Home
last modified time | relevance | path

Searched refs:rlen (Results 1 – 25 of 126) sorted by relevance

123456

/external/tcpdump/
Dprint-forces.c394 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_16BITS(&(tlv)->length)), \ argument
401 #define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_32BITS(&(ilv)->length)), \ argument
417 static inline u_int tlv_valid(const struct forces_tlv *tlv, u_int rlen) in tlv_valid() argument
419 if (rlen < TLV_HDRL) in tlv_valid()
423 if (EXTRACT_16BITS(&tlv->length) > rlen) in tlv_valid()
425 if (rlen < F_ALN_LEN(EXTRACT_16BITS(&tlv->length))) in tlv_valid()
431 static inline int ilv_valid(const struct forces_ilv *ilv, u_int rlen) in ilv_valid() argument
433 if (rlen < ILV_HDRL) in ilv_valid()
437 if (EXTRACT_32BITS(&ilv->length) > rlen) in ilv_valid()
439 if (rlen < F_ALN_LEN(EXTRACT_32BITS(&ilv->length))) in ilv_valid()
[all …]
/external/strace/
Dnet.c226 int ulen, rlen; in decode_sockname() local
244 if (syserror(tcp) || umove(tcp, tcp->u_arg[2], &rlen) < 0) { in decode_sockname()
248 decode_sockaddr(tcp, tcp->u_arg[1], ulen > rlen ? rlen : ulen); in decode_sockname()
249 if (ulen != rlen) in decode_sockname()
250 tprintf(", [%d->%d]", ulen, rlen); in decode_sockname()
252 tprintf(", [%d]", rlen); in decode_sockname()
326 int ulen, rlen; in SYS_FUNC() local
350 if (!fetch_socklen(tcp, &rlen, tcp->u_arg[4], tcp->u_arg[5])) { in SYS_FUNC()
366 decode_sockaddr(tcp, tcp->u_arg[4], ulen > rlen ? rlen : ulen); in SYS_FUNC()
368 if (ulen != rlen) in SYS_FUNC()
[all …]
/external/openssh/
Dsshbuf.c234 size_t rlen; in sshbuf_set_max_size() local
251 rlen = SSHBUF_SIZE_INIT; in sshbuf_set_max_size()
253 rlen = ROUNDUP(buf->size, SSHBUF_SIZE_INC); in sshbuf_set_max_size()
254 if (rlen > max_size) in sshbuf_set_max_size()
255 rlen = max_size; in sshbuf_set_max_size()
257 SSHBUF_DBG(("new alloc = %zu", rlen)); in sshbuf_set_max_size()
258 if ((dp = realloc(buf->d, rlen)) == NULL) in sshbuf_set_max_size()
261 buf->alloc = rlen; in sshbuf_set_max_size()
321 size_t rlen, need; in sshbuf_allocate() local
342 rlen = ROUNDUP(buf->alloc + need, SSHBUF_SIZE_INC); in sshbuf_allocate()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_gtc.c98 size_t rlen; in eap_gtc_process() local
100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); in eap_gtc_process()
101 if (pos == NULL || rlen < 1) in eap_gtc_process()
104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); in eap_gtc_process()
110 if (rlen < 10) { in eap_gtc_process()
117 end = pos + rlen; in eap_gtc_process()
161 rlen = end - pos; in eap_gtc_process()
164 pos, rlen); in eap_gtc_process()
176 if (rlen != sm->user->password_len || in eap_gtc_process()
177 os_memcmp_const(pos, sm->user->password, rlen) != 0) { in eap_gtc_process()
/external/libxml2/doc/examples/
Dio1.c24 static int rlen; variable
55 rlen = strlen(result); in sqlOpen()
71 rlen = 0; in sqlClose()
92 if (len > rlen) len = rlen; in sqlRead()
94 rlen -= len; in sqlRead()
/external/libcxx/test/std/strings/string.view/string.view.ops/
Dcopy.pass.cpp30 const size_t rlen = std::min ( n, sv.size() - pos ); in test1() local
32 CharT *dest1 = new CharT [rlen + 1]; dest1[rlen] = 0; in test1()
33 CharT *dest2 = new CharT [rlen + 1]; dest2[rlen] = 0; in test1()
47 std::copy_n(sv.begin() + pos, rlen, dest2); in test1()
