/external/srec/portable/src/ |
PANSIFileSystemImpl.c | 108 size_t len; local 117 len = LSTRLEN(virtualPath) + 1; 119 ++len; 120 key = MALLOC(sizeof(LCHAR) * len, MTAG); 210 ESR_ReturnCode PANSIFileSystemGetRealPathImpl(PFileSystem* self, LCHAR* path, size_t* len) 221 CHKLOG(rc, PFileSystemGetAbsolutePath(path, len)); 245 if (LSTRLEN(bestValue) + 1 > *len) 247 *len = LSTRLEN(bestValue) + 1; 263 CHKLOG(rc, lstrinsert(bestValue, path, 0, len)); 273 size_t len; local [all...] |
/external/srec/srec/Recognizer/src/ |
RecognizerResultImpl.c | 148 const LCHAR* key, LCHAR* value, size_t* len) 183 if (actualLen + 1 > *len) 190 if ( ( *len ) != 0 ) 191 PLogError(L("Buffer Overflow while fetching value for %s of choice %d Len %d"), 192 key, nbest, *len ); 193 *len = actualLen + 1; 196 *len = actualLen; 212 int len = LSTRLEN(value); local 213 value[len] = MULTIPLE_MEANING_JOIN_CHAR; 214 value[len+1] = 0 244 size_t len; local [all...] |
/external/srtp/crypto/cipher/ |
cipher.c | 90 unsigned int len; local 146 len = test_case->plaintext_length_octets; 147 status = cipher_encrypt(c, buffer, &len); 158 if (len != test_case->ciphertext_length_octets) 213 len = test_case->ciphertext_length_octets; 214 status = cipher_decrypt(c, buffer, &len); 225 if (len != test_case->plaintext_length_octets) 384 unsigned int len = octets_in_buffer; local 395 cipher_encrypt(c, enc_buf, &len);
|
/external/tcpdump/ |
print-cdp.c | 91 int type, len, i, j; local 113 len = EXTRACT_16BITS(tptr+2); /* object length includes the 4 bytes header length */ 115 len -= 4; 117 if (!TTEST2(*tptr, len)) 126 len, 127 PLURAL_SUFFIX(len)); /* plural */ 135 fn_printn(tptr, len, NULL); 139 if (cdp_print_addr(tptr, len) < 0) 144 fn_printn(tptr, len, NULL); 154 for (i=0;i<len;i++) [all...] |
print-gre.c | 94 u_int len = length, vers; local 96 if (len < 2) { 105 gre_print_0(bp, len); 108 gre_print_1(bp, len); 121 u_int len = length; local 129 len -= 2; 132 if (len < 2) 135 len -= 2; 139 if (len < 2) 144 len -= 2 243 u_int len = length; local [all...] |
print-ip6.c | 52 u_int len, u_int next_proto) 67 ph.ph_len = htonl(len); 71 vec[0].len = sizeof(ph); 73 vec[1].len = len; 86 u_int len; local 106 len = payload_len + sizeof(struct ip6_hdr); 107 if (length < len) 109 len - length)); 138 ipend = bp + len; [all...] |
print-mptcp.c | 119 u_int len; local 121 len = 4; 124 len += (m->flags & MP_DSS_a) ? 8 : 4; 134 len += (m->flags & MP_DSS_m) ? 14 : 10; 140 len += 2; 142 return len; 179 printf(" len %u", EXTRACT_16BITS(opt)); 283 int mptcp_print(const u_char *cp, u_int len, u_char flags) 288 if (len < 3) 295 return mptcp_options[subtype].print(cp, len, flags) [all...] |
/external/tremolo/Tremolo/ |
treminfo.c | 234 int len=oggpack_read(opb,32); local 235 if(len<0)goto err_out; 236 vc->comment_lengths[i]=len; 237 vc->user_comments[i]=(char *)_ogg_calloc(len+1,1); 239 _v_readstring(opb,vc->user_comments[i],len);
|
/external/valgrind/main/coregrind/m_demangle/ |
dyn-string.c | 341 int len = strlen (s); local 345 if (dyn_string_resize (dest, dest->length + len) == NULL) 348 dest->length += len;
|
/external/valgrind/main/none/tests/s390x/ |
cksm.c | 11 uint64_t len; member in struct:__anon36917 19 cksm_by_insn(const uint32_t *buff, uint64_t len, uint32_t sum) 22 uint64_t init_length = len; 27 register uint64_t reg3 asm("3") = len; 36 len = reg3; 43 if(len != 0) 50 result.len = len; 60 cksm_by_hand(const uint32_t *buff, uint64_t len, uint32_t sum) 67 for (n=0; n < len/4; n++) 182 uint64_t len; local [all...] |
/external/valgrind/main/none/tests/x86/ |
bug152818-x86.c | 100 int len; local 130 len = lens[idx]; 141 len); 148 len); 159 len); 168 len); 177 len); 184 len); 195 len); 204 len); [all...] |
/external/webrtc/src/modules/audio_coding/codecs/isac/fix/source/ |
decode.c | 37 WebRtc_Word16 len = 0; local 108 len = WebRtcIsacfix_DecodeSpec(&ISACdec_obj->bitstr_obj, Vector_Word16_1, Vector_Word16_2, AvgPitchGain_Q12); 109 if (len < 0) // error check 110 return len; 216 return len;
