HomeSort by relevance Sort by last modified time
    Searched defs:len (Results 1151 - 1175 of 6966) sorted by null

<<41424344454647484950>>

  /external/srec/portable/src/
PANSIFileSystemImpl.c 108 size_t len; local
117 len = LSTRLEN(virtualPath) + 1;
119 ++len;
120 key = MALLOC(sizeof(LCHAR) * len, MTAG);
210 ESR_ReturnCode PANSIFileSystemGetRealPathImpl(PFileSystem* self, LCHAR* path, size_t* len)
221 CHKLOG(rc, PFileSystemGetAbsolutePath(path, len));
245 if (LSTRLEN(bestValue) + 1 > *len)
247 *len = LSTRLEN(bestValue) + 1;
263 CHKLOG(rc, lstrinsert(bestValue, path, 0, len));
273 size_t len; local
    [all...]
  /external/srec/srec/Recognizer/src/
RecognizerResultImpl.c 148 const LCHAR* key, LCHAR* value, size_t* len)
183 if (actualLen + 1 > *len)
190 if ( ( *len ) != 0 )
191 PLogError(L("Buffer Overflow while fetching value for %s of choice %d Len %d"),
192 key, nbest, *len );
193 *len = actualLen + 1;
196 *len = actualLen;
212 int len = LSTRLEN(value); local
213 value[len] = MULTIPLE_MEANING_JOIN_CHAR;
214 value[len+1] = 0
244 size_t len; local
    [all...]
  /external/srtp/crypto/cipher/
cipher.c 90 unsigned int len; local
146 len = test_case->plaintext_length_octets;
147 status = cipher_encrypt(c, buffer, &len);
158 if (len != test_case->ciphertext_length_octets)
213 len = test_case->ciphertext_length_octets;
214 status = cipher_decrypt(c, buffer, &len);
225 if (len != test_case->plaintext_length_octets)
384 unsigned int len = octets_in_buffer; local
395 cipher_encrypt(c, enc_buf, &len);
  /external/tcpdump/
print-cdp.c 91 int type, len, i, j; local
113 len = EXTRACT_16BITS(tptr+2); /* object length includes the 4 bytes header length */
115 len -= 4;
117 if (!TTEST2(*tptr, len))
126 len,
127 PLURAL_SUFFIX(len)); /* plural */
135 fn_printn(tptr, len, NULL);
139 if (cdp_print_addr(tptr, len) < 0)
144 fn_printn(tptr, len, NULL);
154 for (i=0;i<len;i++)
    [all...]
print-gre.c 94 u_int len = length, vers; local
96 if (len < 2) {
105 gre_print_0(bp, len);
108 gre_print_1(bp, len);
121 u_int len = length; local
129 len -= 2;
132 if (len < 2)
135 len -= 2;
139 if (len < 2)
144 len -= 2
243 u_int len = length; local
    [all...]
print-ip6.c 52 u_int len, u_int next_proto)
67 ph.ph_len = htonl(len);
71 vec[0].len = sizeof(ph);
73 vec[1].len = len;
86 u_int len; local
106 len = payload_len + sizeof(struct ip6_hdr);
107 if (length < len)
109 len - length));
138 ipend = bp + len;
    [all...]
print-mptcp.c 119 u_int len; local
121 len = 4;
124 len += (m->flags & MP_DSS_a) ? 8 : 4;
134 len += (m->flags & MP_DSS_m) ? 14 : 10;
140 len += 2;
142 return len;
179 printf(" len %u", EXTRACT_16BITS(opt));
283 int mptcp_print(const u_char *cp, u_int len, u_char flags)
288 if (len < 3)
295 return mptcp_options[subtype].print(cp, len, flags)
    [all...]
  /external/tremolo/Tremolo/
treminfo.c 234 int len=oggpack_read(opb,32); local
235 if(len<0)goto err_out;
236 vc->comment_lengths[i]=len;
237 vc->user_comments[i]=(char *)_ogg_calloc(len+1,1);
239 _v_readstring(opb,vc->user_comments[i],len);
  /external/valgrind/main/coregrind/m_demangle/
dyn-string.c 341 int len = strlen (s); local
345 if (dyn_string_resize (dest, dest->length + len) == NULL)
348 dest->length += len;
  /external/valgrind/main/none/tests/s390x/
cksm.c 11 uint64_t len; member in struct:__anon36917
19 cksm_by_insn(const uint32_t *buff, uint64_t len, uint32_t sum)
22 uint64_t init_length = len;
27 register uint64_t reg3 asm("3") = len;
36 len = reg3;
43 if(len != 0)
50 result.len = len;
60 cksm_by_hand(const uint32_t *buff, uint64_t len, uint32_t sum)
67 for (n=0; n < len/4; n++)
182 uint64_t len; local
    [all...]
  /external/valgrind/main/none/tests/x86/
bug152818-x86.c 100 int len; local
130 len = lens[idx];
141 len);
148 len);
159 len);
168 len);
177 len);
184 len);
195 len);
204 len);
    [all...]
  /external/webrtc/src/modules/audio_coding/codecs/isac/fix/source/
decode.c 37 WebRtc_Word16 len = 0; local
108 len = WebRtcIsacfix_DecodeSpec(&ISACdec_obj->bitstr_obj, Vector_Word16_1, Vector_Word16_2, AvgPitchGain_Q12);
