/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 133 plen = 4; 137 plen = strlen (pfx); 138 if (plen > 5) 139 plen = 5; 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/external/bluetooth/bluedroid/stack/avdt/ |
avdt_api.c | 1353 UINT8 *p, *plen, *pm1, *p_end; local [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 264 int plen; local 273 plen = alg->parameter->value.sequence->length; 274 return d2i_X509_ALGOR(NULL, &p, plen); 280 int plen; local 289 plen = alg->parameter->value.sequence->length; 290 pss = d2i_RSA_PSS_PARAMS(NULL, &p, plen);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
s3_pkt.c | 642 unsigned char *p,*plen; local 751 plen=p; 810 s2n(wr->length,plen); 813 s->msg_callback(1, 0, SSL3_RT_HEADER, plen - 5, 5, s, s->msg_callback_arg); [all...] |
/external/chromium_org/third_party/cld/encodings/compact_lang_det/ |
getonescriptspan.cc | 290 int tlen, plen; local 323 temp, &tlen, &plen); 365 int tlen, plen; local 411 script_buffer_ + put, &tlen, &plen); 417 tlen = plen = cld_UniLib::OneCharLen(next_byte_ + take); 424 memcpy(script_buffer_ + put, next_byte_ + take, plen); 429 // char xtmp[8]; memcpy(xtmp,script_buffer_ + put, plen); 430 // xtmp[plen] = '\0'; printf("'%s'{%d} ", xtmp, sc); 463 put += plen; // Advance 499 script_buffer_ + put, &tlen, &plen); [all...] |
/external/chromium_org/third_party/opus/src/tests/ |
test_opus_decode.c | 54 int err,skip,plen; local 302 plen=(fast_rand()%18+3)*8+skip+3; 307 for(t=0;t<5*2;t++)expected[t]=opus_decoder_get_nb_samples(dec[t],packet,plen); 308 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255; 310 if(opus_decode(decbak, packet, plen+1, outbuf, expected[0], 1)!=expected[0])test_failed(); 318 out_samples = opus_decode(dec[t], packet, plen+1, outbuf, MAX_FRAME_SAMP, 0); 326 fprintf(stdout," dec[all] random packets, all mode pairs (4096), %d bytes/frame OK.\n",plen+1); 328 plen=(fast_rand()%18+3)*8+skip+3; 334 expected=opus_decoder_get_nb_samples(dec[t],packet,plen); 337 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255 [all...] |
/external/iputils/ |
tracepath.c | 80 int plen; local 81 plen = printf("%s", a); 83 plen += printf(" (%s)", b); 84 if (plen >= HOST_COLUMN_SIZE) 85 plen = HOST_COLUMN_SIZE - 1; 86 printf("%*s", HOST_COLUMN_SIZE - plen, "");
|
/external/libedit/src/ |
el.c | 542 size_t plen = sizeof(elpath); local 546 plen += strlen(ptr); 547 if ((path = el_malloc(plen * sizeof(*path))) == NULL) 549 (void)snprintf(path, plen, "%s%s", ptr, elpath);
|
/external/libopus/tests/ |
test_opus_decode.c | 54 int err,skip,plen; local 302 plen=(fast_rand()%18+3)*8+skip+3; 307 for(t=0;t<5*2;t++)expected[t]=opus_decoder_get_nb_samples(dec[t],packet,plen); 308 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255; 310 if(opus_decode(decbak, packet, plen+1, outbuf, expected[0], 1)!=expected[0])test_failed(); 318 out_samples = opus_decode(dec[t], packet, plen+1, outbuf, MAX_FRAME_SAMP, 0); 326 fprintf(stdout," dec[all] random packets, all mode pairs (4096), %d bytes/frame OK.\n",plen+1); 328 plen=(fast_rand()%18+3)*8+skip+3; 334 expected=opus_decoder_get_nb_samples(dec[t],packet,plen); 337 for(j=0;j<plen;j++)packet[j+1]=(fast_rand()|fast_rand())&255 [all...] |
/external/mdnsresponder/mDNSPosix/ |
mDNSUNP.c | 68 void plen_to_mask(int plen, char *addr) { 74 if (plen>bits_in_block) ones_in_block=bits_in_block; 75 else ones_in_block=plen; 78 plen -= ones_in_block; 88 int flags, myflags, index, plen, scope; local 112 &index, &plen, &scope, &flags, ifname) != EOF) { 151 plen_to_mask(plen, ipv6addr);
|
/external/openssl/crypto/evp/ |
