Searched defs:rlen (Results 1 - 25 of 98) sorted by relevance

1234

/external/chromium_org/third_party/icu/source/test/cintltst/
H A Dcg7coll.c142 int32_t i, rlen, j, n; local
157 defRules = ucol_getRules(myCollation, &rlen);
159 tblColl1 = ucol_openRules(defRules, rlen, UCOL_OFF,
/external/icu4c/test/cintltst/
H A Dcg7coll.c146 int32_t i, rlen, j, n; local
161 defRules = ucol_getRules(myCollation, &rlen);
163 tblColl1 = ucol_openRules(defRules, rlen, UCOL_OFF,
/external/libppp/src/
H A Dvjcomp.c118 int len, olen, rlen; local
146 rlen = len;
148 bp = mbuf_Read(bp, bufp, rlen);
156 len += rlen;
/external/openssh/
H A Dssh-dss.c53 u_int rlen, slen, len, dlen; local
73 rlen = BN_num_bytes(sig->r);
75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) {
76 error("bad sig size %u %u", rlen, slen);
81 BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen);
117 int rlen, ret; local
145 rlen = buffer_len(&b);
147 if (rlen != 0) {
149 "remaining bytes in signature %d", rlen);
H A Dssh-ecdsa.c104 int rlen, ret; local
127 rlen = buffer_len(&b);
129 if (rlen != 0) {
130 error("%s: remaining bytes in signature %d", __func__, rlen);
H A Dssh-rsa.c116 int rlen, ret, nid; local
139 rlen = buffer_len(&b);
141 if (rlen != 0) {
142 error("ssh_rsa_verify: remaining bytes in signature %d", rlen);
/external/qemu/audio/
H A Dwavcapture.c34 uint8_t rlen[4]; local
40 le_store (rlen, rifflen, 4);
44 qemu_put_buffer (wav->f, rlen, 4);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gtc.c98 size_t rlen; local
100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
101 if (pos == NULL || rlen < 1)
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
110 if (rlen < 10) {
117 end = pos + rlen;
162 rlen = end - pos;
165 pos, rlen);
177 if (rlen != sm->user->password_len ||
178 os_memcmp(pos, sm->user->password, rlen) !
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.c282 size_t i, rlen, hlen; local
299 rlen = WPA_GET_BE16(in_data + 3);
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
334 in_data, rlen);
346 in_len = rlen;
[all...]
H A Dtlsv1_server_write.c47 size_t rlen; local
142 &rlen) < 0) {
148 pos = rhdr + rlen;
160 size_t rlen; local
227 &rlen) < 0) {
233 pos = rhdr + rlen;
249 size_t rlen; local
419 &rlen) < 0) {
425 pos = rhdr + rlen;
439 size_t rlen; local
505 size_t rlen; local
541 size_t rlen; local
575 size_t rlen, hlen; local
[all...]
H A Dtlsv1_client_write.c133 size_t rlen; local
192 &rlen) < 0) {
198 pos = rhdr + rlen;
375 size_t rlen; local
414 &rlen) < 0) {
420 pos = rhdr + rlen;
433 size_t rlen, hlen, clen; local
591 &rlen) < 0) {
597 pos = rhdr + rlen;
610 size_t rlen; local
644 size_t rlen, hlen; local
[all...]
H A Dtlsv1_server.c204 size_t rlen; local
210 out_data, out_len, in_data, in_len, &rlen) < 0) {
217 return rlen;
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gtc.c98 size_t rlen; local
100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
101 if (pos == NULL || rlen < 1)
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
110 if (rlen < 10) {
117 end = pos + rlen;
162 rlen = end - pos;
165 pos, rlen);
177 if (rlen != sm->user->password_len ||
178 os_memcmp(pos, sm->user->password, rlen) !
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_record.c282 size_t i, rlen, hlen; local
299 rlen = WPA_GET_BE16(in_data + 3);
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
334 in_data, rlen);
346 in_len = rlen;
[all...]
H A Dtlsv1_server_write.c47 size_t rlen; local
142 &rlen) < 0) {
148 pos = rhdr + rlen;
160 size_t rlen; local
227 &rlen) < 0) {
233 pos = rhdr + rlen;
249 size_t rlen; local
419 &rlen) < 0) {
425 pos = rhdr + rlen;
439 size_t rlen; local
505 size_t rlen; local
541 size_t rlen; local
575 size_t rlen, hlen; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c98 size_t rlen; local
100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
101 if (pos == NULL || rlen < 1)
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
110 if (rlen < 10) {
117 end = pos + rlen;
162 rlen = end - pos;
165 pos, rlen);
177 if (rlen != sm->user->password_len ||
178 os_memcmp(pos, sm->user->password, rlen) !
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_record.c282 size_t i, rlen, hlen; local
299 rlen = WPA_GET_BE16(in_data + 3);
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) {
318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen));
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
334 in_data, rlen);
346 in_len = rlen;
[all...]
H A Dtlsv1_server_write.c47 size_t rlen; local
142 &rlen) < 0) {
148 pos = rhdr + rlen;
160 size_t rlen; local
227 &rlen) < 0) {
233 pos = rhdr + rlen;
249 size_t rlen; local
419 &rlen) < 0) {
425 pos = rhdr + rlen;
439 size_t rlen; local
505 size_t rlen; local
541 size_t rlen; local
575 size_t rlen, hlen; local
[all...]
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/i965/
H A Dbrw_fs_emit.cpp269 int rlen = 4; local
387 rlen = 8;
420 rlen,
/external/mesa3d/src/mesa/drivers/dri/i965/
H A Dbrw_fs_emit.cpp269 int rlen = 4; local
387 rlen = 8;
420 rlen,
/external/webrtc/src/modules/audio_coding/codecs/isac/fix/test/
H A Dtest_iSACfixfloat.c47 short k, rlen, status = 0; local
49 rlen = fread(data, sizeof(WebRtc_Word16), length, inp);
50 if (rlen < length) {
51 for (k = rlen; k < length; k++)
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c195 size_t rlen; local
247 rlen = 2 + EAP_SAKE_RAND_LEN + 2 + EAP_SAKE_MIC_LEN;
249 rlen += 2 + data->peerid_len;
250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen,
H A Deap_tnc.c204 size_t len, rlen; local
377 rlen = start_len + imc_len + end_len;
378 resp = wpabuf_alloc(rlen);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sake.c195 size_t rlen; local
247 rlen = 2 + EAP_SAKE_RAND_LEN + 2 + EAP_SAKE_MIC_LEN;
249 rlen += 2 + data->peerid_len;
250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen,
H A Deap_tnc.c204 size_t len, rlen; local
377 rlen = start_len + imc_len + end_len;
378 resp = wpabuf_alloc(rlen);

Completed in 973 milliseconds

1234