48 for ( size_t i = 0; i <= rlen; ++i ) in test1()
/external/python/cpython2/Lib/
Dbinhex.py61 rlen = fp.tell()
62 return file, finfo, dlen, rlen
175 name, finfo, dlen, rlen = name_finfo_dlen_rlen
186 self.rlen = rlen
199 d4 = struct.pack('>ii', self.dlen, self.rlen)
226 raise Error, 'Incorrect data size, diff=%r' % (self.rlen,)
235 self.rlen = self.rlen - len(data)
246 if self.rlen != 0:
248 "Incorrect resource-datasize, diff=%r" % (self.rlen,)
426 self.rlen = struct.unpack('>l', rest[15:19])[0]
[all …]
/external/u-boot/net/
Dnfs.c611 int rlen; in nfs_readlink_reply() local
635 rlen = ntohl(rpc_pkt.u.reply.data[1 + nfsv3_data_offset]); in nfs_readlink_reply()
644 rlen); in nfs_readlink_reply()
645 nfs_path[pathlen + rlen] = 0; in nfs_readlink_reply()
649 rlen); in nfs_readlink_reply()
650 nfs_path[rlen] = 0; in nfs_readlink_reply()
658 int rlen; in nfs_read_reply() local
688 rlen = ntohl(rpc_pkt.u.reply.data[18]); in nfs_read_reply()
695 rlen = ntohl(rpc_pkt.u.reply.data[1 + nfsv3_data_offset]); in nfs_read_reply()
704 if (store_block(data_ptr, nfs_offset, rlen)) in nfs_read_reply()
[all …]
/external/wpa_supplicant_8/src/tls/
Dtlsv1_server_write.c47 size_t rlen; in tls_write_server_hello() local
175 &rlen) < 0) { in tls_write_server_hello()
181 pos = rhdr + rlen; in tls_write_server_hello()
193 size_t rlen; in tls_write_server_certificate() local
265 &rlen) < 0) { in tls_write_server_certificate()
271 pos = rhdr + rlen; in tls_write_server_certificate()
288 size_t rlen; in tls_write_server_certificate_status() local
352 &rlen) < 0) { in tls_write_server_certificate_status()
358 pos = rhdr + rlen; in tls_write_server_certificate_status()
374 size_t rlen; in tls_write_server_key_exchange() local
[all …]
Dtlsv1_record.c282 size_t i, rlen, hlen; in tlsv1_record_receive() local
299 rlen = WPA_GET_BE16(in_data + 3); in tlsv1_record_receive()
301 "length %d", ct, in_data[1], in_data[2], (int) rlen); in tlsv1_record_receive()
316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { in tlsv1_record_receive()
318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); in tlsv1_record_receive()
326 if (rlen > in_len) { in tlsv1_record_receive()
329 (unsigned long) rlen, (unsigned long) in_len); in tlsv1_record_receive()
334 in_data, rlen); in tlsv1_record_receive()
346 in_len = rlen; in tlsv1_record_receive()
484 return TLS_RECORD_HEADER_LEN + rlen; in tlsv1_record_receive()
Dtlsv1_client_write.c268 size_t rlen; in tls_write_client_certificate() local
332 &rlen) < 0) { in tls_write_client_certificate()
338 pos = rhdr + rlen; in tls_write_client_certificate()
522 size_t rlen; in tls_write_client_key_exchange() local
561 &rlen) < 0) { in tls_write_client_key_exchange()
567 pos = rhdr + rlen; in tls_write_client_key_exchange()
580 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local
732 &rlen) < 0) { in tls_write_client_certificate_verify()
738 pos = rhdr + rlen; in tls_write_client_certificate_verify()
751 size_t rlen; in tls_write_client_change_cipher_spec() local
[all …]
/external/python/cpython3/Lib/
Dbinhex.py141 name, finfo, dlen, rlen = name_finfo_dlen_rlen
155 self.rlen = rlen
177 d4 = struct.pack('>ii', self.dlen, self.rlen)
204 raise Error('Incorrect data size, diff=%r' % (self.rlen,))
213 self.rlen = self.rlen - len(data)
224 if self.rlen != 0:
