/external/tcpdump/ |
print-rsvp.c | 617 rsvp_obj_print (const u_char *tptr, const char *ident, u_int tlen) { 636 while(tlen>=sizeof(struct rsvp_object_header)) { 674 if(tlen < rsvp_obj_len) { 1655 u_short tlen,subtlen; local [all...] |
print-lmp.c | 367 int tlen,lmp_obj_len,lmp_obj_ctype,obj_tlen; local 401 tlen=EXTRACT_16BITS(lmp_com_header->length); 407 tlen); 410 tlen-=sizeof(const struct lmp_common_header); 412 while(tlen>0) { 876 tlen-=lmp_obj_len;
|
print-tcp.c | 742 u_int16_t savecsum, tlen; local 763 tlen = EXTRACT_16BITS(&ip->ip_len) - IP_HL(ip) * 4; 764 tlen = htons(tlen); 765 MD5_Update(&ctx, (char *)&tlen, sizeof(tlen));
|
print-ldp.c | 502 u_short tlen; local 533 tlen=pdu_len; 536 tlen -= sizeof(const struct ldp_common_header)-4; /* Type & Length fields not included */ 538 while(tlen>0) { 607 tlen -= msg_len+4;
|
print-fr.c | 391 u_int tlen,idx,hdr_len = 0; local 418 tlen = length -3; 424 while (tlen>sizeof(struct ie_tlv_header_t)) { 442 tlen-=sizeof(struct ie_tlv_header_t); 485 tlen-=ie_len;
|
/external/icu4c/test/cintltst/ |
callcoll.c | 230 static UCollationResult compareUsingPartials(UCollator *coll, const UChar source[], int32_t sLen, const UChar target[], int32_t tLen, int32_t pieceSize, UErrorCode *status) { 247 uiter_setString(&tIter, target, tLen); 275 uint32_t tLen = u_strlen(target); 283 compareResult = ucol_strcoll(myCollation, source, sLen, target, tLen); 295 uiter_setString(&tIter, target, tLen); 310 u_strToUTF8(utf8Target, 256, &utf8TargetLen, target, tLen, &status); 375 partialSKResult = compareUsingPartials(myCollation, source, sLen, target, tLen, partialSizes[i], &status); 385 partialNormalizedSKResult = compareUsingPartials(myCollation, source, sLen, target, tLen, partialSizes[i], &status); 397 sortklen2=ucol_getSortKey(myCollation, target, tLen, NULL, 0); 409 ucol_getSortKey(myCollation, target, tLen, sortKey2, sortklen2+1) [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_xauth.c | 129 size_t tlen; local 146 tlen = sizeof(*attr) + 151 if ((buffer = vmalloc(tlen)) == NULL) { 157 memset(attr, 0, tlen); 159 attr->h.len = htons(tlen); 419 size_t tlen; local 421 tlen = sizeof(*attr) + 424 if ((buffer = vmalloc(tlen)) == NULL) { 430 memset(attr, 0, tlen); 432 attr->h.len = htons(tlen); [all...] |
isakmp.c | 1423 int tlen, plen; local 1507 int tlen; local 2403 int tlen; local 2436 int tlen; local 2973 size_t tlen = sizeof (struct isakmp), n = 0; local [all...] |
racoonctl.c | 1214 dump_internal(buf, tlen) 1216 int tlen; 1240 while (tlen > 0) { 1249 tlen -= sysdep_sa_len(addr); 1256 tlen -= sysdep_sa_len(addr); [all...] |
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 139 int tlen; local 153 tlen = ipsec_supported[algno]->sadb_supported_len 156 while (tlen > 0) { 157 if (tlen < sizeof(struct sadb_alg)) { 164 tlen -= sizeof(struct sadb_alg); 748 * tlen: msg length, it's to makeing sure. 754 pfkey_set_supported(msg, tlen) 756 int tlen; 763 if (msg->sadb_msg_len != tlen) { 769 ep = p + tlen; [all...] |
/external/qemu/slirp/ |
tcp_subr.c | 106 register int tlen; local 123 tlen = 1; 125 tlen = 0; 139 tlen = 0; 145 ti->ti_len = htons((u_short)(sizeof (struct tcphdr) + tlen)); 146 tlen += sizeof (struct tcpiphdr); 147 m->m_len = tlen; 162 ti->ti_sum = cksum(m, tlen); 163 ((struct ip *)ti)->ip_len = tlen; [all...] |
