/prebuilts/ndk/9/platforms/android-9/arch-mips/usr/include/linux/nfsd/ |
xdr.h | 63 int tlen; member in struct:nfsd_renameargs 75 int tlen; member in struct:nfsd_linkargs 83 int tlen; member in struct:nfsd_symlinkargs
|
/prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/linux/nfsd/ |
xdr.h | 63 int tlen; member in struct:nfsd_renameargs 75 int tlen; member in struct:nfsd_linkargs 83 int tlen; member in struct:nfsd_symlinkargs
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/compiler/ |
misc.py | 61 tlen = len(klass) + len(name) 62 if tlen > MANGLE_LEN: 63 klass = klass[:MANGLE_LEN-tlen]
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/compiler/ |
misc.py | 61 tlen = len(klass) + len(name) 62 if tlen > MANGLE_LEN: 63 klass = klass[:MANGLE_LEN-tlen]
|
/external/srec/srec/crec/ |
text_parser.c | 34 const char* transcription, int tlen) 53 if (tlen > 0) 55 for (wd = transcription + tlen - 1; wd > transcription; wd--) 103 tlen--; 104 while (transcription[tlen] != ' ' && tlen > 0) tlen--;
|
/external/kernel-headers/original/linux/nfsd/ |
xdr.h | 58 int tlen; member in struct:nfsd_renameargs 70 int tlen; member in struct:nfsd_linkargs 78 int tlen; member in struct:nfsd_symlinkargs
|
/external/ipsec-tools/src/racoon/ |
isakmp_inf.c | 454 int tlen, num_spi; 482 tlen = ntohs(delete->h.len) - sizeof(struct isakmp_pl_d); 484 if (tlen != num_spi * delete->spi_size) { 583 int tlen; 593 tlen = sizeof(*d) + sizeof(isakmp_index); 594 payload = vmalloc(tlen); 603 d->h.len = htons(tlen); 629 int tlen; 657 tlen = sizeof(*d) + pr->spisize; 658 payload = vmalloc(tlen); 453 int tlen, num_spi; local 582 int tlen; local 628 int tlen; local 701 int tlen; local 782 int tlen; local 841 int tlen; local 896 int tlen; local 1060 int tlen; local 1526 int tlen; local 1620 int tlen; local [all...] |
isakmp_cfg.c | 145 int tlen; local 188 tlen = dmsg->l - sizeof(*packet); 192 while ((tlen > 0) && (np != ISAKMP_NPTYPE_NONE)) { 194 if (tlen < sizeof(*ph)) { 201 if (tlen < ntohs(ph->len)) { 264 tlen -= ntohs(ph->len); 321 int tlen; local 328 tlen = ntohs(attrpl->h.len); 330 tlen -= sizeof(*attrpl); 332 while (tlen > 0) 494 int tlen; local 662 int tlen; local 1127 int tlen; local [all...] |
/external/bluetooth/bluedroid/stack/smp/ |
smp_cmac.c | 135 static BOOLEAN cmac_aes_k_calculate(BT_OCTET16 key, UINT8 *p_signature, UINT16 tlen) 160 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); 161 memcpy(p_signature, p_mac, tlen); 163 SMP_TRACE_DEBUG2("tlen = %d p_mac = %d", tlen, p_mac); 283 ** Description This is the AES-CMAC Generation Function with tlen implemented. 288 ** tlen - lenth of mac desired 289 ** p_signature - data pointer to where signed data to be stored, tlen long. 295 UINT16 tlen, UINT8 *p_signature) 327 ret = cmac_aes_k_calculate(key, p_signature, tlen); [all...] |
/external/tcpdump/ |
print-slow.c | 125 u_int tlv_len,tlen,tlv_tlen; local 161 tlen=len-sizeof(struct slow_common_header); 164 while(tlen>0) { 178 tlv_len > tlen) && 182 print_unknown_data(tptr+sizeof(sizeof(struct tlv_header_t)),"\n\t ",tlen); 259 tlen-=tlv_len;
|
print-bgp.c | 635 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local 639 tlen=plen; 650 tlen-=15; 653 while (tlen>0) { 654 if (tlen < 3) 689 tlen-=(tlv_len<<3); /* the tlv-length is expressed in bits so lets shift it right */ 877 int tlen; local 883 tlen=len; 960 while (tlen>0) { 978 (tlen>4) ? ", " : "") [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_ssl.c | 65 int RSA_padding_add_SSLv23(unsigned char *to, int tlen, 71 if (flen > (tlen-11)) 83 j=tlen-3-8-flen; 105 int RSA_padding_check_SSLv23(unsigned char *to, int tlen, 145 if (j > tlen)
|
rsa_oaep.c | 34 int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, 38 int i, emlen = tlen - 1; 94 int RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, 166 if (tlen < mlen)
|
/external/openssl/crypto/rsa/ |
rsa_ssl.c | 65 int RSA_padding_add_SSLv23(unsigned char *to, int tlen, 71 if (flen > (tlen-11)) 83 j=tlen-3-8-flen; 105 int RSA_padding_check_SSLv23(unsigned char *to, int tlen, 145 if (j > tlen)