225 raise Error("Incorrect resource-datasize, diff=%r" % (self.rlen,))
398 self.rlen = struct.unpack('>l', rest[15:19])[0]
437 n = min(n, self.rlen)
439 n = self.rlen
[all …]
/external/libcxx/test/std/strings/basic.string/string.cons/
Dsubstr.pass.cpp42 typename S::size_type rlen = str.size() - pos; in test() local
43 assert(s2.size() == rlen); in test()
44 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); in test()
74 typename S::size_type rlen = std::min<typename S::size_type>(str.size() - pos, n); in test() local
75 assert(s2.size() == rlen); in test()
76 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); in test()
106 typename S::size_type rlen = std::min<typename S::size_type>(str.size() - pos, n); in test() local
107 assert(s2.size() == rlen); in test()
108 assert(T::compare(s2.data(), str.data() + pos, rlen) == 0); in test()
/external/libxml2/
Dtestlimits.c91 static int rlen; variable
132 rlen = strlen(hugeTests[currentTest].start); in hugeOpen()
187 if (len >= rlen) { in hugeRead()
188 len = rlen; in hugeRead()
189 rlen = 0; in hugeRead()
196 rlen -= len; in hugeRead()
200 if (len >= rlen) { in hugeRead()
201 len = rlen; in hugeRead()
202 rlen = 0; in hugeRead()
208 rlen -= len; in hugeRead()
[all …]
/external/guava/guava/src/com/google/common/escape/
DCharEscaper.java100 int rlen = r.length; in escapeSlow() local
106 int sizeNeeded = destIndex + charsSkipped + rlen; in escapeSlow()
119 if (rlen > 0) { in escapeSlow()
120 System.arraycopy(r, 0, dest, destIndex, rlen); in escapeSlow()
121 destIndex += rlen; in escapeSlow()
/external/honggfuzz/examples/glibc/
Dresolver.c37 static size_t rlen = 0; variable
82 *((uint16_t *)rbuf) = htons(rlen - 2); in getdata()
86 if (send(nfd, rbuf, rlen, MSG_NOSIGNAL) == -1) { in getdata()
130 rlen = 0; in main()
145 rlen = len - tmplen; in main()
/external/wpa_supplicant_8/src/utils/
Dpcsc_funcs.c404 int rlen, rec; in scard_get_aid() local
427 rlen = scard_get_record_len(scard, rec, in scard_get_aid()
429 if (rlen < 0) { in scard_get_aid()
435 if (rlen > (int) blen) { in scard_get_aid()
439 if (scard_read_record(scard, buf, rlen, rec, in scard_get_aid()
445 wpa_hexdump(MSG_DEBUG, "SCARD: EF_DIR record", buf, rlen); in scard_get_aid()
454 if (efdir->appl_template_len > rlen - 2) { in scard_get_aid()
457 efdir->appl_template_len, rlen); in scard_get_aid()
781 uint32_t rlen; in scard_transmit() local
783 unsigned long rlen; in scard_transmit() local
[all …]
/external/libmtp/src/
Dlibusb-glue.c1266 PTPUSBBulkContainer *packet, unsigned long *rlen) in ptp_usb_getpacket() argument
1280 *rlen = params->response_packet_size; in ptp_usb_getpacket()
1288 ret = ptp_read_func(packet_size, &memhandler, params->data, rlen, 0); in ptp_usb_getpacket()
1289 ptp_exit_recv_memory_handler (&memhandler, &x, rlen); in ptp_usb_getpacket()
1291 memcpy (packet, x, *rlen); in ptp_usb_getpacket()
1309 unsigned long len, rlen; in ptp_usb_getdata() local
1311 ret = ptp_usb_getpacket(params, &usbdata, &rlen); in ptp_usb_getdata()
1343 if (rlen == ptp_usb->inep_maxpacket) { in ptp_usb_getdata()
1347 params, handler->priv, rlen - PTP_USB_BULK_HDR_LEN, usbdata.payload.data in ptp_usb_getdata()
1371 if (rlen > dtoh32(usbdata.length)) { in ptp_usb_getdata()
[all …]
Dlibopenusb1-glue.c1277 PTPUSBBulkContainer *packet, unsigned long *rlen) { in ptp_usb_getpacket() argument