109 if (len < 0) // error check
110 return len;
216 return len;
  /external/wpa_supplicant_8/src/ap/
accounting.c 39 size_t len; local
82 val = ieee802_1x_get_identity(sta->eapol_sm, &len);
87 len = os_strlen(sta->identity);
96 len = os_strlen(buf);
100 len)) {
112 val = ieee802_1x_get_radius_class(sta->eapol_sm, &len,
118 val, len)) {
preauth_auth.c 42 const u8 *buf, size_t len)
52 if (len < sizeof(*ethhdr) + sizeof(*hdr)) {
54 "(len=%lu)", (unsigned long) len);
93 len - sizeof(*ethhdr));
199 size_t len; local
204 key = ieee802_1x_get_key(sta->eapol_sm, &len);
205 if (len > PMK_LEN)
206 len = PMK_LEN;
208 if (wpa_auth_pmksa_add_preauth(hapd->wpa_auth, key, len,
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.c 156 * @len: Payload length
160 int eap_sake_parse_attributes(const u8 *buf, size_t len,
163 const u8 *pos = buf, *end = buf + len;
218 size_t len[4]; local
221 len[0] = label_len;
223 len[1] = data_len;
225 len[2] = data2_len;
227 len[3] = 1;
233 hmac_sha1_vector(key, key_len, 4, addr, len,
237 hmac_sha1_vector(key, key_len, 4, addr, len,
386 os_memset(wpabuf_put(buf, len), 0, len); local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_vendor_test.c 71 size_t len; local
73 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len);
74 if (pos == NULL || len < 1) {
147 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len)
162 *len = key_len;
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 81 size_t len; local
83 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &len);
84 if (pos == NULL || len < 1) {
eap_server_identity.c 86 size_t len; local
89 respData, &len);
104 size_t len; local
118 respData, &len);
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
123 buf = os_malloc(len * 4 + 1);
125 printf_encode(buf, len * 4 + 1, pos, len);
132 sm->identity = os_malloc(len ? len : 1)
    [all...]
eap_server_md5.c 80 size_t len; local
82 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &len);
83 if (pos == NULL || len < 1) {
87 if (*pos != CHAP_MD5_LEN || 1 + CHAP_MD5_LEN > len) {
90 *pos, (unsigned long) len);
118 pos++; /* Skip response len */
eap_server_vendor_test.c 95 size_t len; local
97 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len);
98 if (pos == NULL || len < 1) {
112 size_t len; local
114 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len);
115 if (pos == NULL || len < 1)
140 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len)
155 *len = key_len;
  /external/wpa_supplicant_8/src/p2p/
p2p_dev_disc.c 22 u8 *len; local
33 len = p2p_buf_add_ie_hdr(buf);
37 p2p_buf_update_ie_hdr(buf, len);
113 u8 *len; local
121 len = p2p_buf_add_ie_hdr(buf);
123 p2p_buf_update_ie_hdr(buf, len);
162 const u8 *data, size_t len, int rx_freq)
170 if (p2p_parse(data, len, &msg))
215 const u8 *data, size_t len)
231 if (p2p_parse(data, len, &msg)
    [all...]
p2p_pd.c 29 u8 *len; local
31 len = wpabuf_put(buf, 1);
39 p2p_buf_update_ie_hdr(buf, len);
49 u8 *len; local
66 len = p2p_buf_add_ie_hdr(buf);
74 p2p_buf_update_ie_hdr(buf, len);
146 const u8 *data, size_t len, int rx_freq)
154 if (p2p_parse(data, len, &msg))
166 if (p2p_add_device(p2p, sa, rx_freq, NULL, 0, data + 1, len - 1,
263 const u8 *data, size_t len)
    [all...]
  /external/wpa_supplicant_8/src/tls/
pkcs5.c 31 if (oid->len == 7 &&
145 size_t len[2]; local
151 len[0] = os_strlen(passwd);
153 len[1] = params->salt_len;
154 if (md5_vector(2, addr, len, hash) < 0)
157 len[0] = MD5_MAC_LEN;
159 if (md5_vector(1, addr, len, hash) < 0)
tlsv1_record.c 235 size_t len = pos - cpayload; local
237 pad = (len + 1) % rl->iv_size;
285 u8 len[2], hash[100]; local
317 wpa_printf(MSG_DEBUG, "TLSv1: Record overflow (len=%lu)",
448 WPA_PUT_BE16(len, plen);
449 crypto_hash_update(hmac, len, 2);
476 wpa_printf(MSG_DEBUG, "TLSv1: Record overflow (len=%lu)",
  /external/wpa_supplicant_8/src/utils/
edit_readline.c 42 static size_t len = 0; local
51 len = os_strlen(text);
54 if (strncmp(pending_completions[pos], text, len) == 0)

Completed in 1147 milliseconds

<<41424344454647484950>>