/external/wpa_supplicant_8/src/utils/ |
ext_password_test.c | 48 size_t nlen; local 55 nlen = os_strlen(name); 58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { 60 pos += nlen + 1;
|
/external/zlib/src/contrib/infback9/ |
inflate9.h | 40 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
|
infback9.c | 349 state->nlen = BITS(5) + 257; 355 if (state->nlen > 286) { 385 while (state->have < state->nlen + state->ndist) { 423 if (state->have + copy > state->nlen + state->ndist) { 449 ret = inflate_table9(LENS, state->lens, state->nlen, 458 ret = inflate_table9(DISTS, state->lens + state->nlen,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
autoscan.c | 50 size_t nlen; local 63 nlen = os_strlen(name); 65 nlen = params - name; 70 if (os_strncmp(name, autoscan_modules[i]->name, nlen) == 0) {
|
bgscan.c | 38 size_t nlen; local 49 nlen = os_strlen(name); 51 nlen = params - name; 56 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) {
|
/external/openssl/crypto/x509v3/ |
v3_info.c | 108 int i,nlen; 117 nlen = strlen(objtmp) + strlen(vtmp->name) + 5; 118 ntmp = OPENSSL_malloc(nlen); 124 BUF_strlcpy(ntmp, objtmp, nlen); 125 BUF_strlcat(ntmp, " - ", nlen); 126 BUF_strlcat(ntmp, vtmp->name, nlen);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.c | 24 size_t nlen; local 30 nlen = i_nonce_len + r_nonce_len; 31 nonces = os_malloc(nlen); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
|
/external/qemu/distrib/zlib-1.2.3/ |
inflate.h | 108 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
|
infback.c | 352 state->nlen = BITS(5) + 257; 359 if (state->nlen > 286 || state->ndist > 30) { 390 while (state->have < state->nlen + state->ndist) { 428 if (state->have + copy > state->nlen + state->ndist) { 445 ret = inflate_table(LENS, state->lens, state->nlen, &(state->next), 454 ret = inflate_table(DISTS, state->lens + state->nlen, state->ndist,
|
/external/zlib/src/ |
inflate.h | 112 unsigned nlen; /* number of length code lengths */ member in struct:inflate_state
|
infback.c | 361 state->nlen = BITS(5) + 257; 368 if (state->nlen > 286 || state->ndist > 30) { 399 while (state->have < state->nlen + state->ndist) { 436 if (state->have + copy > state->nlen + state->ndist) { 462 ret = inflate_table(LENS, state->lens, state->nlen, &(state->next), 471 ret = inflate_table(DISTS, state->lens + state->nlen, state->ndist,
|
/external/zlib/src/contrib/puff/ |
puff.c | 646 * - Given the number of literal/length code lengths (nlen) and distance code 647 * lengths (ndist), then they are treated as one long list of nlen + ndist 666 int nlen, ndist, ncode; /* number of lengths in descriptor */ local 683 nlen = bits(s, 5) + 257; 686 if (nlen > MAXLCODES || ndist > MAXDCODES) 702 while (index < nlen + ndist) { 721 if (index + symbol > nlen + ndist [all...] |
/external/ppp/pppd/ |
chap-new.c | 285 int clen = 1, nlen, len; local 293 nlen = strlen(ss->name); 294 memcpy(p + 1 + clen, ss->name, nlen); 296 len = CHAP_HDRLEN + 1 + clen + nlen; 426 int clen, nlen; local 438 nlen = len - (clen + 1); 441 slprintf(rname, sizeof(rname), "%.*v", nlen, pkt + clen + 1); 462 nlen = strlen(cs->name); 463 memcpy(p + clen + 1, cs->name, nlen); 466 len = CHAP_HDRLEN + clen + 1 + nlen; 576 int clen, nlen; local [all...] |