1290 *rlen = params->response_packet_size; in ptp_usb_getpacket()
1298 ret = ptp_read_func(packet_size, &memhandler, params->data, rlen, 0); in ptp_usb_getpacket()
1299 ptp_exit_recv_memory_handler(&memhandler, &x, rlen); in ptp_usb_getpacket()
1301 memcpy(packet, x, *rlen); in ptp_usb_getpacket()
1321 unsigned long len, rlen; in ptp_usb_getdata() local
1323 ret = ptp_usb_getpacket(params, &usbdata, &rlen); in ptp_usb_getdata()
1355 if (rlen == ptp_usb->inep_maxpacket) { in ptp_usb_getdata()
1359 params, handler->priv, rlen - PTP_USB_BULK_HDR_LEN, usbdata.payload.data in ptp_usb_getdata()
1383 if (rlen > dtoh32(usbdata.length)) { in ptp_usb_getdata()
[all …]
Dlibusb1-glue.c1291 PTPUSBBulkContainer *packet, unsigned long *rlen) in ptp_usb_getpacket() argument
1305 *rlen = params->response_packet_size; in ptp_usb_getpacket()
1313 ret = ptp_read_func(packet_size, &memhandler, params->data, rlen, 0); in ptp_usb_getpacket()
1314 ptp_exit_recv_memory_handler (&memhandler, &x, rlen); in ptp_usb_getpacket()
1316 memcpy (packet, x, *rlen); in ptp_usb_getpacket()
1334 unsigned long len, rlen; in ptp_usb_getdata() local
1336 ret = ptp_usb_getpacket(params, &usbdata, &rlen); in ptp_usb_getdata()
1368 if (rlen == ptp_usb->inep_maxpacket) { in ptp_usb_getdata()
1372 params, handler->priv, rlen - PTP_USB_BULK_HDR_LEN, usbdata.payload.data in ptp_usb_getdata()
1396 if (rlen > dtoh32(usbdata.length)) { in ptp_usb_getdata()
[all …]
/external/u-boot/examples/api/
Dglue.c273 lbasize_t *rlen) in ub_dev_read() argument
286 if (!err && rlen) in ub_dev_read()
287 *rlen = act_len; in ub_dev_read()
303 int ub_dev_recv(int handle, void *buf, int len, int *rlen) in ub_dev_recv() argument
315 if (!err && rlen) in ub_dev_recv()
316 *rlen = act_len; in ub_dev_recv()
/external/libunwind/src/ia64/
Dunwind_decoder.h186 unw_word rlen; in unw_decode_r1() local
188 rlen = (code & 0x1f); in unw_decode_r1()
189 UNW_DEC_PROLOGUE(R1, body, rlen, arg); in unw_decode_r1()
197 unw_word rlen; in unw_decode_r2() local
203 rlen = unw_decode_uleb128 (&dp); in unw_decode_r2()
204 UNW_DEC_PROLOGUE_GR(R2, rlen, mask, grsave, arg); in unw_decode_r2()
211 unw_word rlen; in unw_decode_r3() local
213 rlen = unw_decode_uleb128 (&dp); in unw_decode_r3()
214 UNW_DEC_PROLOGUE(R3, ((code & 0x3) == 1), rlen, arg); in unw_decode_r3()
/external/webrtc/webrtc/modules/audio_coding/codecs/isac/main/util/
Dutility.c24 short k, rlen, status = 0; in readframe() local
28 rlen = (short)fread(data, sizeof(short), length, inp); in readframe()
29 if (rlen < length) { in readframe()
30 for (k = rlen; k < length; k++) in readframe()
/external/selinux/libsemanage/src/
Dutilities.c236 size_t count = 0, slen, rlen, newsize; in semanage_str_replace() local
241 rlen = strlen(replace); in semanage_str_replace()
257 newsize = strlen(src) + 1 + count * (rlen - slen); in semanage_str_replace()
273 if (rlen != 0) { in semanage_str_replace()
274 memcpy(pres, replace, rlen); in semanage_str_replace()
275 pres += rlen; in semanage_str_replace()
/external/webrtc/webrtc/modules/audio_coding/codecs/g722/test/
DtestG722.cc34 size_t rlen = fread(data, sizeof(int16_t), length, inp); in readframe() local
35 if (rlen >= length) in readframe()
37 memset(data + rlen, 0, (length - rlen) * sizeof(int16_t)); in readframe()

123456