Searched defs:rlen (Results 1 - 25 of 89) sorted by relevance

1234

/external/icu4c/test/cintltst/
H A Dcg7coll.c146 int32_t i, rlen, j, n; local
161 defRules = ucol_getRules(myCollation, &rlen);
163 tblColl1 = ucol_openRules(defRules, rlen, UCOL_OFF,
/external/libppp/src/
H A Dvjcomp.c118 int len, olen, rlen; local
146 rlen = len;
148 bp = mbuf_Read(bp, bufp, rlen);
156 len += rlen;
/external/openssh/
H A Dssh-dss.c53 u_int rlen, slen, len, dlen; local
73 rlen = BN_num_bytes(sig->r);
75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) {
76 error("bad sig size %u %u", rlen, slen);
81 BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen);
117 int rlen, ret; local
145 rlen = buffer_len(&b);
147 if (rlen != 0) {
149 "remaining bytes in signature %d", rlen);
H A Dssh-ecdsa.c104 int rlen, ret; local
127 rlen = buffer_len(&b);
129 if (rlen != 0) {
130 error("%s: remaining bytes in signature %d", __func__, rlen);
H A Dssh-rsa.c116 int rlen, ret, nid; local
139 rlen = buffer_len(&b);
141 if (rlen != 0) {
142 error("ssh_rsa_verify: remaining bytes in signature %d", rlen);
/external/qemu/audio/
H A Dwavcapture.c34 uint8_t rlen[4]; local
40 le_store (rlen, rifflen, 4);
44 qemu_put_buffer (wav->f, rlen, 4);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_gtc.c104 size_t rlen; local
106 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
107 if (pos == NULL || rlen < 1)
110 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
116 if (rlen < 10) {
123 end = pos + rlen;
168 rlen = end - pos;
171 pos, rlen);
183 if (rlen != sm->user->password_len ||
184 os_memcmp(pos, sm->user->password, rlen) !
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_record.c249 size_t i, rlen, hlen; local
285 rlen = WPA_GET_BE16(in_data + 3);
288 if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
290 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
298 if (rlen > in_len) {
300 "(rlen=%lu > in_len=%lu)",
301 (unsigned long) rlen, (unsigned long) in_len);
306 in_len = rlen;
H A Dtlsv1_server_write.c51 size_t rlen; local
145 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
151 pos = rhdr + rlen;
163 size_t rlen; local
229 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
235 pos = rhdr + rlen;
252 size_t rlen; local
423 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
429 pos = rhdr + rlen;
446 size_t rlen; local
511 size_t rlen; local
553 size_t rlen; local
587 size_t rlen, hlen; local
[all...]
H A Dtlsv1_client_write.c136 size_t rlen; local
194 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
200 pos = rhdr + rlen;
382 size_t rlen; local
420 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
426 pos = rhdr + rlen;
439 size_t rlen, hlen, clen; local
541 rhdr, end - rhdr, pos - hs_start, &rlen) < 0) {
547 pos = rhdr + rlen;
561 size_t rlen; local
595 size_t rlen, hlen; local
[all...]
H A Dtlsv1_server.c199 size_t rlen; local
207 out_data, out_len, in_len, &rlen) < 0) {
214 return rlen;
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gtc.c98 size_t rlen; local
100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
101 if (pos == NULL || rlen < 1)
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
110 if (rlen < 10) {
117 end = pos + rlen;
162 rlen = end - pos;
165 pos, rlen);
177 if (rlen != sm->user->password_len ||
178 os_memcmp(pos, sm->user->password, rlen) !
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.c282 size_t i, rlen, hlen; local
299 rlen = WPA_GET_BE16(in_data + 3);
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
334 in_data, rlen);
346 in_len = rlen;
[all...]
H A Dtlsv1_server_write.c47 size_t rlen; local
142 &rlen) < 0) {
148 pos = rhdr + rlen;
160 size_t rlen; local
227 &rlen) < 0) {
233 pos = rhdr + rlen;
249 size_t rlen; local
419 &rlen) < 0) {
425 pos = rhdr + rlen;
439 size_t rlen; local
505 size_t rlen; local
541 size_t rlen; local
575 size_t rlen, hlen; local
[all...]
H A Dtlsv1_client_write.c133 size_t rlen; local
192 &rlen) < 0) {
198 pos = rhdr + rlen;
375 size_t rlen; local
414 &rlen) < 0) {
420 pos = rhdr + rlen;
433 size_t rlen, hlen, clen; local
591 &rlen) < 0) {
597 pos = rhdr + rlen;
610 size_t rlen; local
644 size_t rlen, hlen; local
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gtc.c98 size_t rlen; local
100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
101 if (pos == NULL || rlen < 1)
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
110 if (rlen < 10) {
117 end = pos + rlen;
162 rlen = end - pos;
165 pos, rlen);
177 if (rlen != sm->user->password_len ||
178 os_memcmp(pos, sm->user->password, rlen) !
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_record.c282 size_t i, rlen, hlen; local
299 rlen = WPA_GET_BE16(in_data + 3);
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
334 in_data, rlen);
346 in_len = rlen;
[all...]
H A Dtlsv1_server_write.c47 size_t rlen; local
142 &rlen) < 0) {
148 pos = rhdr + rlen;
160 size_t rlen; local
227 &rlen) < 0) {
233 pos = rhdr + rlen;
249 size_t rlen; local
419 &rlen) < 0) {
425 pos = rhdr + rlen;
439 size_t rlen; local
505 size_t rlen; local
541 size_t rlen; local
575 size_t rlen, hlen; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c98 size_t rlen; local
100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
101 if (pos == NULL || rlen < 1)
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
110 if (rlen < 10) {
117 end = pos + rlen;
162 rlen = end - pos;
165 pos, rlen);
177 if (rlen != sm->user->password_len ||
178 os_memcmp(pos, sm->user->password, rlen) !
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_record.c282 size_t i, rlen, hlen; local
299 rlen = WPA_GET_BE16(in_data + 3);
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
334 in_data, rlen);
346 in_len = rlen;
[all...]
H A Dtlsv1_server_write.c47 size_t rlen; local
142 &rlen) < 0) {
148 pos = rhdr + rlen;
160 size_t rlen; local
227 &rlen) < 0) {
233 pos = rhdr + rlen;
249 size_t rlen; local
419 &rlen) < 0) {
425 pos = rhdr + rlen;
439 size_t rlen; local
505 size_t rlen; local
541 size_t rlen; local
575 size_t rlen, hlen; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sake.c200 size_t rlen; local
252 rlen = 2 + EAP_SAKE_RAND_LEN + 2 + EAP_SAKE_MIC_LEN;
254 rlen += 2 + data->peerid_len;
255 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen,
H A Deap_tnc.c210 size_t len, rlen; local
383 rlen = start_len + imc_len + end_len;
384 resp = wpabuf_alloc(rlen);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c195 size_t rlen; local
247 rlen = 2 + EAP_SAKE_RAND_LEN + 2 + EAP_SAKE_MIC_LEN;
249 rlen += 2 + data->peerid_len;
250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen,
H A Deap_tnc.c204 size_t len, rlen; local
377 rlen = start_len + imc_len + end_len;
378 resp = wpabuf_alloc(rlen);

Completed in 332 milliseconds

1234