/external/wpa_supplicant_8/wpa_supplicant/ |
hs20_supplicant.c | 110 const u8 *sa, const u8 *data, size_t slen) 117 if (slen < 2) 124 slen--; 127 slen--; 133 wpa_hexdump_ascii(MSG_DEBUG, "HS Capability List", pos, slen); 138 wpa_hexdump_ascii(MSG_DEBUG, "oper friendly name", pos, slen); 142 wpabuf_alloc_copy(pos, slen); 146 wpa_hexdump(MSG_DEBUG, "WAN Metrics", pos, slen); 147 if (slen < 13) { 158 anqp->hs20_wan_metrics = wpabuf_alloc_copy(pos, slen); [all...] |
hs20_supplicant.h | 18 const u8 *sa, const u8 *data, size_t slen);
|
/external/openssl/crypto/rsa/ |
rsa_pss.c | 74 const EVP_MD *Hash, const unsigned char *EM, int sLen) 76 return RSA_verify_PKCS1_PSS_mgf1(rsa, mHash, Hash, NULL, EM, sLen); 81 const unsigned char *EM, int sLen) 99 * Negative sLen has special meanings: 100 * -1 sLen == hLen 104 if (sLen == -1) sLen = hLen; 105 else if (sLen == -2) sLen = -2; 106 else if (sLen < -2 [all...] |
/external/harfbuzz/src/ |
harfbuzz-hebrew.c | 78 int slen = 1; local 137 shapedChars[slen] = 0x25cc; 138 attributes[slen].clusterStart = TRUE; 139 attributes[slen].mark = FALSE; 140 attributes[slen].combiningClass = 0; 141 cluster_start = slen; 142 ++slen; 153 shapedChars[slen] = uc[i]; 156 attributes[slen].clusterStart = TRUE; 157 attributes[slen].mark = FALSE [all...] |
harfbuzz-greek.c | 364 int slen = 1; local 376 hb_uint16 base = shapedChars[slen-1]; 399 shapedChars[slen-1] = shaped; 408 shapedChars[slen] = uc[i]; 411 attributes[slen].clusterStart = TRUE; 412 attributes[slen].mark = FALSE; 413 attributes[slen].combiningClass = 0; 414 attributes[slen].dontPrint = HB_IsControlChar(uc[i]); 415 cluster_start = slen; 417 attributes[slen].clusterStart = FALSE [all...] |
/external/harfbuzz_ng/src/hb-old/ |
harfbuzz-hebrew.c | 78 int slen = 1; local 137 shapedChars[slen] = 0x25cc; 138 attributes[slen].clusterStart = TRUE; 139 attributes[slen].mark = FALSE; 140 attributes[slen].combiningClass = 0; 141 cluster_start = slen; 142 ++slen; 153 shapedChars[slen] = uc[i]; 156 attributes[slen].clusterStart = TRUE; 157 attributes[slen].mark = FALSE [all...] |
harfbuzz-greek.c | 364 int slen = 1; local 376 hb_uint16 base = shapedChars[slen-1]; 399 shapedChars[slen-1] = shaped; 408 shapedChars[slen] = uc[i]; 411 attributes[slen].clusterStart = TRUE; 412 attributes[slen].mark = FALSE; 413 attributes[slen].combiningClass = 0; 414 attributes[slen].dontPrint = HB_IsControlChar(uc[i]); 415 cluster_start = slen; 417 attributes[slen].clusterStart = FALSE [all...] |
/bionic/libc/wchar/ |
wcsxfrm.c | 38 size_t slen; local 47 slen = wcslen(src); 49 if (slen < len) 56 return (slen);
|
/system/core/toolbox/ |
dynarray.c | 69 void strlist_append_b( strlist_t *list, const void* str, size_t slen ) 71 char *copy = malloc(slen+1); 72 memcpy(copy, str, slen); 73 copy[slen] = '\0';
|
/bionic/libc/bionic/ |
strndup.c | 33 size_t slen = (size_t)strlen(s); local 36 if (slen < n) 37 n = slen;
|
/external/javassist/src/main/javassist/bytecode/ |
ByteStream.java | 98 int sLen = s.length(); 100 enlarge(sLen + 2); 103 buffer[pos++] = (byte)(sLen >>> 8); 104 buffer[pos++] = (byte)sLen; 105 for (int i = 0; i < sLen; ++i) { 110 writeUTF2(s, sLen, i); 118 private void writeUTF2(String s, int sLen, int offset) { 119 int size = sLen; 120 for (int i = offset; i < sLen; i++) { 130 "encoded string too long: " + sLen + size + " bytes") [all...] |
/external/openssl/crypto/asn1/ |
asn1_mac.h | 111 c.slen = length; 125 (((c.inf&1) == 0)?(c.slen <= 0): \ 126 (c.eos=ASN1_const_check_infinite_end(&c.p,c.slen))) 131 if (func(&(b),&c.p,c.slen) == NULL) \ 133 c.slen-=(c.p-c.q); 138 if (((D2I_OF(type))func)(&(b),&c.p,c.slen) == NULL) \ 140 c.slen-=(c.p-c.q); 145 if (func(&(b),&c.p,c.slen) < 0) \ 147 c.slen-=(c.p-c.q); 150 if ((c.slen != 0) && ((M_ASN1_next & (~V_ASN1_CONSTRUCTED)) [all...] |
/external/openssl/include/openssl/ |
