headers/original/linux/
sysctl.h 30 the largest acceptable value for the nlen
35 int nlen; member in struct:__sysctl_args
911 typedef int ctl_handler (ctl_table *table, int __user *name, int nlen,
938 extern int do_sysctl (int __user *name, int nlen,
943 int __user *name, int nlen,

Completed in 1235 milliseconds

1 2 3 4