/external/qemu/slirp-android/ |
tcp_subr.c | 108 register int tlen; local 125 tlen = 1; 127 tlen = 0; 141 tlen = 0; 147 ti->ti_len = htons((u_short)(sizeof (struct tcphdr) + tlen)); 148 tlen += sizeof (struct tcpiphdr); 149 m->m_len = tlen; 164 ti->ti_sum = cksum(m, tlen); 165 ((struct ip *)ti)->ip_len = tlen;
|
/external/chromium_org/third_party/icu/source/i18n/ |
bmsearch.cpp | 662 int32_t tlen = target->stringLength(); local 672 while (tOffset <= tlen) { 677 if (tOffset < tlen) {
|
/external/chromium_org/third_party/opus/src/tests/ |
test_opus_decode.c | 347 int tlen[1]={157}; local 355 for(j=1;j<tlen[i];j++)packet[j]=fast_rand()&255; 356 out_samples=opus_decode(dec[t], packet, tlen[i], outbuf, MAX_FRAME_SAMP, 0);
|
/external/openssl/patches/ |
tls12_digests.patch | 249 @@ -2354,18 +2357,6 @@ static int tls12_find_id(int nid, tls12_lookup *table, size_t tlen) 254 -static int tls12_find_nid(int id, tls12_lookup *table, size_t tlen) 257 - for (i = 0; i < tlen; i++)
|
/external/libnfc-nci/src/nfc/ndef/ |
ndef_utils.c | 463 UINT8 *NDEF_MsgGetFirstRecByType (UINT8 *p_msg, UINT8 tnf, UINT8 *p_type, UINT8 tlen) 494 && (type_len == tlen) 495 && (!memcmp (p_rec, p_type, tlen)) ) 520 UINT8 *NDEF_MsgGetNextRecByType (UINT8 *p_cur_rec, UINT8 tnf, UINT8 *p_type, UINT8 tlen) 555 && (type_len == tlen) 556 && (!memcmp (p_rec, p_type, tlen)) ) [all...] |
/external/libnfc-nci/src/nfc/include/ |
ndef_utils.h | 173 EXPORT_NDEF_API extern UINT8 *NDEF_MsgGetFirstRecByType (UINT8 *p_msg, UINT8 tnf, UINT8 *p_type, UINT8 tlen); 185 EXPORT_NDEF_API extern UINT8 *NDEF_MsgGetNextRecByType (UINT8 *p_cur_rec, UINT8 tnf, UINT8 *p_type, UINT8 tlen);
|
/external/zlib/src/examples/ |
gzlog.c | 301 ulong tlen; /* length (modulo 2^32) of total data */ member in struct:log 425 log->tlen = PULL4(buf + HEAD + 28); 447 PUT4(ext + 28, log->tlen); 525 log->tlen += put; 551 PUT4(buf + 4, log->tlen); 691 log->clen = log->tlen; 696 log->tlen = log->clen; 703 PUT4(buf + 4, log->tlen); [all...] |
/external/bluetooth/bluedroid/stack/include/ |
smp_api.h | 167 typedef void (tCMAC_CMPL_CBACK)(UINT8 *p_mac, UINT16 tlen, UINT32 sign_counter);
|
/hardware/ti/omap4xxx/test/CameraHal/ |
camera_test_script.cpp | 107 int tLen = 0; 174 tLen = strlen(cycle_cmd); 175 temp_cmd = new char[tLen+1]; 200 ctx += tLen + 1; [all...] |
/external/libppp/src/ |
route.c | 667 int tlen = strlen(tag); local 669 if (tlen + 2 > indent) 672 prompt_Printf(p, "%s:%*s", tag, indent - tlen - 1, ""); 675 prompt_Printf(p, "%*sadd ", tlen ? 0 : indent, ""); 676 tlen = 0;
|
/external/icu4c/i18n/ |
ucol.cpp | [all...] |
/system/core/libdiskconfig/ |
diskconfig.c | 493 printf("\t\tlen = rest of disk\n"); 495 printf("\t\tlen = %uKB\n", part->len_kb);
|
/external/jmonkeyengine/engine/src/blender/com/jme3/scene/plugins/blender/file/ |
DnaBlockData.java | 48 private static final int TLEN_ID = 'T' << 24 | 'L' << 16 | 'E' << 8 | 'N'; //TLEN
|
/external/wpa_supplicant_8/src/common/ |
sae.c | 719 size_t tlen = end - (*pos + (sae->tmp->ec ? 3 : 2) * local 721 wpa_hexdump(MSG_DEBUG, "SAE: Anti-Clogging Token", *pos, tlen); 725 *token_len = tlen; 726 *pos += tlen;
|