asn1_mac.h | 111 c.slen = length; 125 (((c.inf&1) == 0)?(c.slen <= 0): \ 126 (c.eos=ASN1_const_check_infinite_end(&c.p,c.slen))) 131 if (func(&(b),&c.p,c.slen) == NULL) \ 133 c.slen-=(c.p-c.q); 138 if (((D2I_OF(type))func)(&(b),&c.p,c.slen) == NULL) \ 140 c.slen-=(c.p-c.q); 145 if (func(&(b),&c.p,c.slen) < 0) \ 147 c.slen-=(c.p-c.q); 150 if ((c.slen != 0) && ((M_ASN1_next & (~V_ASN1_CONSTRUCTED)) [all...] |
/external/openssh/ |
ssh-rsa.c | 46 u_int slen, dlen, len; local 64 slen = RSA_size(key->rsa); 65 sig = xmalloc(slen); 78 if (len < slen) { 79 u_int diff = slen - len; 80 debug("slen %u > len %u", slen, len); 83 } else if (len > slen) { 84 error("ssh_rsa_sign: slen %u slen2 %u", slen, len) [all...] |
auth2-hostbased.c | 63 u_int alen, blen, slen; local 75 sig = packet_get_string(&slen); 77 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 78 cuser, chost, pkalg, slen); 82 buffer_append(&b, sig, slen); 122 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b),
|
ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 74 slen = BN_num_bytes(sig->s); 75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { 76 error("bad sig size %u %u", rlen, slen); 82 BN_bn2bin(sig->s, sigblob+ SIGBLOB_LEN - slen);
|
ssh-pkcs11-client.c | 109 u_int blen, slen = 0; local 128 signature = buffer_get_string(&msg, &slen); 129 if (slen <= (u_int)RSA_size(rsa)) { 130 memcpy(to, signature, slen); 131 ret = slen;
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_sd.c | 282 u16 slen; local 315 slen = *pos++; 316 next = pos + slen; 317 if (next > end || slen < 2) { 335 slen = WPA_GET_LE16(pos); 337 if (pos + slen > end) 339 end = pos + slen; 351 slen = WPA_GET_LE16(pos); 353 if (pos + slen > end || slen < 3 + 1) 449 u16 slen; local [all...] |
/bionic/libc/upstream-freebsd/lib/libc/stdlib/ |
realpath.c | 57 int m, slen; local 195 slen = readlink(resolved, symlink, sizeof(symlink) - 1); 196 if (slen < 0) { 201 symlink[slen] = '\0'; 219 if (symlink[slen - 1] != '/') { 220 if (slen + 1 >= sizeof(symlink)) { 226 symlink[slen] = '/'; 227 symlink[slen + 1] = 0;
|
/external/openssh/openbsd-compat/ |
realpath.c | 58 int serrno, slen; local 150 slen = readlink(resolved, symlink, sizeof(symlink) - 1); 151 if (slen < 0) 153 symlink[slen] = '\0'; 171 if (symlink[slen - 1] != '/') { 172 if (slen + 1 >= sizeof(symlink)) { 176 symlink[slen] = '/'; 177 symlink[slen + 1] = 0;
|
mktemp.c | 51 mkstemps(char *path, int slen) 55 return (_gettemp(path, &fd, 0, slen) ? fd : -1); 73 _gettemp(path, doopen, domkdir, slen) 77 int slen; 91 trv -= slen;
|
/bionic/libc/include/ |
string.h | 214 size_t slen = __builtin_strlen(s); local 215 if (__builtin_constant_p(slen)) { 216 return slen; 233 size_t slen = __builtin_strlen(s); local 234 if (__builtin_constant_p(slen) && (slen < bos)) { 252 size_t slen = __builtin_strlen(s); local 253 if (__builtin_constant_p(slen) && (slen < bos)) {
|
/external/icu4c/samples/legacy/ |
newcol.cpp | 27 int32_t getSortKey_current(const char *locale, const UChar *string, int32_t sLen, uint8_t *buffer, int32_t bLen) { 33 int32_t result = ucol_getSortKey(coll, string, sLen, buffer, bLen);
|
/external/openssl/crypto/pkcs7/ |
example.c | 138 if ((os1=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) 140 c.slen-=(c.p-c.q); 143 if ((os2=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) 145 c.slen-=(c.p-c.q); 305 if ((os1=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) 307 c.slen-=(c.p-c.q); 310 if ((os2=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) 312 c.slen-=(c.p-c.q);
|
/external/icu4c/test/cintltst/ |
nfsprep.c | 216 int32_t pLen=0, sLen=0, reqLen=0, 247 sLen = nfs4_prepare(suffix, suffixLen, s, sCapacity, NFS4_MIXED_PREP_SUFFIX, parseError, status); 255 sLen = nfs4_prepare(suffix, suffixLen, s, sLen, NFS4_MIXED_PREP_SUFFIX, parseError, status); 258 reqLen = pLen+sLen+1 /* for the delimiter */; 264 memmove(dest+pLen, s, sLen);
|