/external/libxml2/doc/examples/ |
H A D | io1.c | 24 static int rlen; variable 55 rlen = strlen(result); 71 rlen = 0; 92 if (len > rlen) len = rlen; 94 rlen -= len;
|
/external/libcxx/test/std/experimental/string.view/string.view.ops/ |
H A D | copy.pass.cpp | 15 // Remarks: Let rlen be the smaller of n and size() - pos. 16 // Requires: [s, s+rlen) is a valid range. 17 // Effects: Equivalent to std::copy_n(begin() + pos, rlen, s). 18 // Returns: rlen. 28 const size_t rlen = std::min ( n, sv.size() - pos ); local 30 CharT *dest1 = new CharT [rlen + 1]; dest1[rlen] = 0; 31 CharT *dest2 = new CharT [rlen + 1]; dest2[rlen] = 0; 45 std::copy_n(sv.begin() + pos, rlen, dest [all...] |
H A D | substr.pass.cpp | 15 // Effects: Determines the effective length rlen of the string to reference as the smaller of n and size() - pos. 16 // Returns: basic_string_view(data()+pos, rlen). 39 const size_t rlen = std::min ( n, sv.size() - pos ); local 40 assert ( sv1.size() == rlen ); 41 for ( size_t i = 0; i <= rlen; ++i )
|
/external/libcxx/test/std/strings/string.view/string.view.ops/ |
H A D | copy.pass.cpp | 15 // Remarks: Let rlen be the smaller of n and size() - pos. 16 // Requires: [s, s+rlen) is a valid range. 17 // Effects: Equivalent to std::copy_n(begin() + pos, rlen, s). 18 // Returns: rlen. 29 const size_t rlen = std::min ( n, sv.size() - pos ); local 31 CharT *dest1 = new CharT [rlen + 1]; dest1[rlen] = 0; 32 CharT *dest2 = new CharT [rlen + 1]; dest2[rlen] = 0; 46 std::copy_n(sv.begin() + pos, rlen, dest [all...] |
H A D | substr.pass.cpp | 15 // Effects: Determines the effective length rlen of the string to reference as the smaller of n and size() - pos. 16 // Returns: basic_string_view(data()+pos, rlen). 42 const size_t rlen = std::min(n, sv.size() - pos); local 43 assert (sv1.size() == rlen); 44 for (size_t i = 0; i < rlen; ++i)
|
/external/guava/guava/src/com/google/common/escape/ |
H A D | CharEscaper.java | 100 int rlen = r.length; 106 int sizeNeeded = destIndex + charsSkipped + rlen; 119 if (rlen > 0) { 120 System.arraycopy(r, 0, dest, destIndex, rlen); 121 destIndex += rlen;
|
/external/openssh/ |
H A D | sshbuf.c | 234 size_t rlen; local 251 rlen = SSHBUF_SIZE_INIT; 253 rlen = ROUNDUP(buf->size, SSHBUF_SIZE_INC); 254 if (rlen > max_size) 255 rlen = max_size; 257 SSHBUF_DBG(("new alloc = %zu", rlen)); 258 if ((dp = realloc(buf->d, rlen)) == NULL) 261 buf->alloc = rlen; 321 size_t rlen, need; local 342 rlen [all...] |
/external/ltp/testcases/kernel/fs/dmapi/ |
H A D | mount.c | 120 size_t rlen; local 143 &rlen); 167 size_t rlen; local 190 &rlen); 214 size_t rlen; local 237 &rlen); 261 size_t rlen; local 283 sizeof(buf), buf, &rlen); 307 size_t rlen; local 329 buf, &rlen); 382 size_t rlen; local 475 size_t rlen; local 545 size_t rlen; local 589 size_t rlen; local 611 size_t rlen; local 656 size_t rlen; local [all...] |
H A D | event_us.c | 477 size_t rlen; local 492 buf, &rlen); 513 size_t rlen; local 528 buf, &rlen); 549 size_t rlen; local 564 &rlen); 567 DMLOG_PRINT(DMLVL_DEBUG, "rlen = %d\n", 568 rlen); 569 if (rlen == 573 "%s passed with expected rc = %d, expected errno = %d, and expected rlen 616 size_t rlen; local 688 size_t rlen; local 756 size_t rlen; local [all...] |