/external/valgrind/main/exp-sgcheck/ |
h_intercepts.c | 327 UWord nlen = 0; \ 328 while (n[nlen]) nlen++; \ 331 if (nlen == 0) return h; \ 333 /* assert(nlen >= 1); */ \ 342 for (i = 0; i < nlen; i++) { \ 346 /* assert(i >= 0 && i <= nlen); */ \ 347 if (i == nlen) \
|
/external/chromium/third_party/libjingle/source/talk/base/ |
httpbase.h | 68 virtual ProcessResult ProcessHeader(const char* name, size_t nlen, 170 virtual ProcessResult ProcessHeader(const char* name, size_t nlen,
|
httpbase.cc | 162 size_t nlen = (value - line); local 168 if (MatchHeader(line, nlen, HH_CONTENT_LENGTH)) { 175 } else if (MatchHeader(line, nlen, HH_TRANSFER_ENCODING)) { 185 return ProcessHeader(line, nlen, value, vlen, error); 833 HttpBase::ProcessHeader(const char* name, size_t nlen, const char* value, 835 std::string sname(name, nlen), svalue(value, vlen);
|
/system/core/toolbox/cp/ |
cp.c | 335 size_t nlen; local 405 nlen = curr->fts_pathlen - base; 411 if (target_mid - to.p_path + nlen >= PATH_MAX) { 417 (void)strncat(target_mid, p, nlen); 418 to.p_end = target_mid + nlen;
|
/external/tcpdump/ |
addrtoname.c | 350 * with length 'nlen' 354 lookup_bytestring(register const u_char *bs, const unsigned int nlen) 359 if (nlen >= 6) { 363 } else if (nlen >= 4) { 375 memcmp((const char *)bs, (const char *)(tp->e_bs), nlen) == 0) 384 tp->e_bs = (u_char *) calloc(1, nlen + 1); 385 memcpy(tp->e_bs, bs, nlen); 399 unsigned int nlen = *nsap; local 401 const u_char *ensap = nsap + nlen - 6; 403 if (nlen > 6) [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_parse.c | 22 size_t i, nlen; local 150 nlen = WPA_GET_BE16(pos); 152 if (data + len - pos < (int) nlen || nlen > 32) { 154 "length %d (buf len %d)", (int) nlen, 158 os_memcpy(msg->device_name, pos, nlen); 159 msg->device_name[nlen] = '\0'; 160 for (i = 0; i < nlen; i++) {
|
/external/libppp/src/ |
chap.c | 133 size_t nlen, klen; local 135 nlen = strlen(name); 144 if ((result = malloc(1 + nlen + MS_CHAP_RESPONSE_LEN)) == NULL) 149 memcpy(digest + MS_CHAP_RESPONSE_LEN, name, nlen); 191 if ((result = malloc(1 + nlen + CHAP81_RESPONSE_LEN)) == NULL) 194 memset(result, 0, 1 + nlen + CHAP81_RESPONSE_LEN); 228 memcpy(digest + CHAP81_RESPONSE_LEN, name, nlen); 231 if ((result = malloc(nlen + 17)) != NULL) { 244 memcpy(digest + 16, name, nlen); 699 size_t nlen; local [all...] |
pap.c | 184 u_char nlen, klen, *key; local 225 bp = mbuf_Read(bp, &nlen, 1); 229 * nlen (a one-byte length). Show the rest of the ack packet 236 bp = auth_ReadName(authp, bp, nlen);
|
/external/strace/ |
system.c | [all...] |
/external/valgrind/main/memcheck/ |
mc_replace_strmem.c | [all...] |
/system/core/sh/ |
var.c | 276 int nlen; local 280 vp = find_var(s, &vpp, &nlen); 307 vp->name_len = nlen;
|
/external/kernel-headers/original/linux/ |
sysctl.h | 30 the largest acceptable value for the nlen 35 int nlen; member in struct:__sysctl_args 911 typedef int ctl_handler (ctl_table *table, int __user *name, int nlen, 938 extern int do_sysctl (int __user *name, int nlen, 943 int __user *name, int nlen,
|