/external/harfbuzz/src/ |
H A D | harfbuzz-hebrew.c | 78 int slen = 1; local 137 shapedChars[slen] = 0x25cc; 138 attributes[slen].clusterStart = TRUE; 139 attributes[slen].mark = FALSE; 140 attributes[slen].combiningClass = 0; 141 cluster_start = slen; 142 ++slen; 153 shapedChars[slen] = uc[i]; 156 attributes[slen].clusterStart = TRUE; 157 attributes[slen] [all...] |
H A D | harfbuzz-greek.c | 364 int slen = 1; local 376 hb_uint16 base = shapedChars[slen-1]; 399 shapedChars[slen-1] = shaped; 408 shapedChars[slen] = uc[i]; 411 attributes[slen].clusterStart = TRUE; 412 attributes[slen].mark = FALSE; 413 attributes[slen].combiningClass = 0; 414 attributes[slen].dontPrint = HB_IsControlChar(uc[i]); 415 cluster_start = slen; 417 attributes[slen] [all...] |
/external/openssh/openbsd-compat/ |
H A D | realpath.c | 58 int serrno, slen; local 150 slen = readlink(resolved, symlink, sizeof(symlink) - 1); 151 if (slen < 0) 153 symlink[slen] = '\0'; 171 if (symlink[slen - 1] != '/') { 172 if (slen + 1 >= sizeof(symlink)) { 176 symlink[slen] = '/'; 177 symlink[slen + 1] = 0;
|
H A D | mktemp.c | 51 mkstemps(char *path, int slen) argument 55 return (_gettemp(path, &fd, 0, slen) ? fd : -1); 73 _gettemp(path, doopen, domkdir, slen) 77 int slen; 91 trv -= slen;
|
/external/chromium/base/ |
H A D | file_util_android.cc | 23 mkstemps(char *path, int slen) argument 27 return (_gettemp(path, &fd, 0, slen) ? fd : -1); 65 _gettemp(char *path, int *doopen, int domkdir, int slen) argument 79 trv -= slen;
|
/external/openssl/crypto/asn1/ |
H A D | asn1_mac.h | 111 c.slen = length; 125 (((c.inf&1) == 0)?(c.slen <= 0): \ 126 (c.eos=ASN1_const_check_infinite_end(&c.p,c.slen))) 131 if (func(&(b),&c.p,c.slen) == NULL) \ 133 c.slen-=(c.p-c.q); 138 if (((D2I_OF(type))func)(&(b),&c.p,c.slen) == NULL) \ 140 c.slen-=(c.p-c.q); 145 if (func(&(b),&c.p,c.slen) < 0) \ 147 c.slen-=(c.p-c.q); 150 if ((c.slen ! [all...] |
H A D | f_enum.c | 105 int num=0,slen=0,first=1; local 153 if (num+i > slen) 168 slen=num+i*2;
|
H A D | f_string.c | 103 int num=0,slen=0,first=1; local 158 if (num+i > slen) 173 slen=num+i*2;
|
H A D | evp_asn1.c | 162 if ((ai=d2i_ASN1_INTEGER(NULL,&c.p,c.slen)) == NULL) goto err; 163 c.slen-=(c.p-c.q); 165 if ((os=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) goto err; 166 c.slen-=(c.p-c.q);
|
H A D | f_int.c | 109 int num=0,slen=0,first=1; local 166 if (num+i > slen) 172 sp=OPENSSL_realloc_clean(s,slen,num+i*2); 180 slen=num+i*2;
|
H A D | a_d2i_fp.c | 192 c.inf=ASN1_get_object(&(c.p),&(c.slen),&(c.tag),&(c.xclass), 218 else if (eos && (c.slen == 0) && (c.tag == V_ASN1_EOC)) 229 /* suck in c.slen bytes of data */ 230 want=c.slen; 260 if (off + c.slen < off) 265 off+=c.slen;
|
H A D | a_set.c | 189 c.inf=ASN1_get_object(&c.p,&c.slen,&c.tag,&c.xclass,c.max-c.p); 201 if ((c.slen+c.p) > c.max) 209 c.slen=length+ *pp-c.p; 210 c.max=c.p+c.slen; 218 if ((s=func(NULL,&c.p,c.slen,c.max-c.p)) == NULL) */ 219 if ((s=d2i(NULL,&c.p,c.slen)) == NULL)
|
/external/openssl/include/openssl/ |
H A D | asn1_mac.h | 111 c.slen = length; 125 (((c.inf&1) == 0)?(c.slen <= 0): \ 126 (c.eos=ASN1_const_check_infinite_end(&c.p,c.slen))) 131 if (func(&(b),&c.p,c.slen) == NULL) \ 133 c.slen-=(c.p-c.q); 138 if (((D2I_OF(type))func)(&(b),&c.p,c.slen) == NULL) \ 140 c.slen-=(c.p-c.q); 145 if (func(&(b),&c.p,c.slen) < 0) \ 147 c.slen-=(c.p-c.q); 150 if ((c.slen ! [all...] |
/external/openssh/ |
H A D | ssh-rsa.c | 46 u_int slen, dlen, len; local 64 slen = RSA_size(key->rsa); 65 sig = xmalloc(slen); 78 if (len < slen) { 79 u_int diff = slen - len; 80 debug("slen %u > len %u", slen, len); 83 } else if (len > slen) { 84 error("ssh_rsa_sign: slen %u slen2 %u", slen, le [all...] |