|
/external/wpa_supplicant_8/src/ap/ |
accounting.c | 39 size_t len; local 82 val = ieee802_1x_get_identity(sta->eapol_sm, &len); 87 len = os_strlen(sta->identity); 96 len = os_strlen(buf); 100 len)) { 112 val = ieee802_1x_get_radius_class(sta->eapol_sm, &len, 118 val, len)) {
|
preauth_auth.c | 42 const u8 *buf, size_t len) 52 if (len < sizeof(*ethhdr) + sizeof(*hdr)) { 54 "(len=%lu)", (unsigned long) len); 93 len - sizeof(*ethhdr)); 199 size_t len; local 204 key = ieee802_1x_get_key(sta->eapol_sm, &len); 205 if (len > PMK_LEN) 206 len = PMK_LEN; 208 if (wpa_auth_pmksa_add_preauth(hapd->wpa_auth, key, len, [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.c | 156 * @len: Payload length 160 int eap_sake_parse_attributes(const u8 *buf, size_t len, 163 const u8 *pos = buf, *end = buf + len; 218 size_t len[4]; local 221 len[0] = label_len; 223 len[1] = data_len; 225 len[2] = data2_len; 227 len[3] = 1; 233 hmac_sha1_vector(key, key_len, 4, addr, len, 237 hmac_sha1_vector(key, key_len, 4, addr, len, 386 os_memset(wpabuf_put(buf, len), 0, len); local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_vendor_test.c | 71 size_t len; local 73 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len); 74 if (pos == NULL || len < 1) { 147 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len) 162 *len = key_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 81 size_t len; local 83 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &len); 84 if (pos == NULL || len < 1) {
|
eap_server_identity.c | 86 size_t len; local 89 respData, &len); 104 size_t len; local 118 respData, &len); 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 123 buf = os_malloc(len * 4 + 1); 125 printf_encode(buf, len * 4 + 1, pos, len); 132 sm->identity = os_malloc(len ? len : 1) [all...] |
eap_server_md5.c | 80 size_t len; local 82 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &len); 83 if (pos == NULL || len < 1) { 87 if (*pos != CHAP_MD5_LEN || 1 + CHAP_MD5_LEN > len) { 90 *pos, (unsigned long) len); 118 pos++; /* Skip response len */
|
eap_server_vendor_test.c | 95 size_t len; local 97 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len); 98 if (pos == NULL || len < 1) { 112 size_t len; local 114 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len); 115 if (pos == NULL || len < 1) 140 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len) 155 *len = key_len;
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 22 u8 *len; local 33 len = p2p_buf_add_ie_hdr(buf); 37 p2p_buf_update_ie_hdr(buf, len); 113 u8 *len; local 121 len = p2p_buf_add_ie_hdr(buf); 123 p2p_buf_update_ie_hdr(buf, len); 162 const u8 *data, size_t len, int rx_freq) 170 if (p2p_parse(data, len, &msg)) 215 const u8 *data, size_t len) 231 if (p2p_parse(data, len, &msg) [all...] |
p2p_pd.c | 29 u8 *len; local 31 len = wpabuf_put(buf, 1); 39 p2p_buf_update_ie_hdr(buf, len); 49 u8 *len; local 66 len = p2p_buf_add_ie_hdr(buf); 74 p2p_buf_update_ie_hdr(buf, len); 146 const u8 *data, size_t len, int rx_freq) 154 if (p2p_parse(data, len, &msg)) 166 if (p2p_add_device(p2p, sa, rx_freq, NULL, 0, data + 1, len - 1, 263 const u8 *data, size_t len) [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 31 if (oid->len == 7 && 145 size_t len[2]; local 151 len[0] = os_strlen(passwd); 153 len[1] = params->salt_len; 154 if (md5_vector(2, addr, len, hash) < 0) 157 len[0] = MD5_MAC_LEN; 159 if (md5_vector(1, addr, len, hash) < 0)
|
tlsv1_record.c | 235 size_t len = pos - cpayload; local 237 pad = (len + 1) % rl->iv_size; 285 u8 len[2], hash[100]; local 317 wpa_printf(MSG_DEBUG, "TLSv1: Record overflow (len=%lu)", 448 WPA_PUT_BE16(len, plen); 449 crypto_hash_update(hmac, len, 2); 476 wpa_printf(MSG_DEBUG, "TLSv1: Record overflow (len=%lu)",
|
/external/wpa_supplicant_8/src/utils/ |
edit_readline.c | 42 static size_t len = 0; local 51 len = os_strlen(text); 54 if (strncmp(pending_completions[pos], text, len) == 0)
|