H A D | session.c | 501 size_t rlen; local 520 dmMsgBuf, &rlen); 968 size_t rlen; local 974 rc = dm_query_session(DM_NO_SESSION, sizeof(buf), buf, &rlen); 986 size_t rlen; local 992 rc = dm_query_session(INVALID_ADDR, sizeof(buf), buf, &rlen); 1005 size_t rlen; local 1022 rc = dm_query_session(newsid, sizeof(buf), buf, &rlen); 1036 size_t rlen; local 1048 rc = dm_query_session(newsid, sizeof(buf), NULL, &rlen); 1068 size_t rlen; local 1167 size_t rlen; local 1232 size_t rlen; local 1297 size_t rlen; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp_const(pos, sm->user->password, rlen) ! [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp_const(pos, sm->user->password, rlen) ! [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp_const(pos, sm->user->password, rlen) ! [all...] |
/external/ltp/testcases/kernel/syscalls/exit/ |
H A D | exit02.c | 71 int len, rlen; local 157 rlen = read(filed, rbuf, len); 158 if (len != rlen) {
|
/external/syslinux/com32/lib/syslinux/ |
H A D | floadfile.c | 50 size_t alen, clen, rlen, xlen; local 76 rlen = fread((char *)data + clen, 1, alen - clen, f); 77 clen += rlen;
|
/external/libcxx/test/std/strings/basic.string/string.cons/ |
H A D | substr.pass.cpp | 42 typename S::size_type rlen = str.size() - pos; local 43 assert(s2.size() == rlen); 44 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); 74 typename S::size_type rlen = std::min<typename S::size_type>(str.size() - pos, n); local 75 assert(s2.size() == rlen); 76 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); 106 typename S::size_type rlen = std::min<typename S::size_type>(str.size() - pos, n); local 107 assert(s2.size() == rlen); 108 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0);
|
H A D | T_size_size.pass.cpp | 39 unsigned rlen = std::min<unsigned>(sv.size() - pos, n); local 40 assert(s2.size() == rlen); 41 assert(T::compare(s2.data(), sv.data() + pos, rlen) == 0); 72 unsigned rlen = std::min<unsigned>(sv.size() - pos, n); local 73 assert(s2.size() == rlen); 74 assert(T::compare(s2.data(), sv.data() + pos, rlen) == 0);
|
/external/webrtc/webrtc/modules/audio_coding/codecs/g711/test/ |
H A D | testG711.cc | 28 size_t rlen = fread(data, sizeof(int16_t), length, inp); local 29 if (rlen >= length) 31 memset(data + rlen, 0, (length - rlen) * sizeof(int16_t));
|
/external/webrtc/webrtc/modules/audio_coding/codecs/g722/test/ |
H A D | testG722.cc | 34 size_t rlen = fread(data, sizeof(int16_t), length, inp); local 35 if (rlen >= length) 37 memset(data + rlen, 0, (length - rlen) * sizeof(int16_t));
|
/external/webrtc/webrtc/modules/audio_coding/codecs/isac/main/util/ |
H A D | utility.c | 24 short k, rlen, status = 0; local 28 rlen = (short)fread(data, sizeof(short), length, inp); 29 if (rlen < length) { 30 for (k = rlen; k < length; k++)
|
/external/tcpdump/ |
H A D | print-forces.c | 394 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_16BITS(&(tlv)->length)), \ 401 #define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_32BITS(&(ilv)->length)), \ 417 static inline u_int tlv_valid(const struct forces_tlv *tlv, u_int rlen) argument 419 if (rlen < TLV_HDRL) 423 if (EXTRACT_16BITS(&tlv->length) > rlen) 425 if (rlen < F_ALN_LEN(EXTRACT_16BITS(&tlv->length))) 431 static inline int ilv_valid(const struct forces_ilv *ilv, u_int rlen) argument 433 if (rlen < ILV_HDR 688 u_int rlen; local 722 u_int rlen; local 769 u_int rlen; local 1349 u_int rlen; local 1380 u_int rlen; local 1422 u_int rlen; local 1444 u_int rlen; local 1515 u_int rlen; local 1591 u_int rlen; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
/external/python/cpython2/Lib/ |
H A D | binhex.py | 61 rlen = fp.tell() 62 return file, finfo, dlen, rlen 175 name, finfo, dlen, rlen = name_finfo_dlen_rlen 186 self.rlen = rlen 199 d4 = struct.pack('>ii', self.dlen, self.rlen) 226 raise Error, 'Incorrect data size, diff=%r' % (self.rlen,) 235 self.rlen = self.rlen - len(data) 246 if self.rlen ! [all...] |