e_aes_cbc_hmac_sha1.c | 184 size_t plen = key->payload_length, local 199 if (plen==NO_PAYLOAD_LENGTH) 200 plen = len; 201 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) 207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { 223 SHA1_Update(&key->md,in+sha_off,plen-sha_off); 225 if (plen!=len) { /* "TLS" mode of operation */ 227 memcpy(out+aes_off,in+aes_off,plen-aes_off); 230 SHA1_Final(out+plen,&key->md) [all...] |
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 272 int plen; local 280 plen = alg->parameter->value.sequence->length; 281 pss = d2i_RSA_PSS_PARAMS(NULL, &p, plen); 293 plen = param->value.sequence->length; 294 *pmaskHash = d2i_X509_ALGOR(NULL, &p, plen);
|
/external/openssl/ssl/ |
s3_pkt.c | 696 unsigned char *p,*plen; local 806 plen=p; 875 s2n(wr->length,plen); [all...] |
/external/tcpdump/ |
print-babel.c | 114 format_prefix(const u_char *prefix, unsigned char plen) 117 if(plen >= 96 && memcmp(prefix, v4prefix, 12) == 0) 118 snprintf(buf, 50, "%s/%u", ipaddr_string(prefix + 12), plen - 96); 121 snprintf(buf, 50, "%s/%u", ip6addr_string(prefix), plen); 162 network_prefix(int ae, int plen, unsigned int omitted, 170 if(plen >= 0) 171 pb = (plen + 7) / 8; 444 u_char plen; local 449 plen = message[4] + (message[2] == 1 ? 96 : 0); 462 format_prefix(prefix, plen), 482 u_char prefix[16], plen; local 502 u_char prefix[16], plen; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
vlan_init.c | 681 int len, plen; local 684 plen = len - sizeof(*h); 685 if (len > left || plen < 0) { 687 "message: len=%d left=%d plen=%d", 688 len, left, plen); 694 vlan_read_ifnames(h, plen, 0, hapd); 697 vlan_read_ifnames(h, plen, 1, hapd);
|
wnm_ap.c | 374 size_t plen; local 381 plen = len - IEEE80211_HDRLEN - 2; 386 plen); 390 plen); 393 ieee802_11_rx_wnmsleep_req(hapd, mgmt->sa, payload, plen);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 501 size_t alen, plen, i, list_len; local 622 plen = WPA_GET_BE16(apos); 625 if (plen > alen) { 629 (unsigned long) plen, 635 attr->identity_len = plen; 760 plen = apos[0] * 256 + apos[1]; 761 if (plen > alen - 2) { 765 (unsigned long) plen, 770 attr->next_pseudonym_len = plen; 780 plen = apos[0] * 256 + apos[1] [all...] |
ikev2_common.c | 254 int plen, pdatalen; local 264 plen = WPA_GET_BE16(phdr->payload_length); 265 if (plen < (int) sizeof(*phdr) || pos + plen > end) { 267 "length %d", plen); 273 phdr->next_payload, phdr->flags, plen); 276 pdatalen = plen - sizeof(*phdr); 342 pos + plen == end) { 353 pos += plen; 532 size_t plen; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ikev2.c | 141 size_t send_len, plen, icv_len = 0; local 158 plen = 1 + send_len; 160 plen += 4; 174 plen += icv_len; 176 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
|
eap_pax.c | 94 u8 id, u8 op_code, size_t plen) 100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 123 size_t left, plen; local 189 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
|
eap_psk.c | 188 size_t buflen, left, data_len, len, plen; local 316 plen = sizeof(*hdr4) + 4 + 16 + data_len; 317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
eap_sake.c | 120 size_t plen; local 122 plen = length + sizeof(struct eap_sake_hdr); 124 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
eap_tnc.c | 88 size_t send_len, plen; local 105 plen = 1 + send_len; 107 plen += 4; 108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
|
eap_wsc.c | 306 size_t send_len, plen; local 322 plen = 2 + send_len; 324 plen += 2; 325 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 928 size_t plen; local 945 plen = be_to_host16(hdr->length); 946 if (plen > wpabuf_len(resp)) { 948 "(len=%lu plen=%lu)", 950 (unsigned long) plen); 959 if (plen > sizeof(*hdr)) { 963 if (plen < sizeof(*hdr) + 8) { 965 "expanded EAP-Packet (plen=%lu)", 966 (unsigned long) plen); [all...] |