|
rsa_oaep.c | 34 int RSA_padding_add_PKCS1_OAEP(unsigned char *to, int tlen, 38 int i, emlen = tlen - 1; 94 int RSA_padding_check_PKCS1_OAEP(unsigned char *to, int tlen, 166 if (tlen < mlen)
|
/external/chromium_org/third_party/icu/source/test/intltest/ |
mnkytst.cpp | 83 int32_t tlen = checkValue((rand() - source.length()) % source.length()); local 87 source.extract(MIN(t, tlen), MAX(t, tlen), subt); 158 int32_t tlen = checkValue((rand() - source.length()) % source.length()); local 162 source.extract(MIN(t, tlen), MAX(t, tlen), subt);
|
tscoll.h | 52 UCollationResult compareUsingPartials(UCollator *coll, const UChar source[], int32_t sLen, const UChar target[], int32_t tLen, int32_t pieceSize, UErrorCode &status);
|
/external/icu4c/test/intltest/ |
mnkytst.cpp | 83 int32_t tlen = checkValue((rand() - source.length()) % source.length()); local 87 source.extract(MIN(t, tlen), MAX(t, tlen), subt); 158 int32_t tlen = checkValue((rand() - source.length()) % source.length()); local 162 source.extract(MIN(t, tlen), MAX(t, tlen), subt);
|
tscoll.h | 52 UCollationResult compareUsingPartials(UCollator *coll, const UChar source[], int32_t sLen, const UChar target[], int32_t tLen, int32_t pieceSize, UErrorCode &status);
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
asn1_mac.h | 282 long Tlen; \ 285 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ 290 Tlen = c.slen - (c.p - c.q) - 2; \ 291 if (func(&(r),&c.p,Tlen) == NULL) \ 294 Tlen = c.slen - (c.p - c.q); \ 295 if(!ASN1_const_check_infinite_end(&c.p, Tlen)) \ 307 long Tlen; \ 310 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ 315 Tlen = c.slen - (c.p - c.q) - 2; \ 316 if (d2i_ASN1_SET(&(r),&c.p,Tlen,(char *(*)())func, [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
asn1_mac.h | 282 long Tlen; \ 285 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ 290 Tlen = c.slen - (c.p - c.q) - 2; \ 291 if (func(&(r),&c.p,Tlen) == NULL) \ 294 Tlen = c.slen - (c.p - c.q); \ 295 if(!ASN1_const_check_infinite_end(&c.p, Tlen)) \ 307 long Tlen; \ 310 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ 315 Tlen = c.slen - (c.p - c.q) - 2; \ 316 if (d2i_ASN1_SET(&(r),&c.p,Tlen,(char *(*)())func, [all...] |
/external/openssl/crypto/asn1/ |
asn1_mac.h | 282 long Tlen; \ 285 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ 290 Tlen = c.slen - (c.p - c.q) - 2; \ 291 if (func(&(r),&c.p,Tlen) == NULL) \ 294 Tlen = c.slen - (c.p - c.q); \ 295 if(!ASN1_const_check_infinite_end(&c.p, Tlen)) \ 307 long Tlen; \ 310 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ 315 Tlen = c.slen - (c.p - c.q) - 2; \ 316 if (d2i_ASN1_SET(&(r),&c.p,Tlen,(char *(*)())func, [all...] |
/external/openssl/include/openssl/ |
asn1_mac.h | 282 long Tlen; \ 285 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ 290 Tlen = c.slen - (c.p - c.q) - 2; \ 291 if (func(&(r),&c.p,Tlen) == NULL) \ 294 Tlen = c.slen - (c.p - c.q); \ 295 if(!ASN1_const_check_infinite_end(&c.p, Tlen)) \ 307 long Tlen; \ 310 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,c.slen); \ 315 Tlen = c.slen - (c.p - c.q) - 2; \ 316 if (d2i_ASN1_SET(&(r),&c.p,Tlen,(char *(*)())func, [all...] |
/external/wpa_supplicant_8/src/utils/ |
common.c | 527 size_t tlen; local 532 tlen = pos - value; 533 tstr = dup_binstr(value, tlen); 537 str = os_malloc(tlen + 1); 543 *len = printf_decode((u8 *) str, tlen + 1, tstr); 549 size_t tlen, hlen = os_strlen(value); local 552 tlen = hlen / 2; 553 str = os_malloc(tlen + 1); 556 if (hexstr2bin(value, str, tlen)) { 560 str[tlen] = '\0' [all...] |
/external/chromium_org/third_party/cld/encodings/compact_lang_det/ |
getonescriptspan.cc | 290 int tlen, plen; local 311 tlen = ScanToPossibleLetter(src + skip, len - skip); 316 tlen = 1; // Over the > 323 temp, &tlen, &plen); 329 tlen = cld_UniLib::OneCharLen(src + skip); 336 skip += tlen; // Advance 365 int tlen, plen; local 411 script_buffer_ + put, &tlen, &plen); 417 tlen = plen = cld_UniLib::OneCharLen(next_byte_ + take); 454 int sc2 = getone::GetUTF8LetterScriptNum(next_byte_ + take + tlen); [all...] |