/system/core/toolbox/ |
md5.c | 38 ssize_t rlen; local 39 rlen = read(fd, buf, sizeof(buf)); 40 if (rlen == 0) 42 else if (rlen < 0) { 47 MD5_Update(&md5_ctx, buf, rlen);
|
/external/openssh/ |
ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 73 rlen = BN_num_bytes(sig->r); 75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { 76 error("bad sig size %u %u", rlen, slen); 81 BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen); 117 int rlen, ret; local 145 rlen = buffer_len(&b); 147 if (rlen != 0) { 149 "remaining bytes in signature %d", rlen);
|
ssh-ecdsa.c | 104 int rlen, ret; local 127 rlen = buffer_len(&b); 129 if (rlen != 0) { 130 error("%s: remaining bytes in signature %d", __func__, rlen);
|
ssh-rsa.c | 116 int rlen, ret, nid; local 139 rlen = buffer_len(&b); 141 if (rlen != 0) { 142 error("ssh_rsa_verify: remaining bytes in signature %d", rlen);
|
/packages/apps/UnifiedEmail/src/com/android/mail/lib/base/ |
CharEscaper.java | 138 int rlen = r.length; 143 int sizeNeeded = destIndex + charsSkipped + rlen; 156 if (rlen > 0) { 157 System.arraycopy(r, 0, dest, destIndex, rlen); 158 destIndex += rlen;
|
/packages/apps/UnifiedEmail/src/com/google/android/mail/common/base/ |
CharEscaper.java | 139 int rlen = r.length; 144 int sizeNeeded = destIndex + charsSkipped + rlen; 157 if (rlen > 0) { 158 System.arraycopy(r, 0, dest, destIndex, rlen); 159 destIndex += rlen;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp(pos, sm->user->password, rlen) != 0) [all...] |
/ndk/sources/cxx-stl/llvm-libc++/libcxx/test/strings/basic.string/string.cons/ |
substr.pass.cpp | 35 unsigned rlen = str.size() - pos; local 36 assert(s2.size() == rlen); 37 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); 58 unsigned rlen = std::min<unsigned>(str.size() - pos, n); local 59 assert(s2.size() == rlen); 60 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); 81 unsigned rlen = std::min<unsigned>(str.size() - pos, n); local 82 assert(s2.size() == rlen); 83 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 47 size_t rlen; local 142 &rlen) < 0) { 148 pos = rhdr + rlen; 160 size_t rlen; local 227 &rlen) < 0) { 233 pos = rhdr + rlen; 249 size_t rlen; local 419 &rlen) < 0) { 425 pos = rhdr + rlen; 439 size_t rlen; local 505 size_t rlen; local 541 size_t rlen; local 575 size_t rlen, hlen; local [all...] |
tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
tlsv1_client_write.c | 133 size_t rlen; local 192 &rlen) < 0) { 198 pos = rhdr + rlen; 375 size_t rlen; local 414 &rlen) < 0) { 420 pos = rhdr + rlen; 433 size_t rlen, hlen, clen; local 591 &rlen) < 0) { 597 pos = rhdr + rlen; 610 size_t rlen; local 644 size_t rlen, hlen; local [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
binhex.py | 60 rlen = fp.tell() 61 return file, finfo, dlen, rlen 174 name, finfo, dlen, rlen = name_finfo_dlen_rlen 185 self.rlen = rlen 198 d4 = struct.pack('>ii', self.dlen, self.rlen) 225 raise Error, 'Incorrect data size, diff=%r' % (self.rlen,) 234 self.rlen = self.rlen - len(data) 242 if self.rlen != 0 [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
binhex.py | 60 rlen = fp.tell() 61 return file, finfo, dlen, rlen 174 name, finfo, dlen, rlen = name_finfo_dlen_rlen 185 self.rlen = rlen 198 d4 = struct.pack('>ii', self.dlen, self.rlen) 225 raise Error, 'Incorrect data size, diff=%r' % (self.rlen,) 234 self.rlen = self.rlen - len(data) 242 if self.rlen != 0 [all...] |
/external/libppp/src/ |
vjcomp.c | 118 int len, olen, rlen; local 146 rlen = len; 148 bp = mbuf_Read(bp, bufp, rlen); 156 len += rlen;
|
/hardware/samsung_slsi/exynos5/mobicore/daemon/Daemon/ |
MobiCoreDriverDaemon.cpp | 327 uint32_t rlen = CONNECTION->readData(payload, payload_len); \ 328 if (rlen < 0) { \ 334 if (rlen != payload_len) {\ 335 LOG_E("wrong buffer length %i received from Client", rlen); \ 550 uint32_t rlen = connection->readData(payload, payload_len); local 551 if (rlen < 0) { 558 if (rlen != payload_len) { 559 LOG_E("wrong buffer length %i received from Client", rlen); 714 ssize_t rlen = connection->readData( local 718 if (rlen == 0) [all...] |
/external/chromium_org/third_party/yasm/source/patched-yasm/libyasm/ |
bc-data.c | 270 unsigned long len = 0, rlen, i; local 314 rlen = dv->data.raw.len; 316 rlen = (rlen + size - 1) / size; 317 len += rlen*size; 390 rlen = dv->data.raw.len; 392 rlen); 394 len += rlen; 396 rlen %= size; 397 if (rlen > 0) [all...] |
/external/qemu/audio/ |
wavcapture.c | 34 uint8_t rlen[4]; local 40 le_store (rlen, rifflen, 4); 44 qemu_put_buffer (wav->f, rlen, 4);
|
/ndk/sources/cxx-stl/llvm-libc++/libcxx/test/strings/basic.string/string.ops/string_substr/ |
substr.pass.cpp | 30 typename S::size_type rlen = std::min(n, s.size() - pos); local 31 assert(str.size() == rlen); 32 assert(S::traits_type::compare(s.data()+pos, str.data(), rlen) == 0);
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 391 int rlen, rec; local 412 rlen = scard_get_record_len(scard, rec, 414 if (rlen < 0) { 420 if (rlen > (int) blen) { 424 if (scard_read_record(scard, buf, rlen, rec, 430 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); 439 if (efdir->appl_template_len > rlen - 2) { 441 "template (len=%d rlen=%d)", 442 efdir->appl_template_len, rlen); 767 unsigned long rlen; local 799 size_t len, rlen; local [all...] |
/external/smack/src/org/xbill/DNS/ |
DNSSEC.java | 584 int rlen = DSA_LEN; local 586 rlen++; 594 out.writeU8(rlen + slen + 4); 597 out.writeU8(rlen); 598 if (rlen > DSA_LEN) 626 int rlen = in.readU8(); local 627 if (rlen == DSA_LEN + 1) { 630 } else if (rlen != DSA_LEN) 661 int rlen = keyinfo.length; local 663 rlen++ 701 int rlen = in.readU8(); local [all...] |
/external/libmtp/src/ |
libusb-glue.c | 1273 unsigned long len, rlen; local 1431 unsigned long rlen; local 1503 unsigned long rlen; local [all...] |
/external/svox/pico/lib/ |
picopr.c | 263 picoos_int32 rlen; member in struct:pr_Path [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
kssl.h | 167 krb5_principal *princ, int rlen, const char *realm,
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
kssl.h | 167 krb5_principal *princ, int rlen, const char *realm,
|
/external/openssl/include/openssl/ |
kssl.h | 167 krb5_principal *princ, int rlen, const char *realm,
|