H A D | auth2-hostbased.c | 63 u_int alen, blen, slen; local 75 sig = packet_get_string(&slen); 77 debug("userauth_hostbased: cuser %s chost %s pkalg %s slen %d", 78 cuser, chost, pkalg, slen); 82 buffer_append(&b, sig, slen); 122 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b),
|
H A D | ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 74 slen = BN_num_bytes(sig->s); 75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { 76 error("bad sig size %u %u", rlen, slen); 82 BN_bn2bin(sig->s, sigblob+ SIGBLOB_LEN - slen);
|
H A D | kexdhc.c | 55 u_int klen, slen, sbloblen, hashlen; local 110 signature = packet_get_string(&slen); 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
|
H A D | ssh-pkcs11-client.c | 109 u_int blen, slen = 0; local 128 signature = buffer_get_string(&msg, &slen); 129 if (slen <= (u_int)RSA_size(rsa)) { 130 memcpy(to, signature, slen); 131 ret = slen;
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_sd.c | 242 u16 slen; local 275 slen = *pos++; 276 next = pos + slen; 277 if (next > end || slen < 2) { 295 slen = WPA_GET_LE16(pos); 297 if (pos + slen > end) 299 end = pos + slen; 311 slen = WPA_GET_LE16(pos); 313 if (pos + slen > end || slen < 404 u16 slen; local 644 u16 slen; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_sd.c | 242 u16 slen; local 275 slen = *pos++; 276 next = pos + slen; 277 if (next > end || slen < 2) { 295 slen = WPA_GET_LE16(pos); 297 if (pos + slen > end) 299 end = pos + slen; 311 slen = WPA_GET_LE16(pos); 313 if (pos + slen > end || slen < 404 u16 slen; local 644 u16 slen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_sd.c | 242 u16 slen; local 275 slen = *pos++; 276 next = pos + slen; 277 if (next > end || slen < 2) { 295 slen = WPA_GET_LE16(pos); 297 if (pos + slen > end) 299 end = pos + slen; 311 slen = WPA_GET_LE16(pos); 313 if (pos + slen > end || slen < 404 u16 slen; local 644 u16 slen; local [all...] |
/external/iptables/extensions/ |
H A D | libxt_string.c | 93 int i=0, slen, sindex=0, schar; local 97 slen = strlen(s); 99 if (slen == 0) { 104 while (i < slen) { 119 if (i+1 >= slen) 126 if (i+1 >= slen) { 134 if (i+1 >= slen) { 138 if (i+2 >= slen) {
|
/external/openssl/crypto/pkcs7/ |
H A D | example.c | 138 if ((os1=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) 140 c.slen-=(c.p-c.q); 143 if ((os2=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) 145 c.slen-=(c.p-c.q); 305 if ((os1=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) 307 c.slen-=(c.p-c.q); 310 if ((os2=d2i_ASN1_OCTET_STRING(NULL,&c.p,c.slen)) == NULL) 312 c.slen-=(c.p-c.q);
|
/external/openssl/crypto/pem/ |
H A D | pem_pkey.c | 81 int slen; local 122 } else if ((slen = pem_check_suffix(nm, "PRIVATE KEY")) > 0) 125 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); 161 int slen; local 169 if ((slen = pem_check_suffix(nm, "PARAMETERS")) > 0) 174 if (!EVP_PKEY_set_type_str(ret, nm, slen)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | interworking.c | 963 const u8 *data, size_t slen) 976 wpa_hexdump_ascii(MSG_DEBUG, "ANQP: Venue Name", pos, slen); 979 bss->anqp_venue_name = wpabuf_alloc_copy(pos, slen); 987 "Type", pos, slen); 991 wpabuf_alloc_copy(pos, slen); 998 pos, slen); 1002 wpabuf_alloc_copy(pos, slen); 1010 pos, slen); 1014 wpabuf_alloc_copy(pos, slen); 1020 wpa_hexdump_ascii(MSG_DEBUG, "ANQP: NAI Realm", pos, slen); 961 interworking_parse_rx_anqp_resp(struct wpa_supplicant *wpa_s, const u8 *sa, u16 info_id, const u8 *data, size_t slen) argument 1074 u16 slen; local [all...] |