/external/strace/ |
netlink_kobject_uevent.c | 37 kernel_ulong_t len) 44 !addr || len < offset || umove(tcp, addr, &uh) || 46 printstrn(tcp, addr, len); 60 if (len > offset) { 62 printstrn(tcp, addr + offset, len - offset);
|
/external/tcpdump/ |
print-carp.c | 49 carp_print(netdissect_options *ndo, register const u_char *bp, register u_int len, int ttl) 61 ND_PRINT((ndo, "CARPv%d-%s %d: ", version, type_s, len)); 73 vec[0].len = len; 74 if (ND_TTEST2(bp[0], len) && in_cksum(vec, 1))
|
print-ip6.c | 57 int i, len; local 101 len = dp->ip6r_len; 107 if (len % 2 == 1) 109 len >>= 1; 111 for (i = 0; i < len; i++) { 165 u_int len, u_int covlen, u_int next_proto) 199 ph.ph_len = htonl(len); 203 vec[0].len = sizeof(ph); 205 vec[1].len = covlen; 218 u_int len; local [all...] |
print-pim.c | 140 static void pimv2_print(netdissect_options *, register const u_char *bp, register u_int len, const u_char *); 144 register const u_char *bp, register u_int len) 172 if (len < sizeof(struct in_addr)) 179 len -= 4; 180 if (len < 4) 190 len -= 4; 192 if (len < 4) 197 len -= 4; 203 if (len < 4) 208 len -= 4 [all...] |
/external/toybox/toys/other/ |
dos2unix.c | 42 int len, in, out; local 44 len = read(fd, toybuf+(sizeof(toybuf)/2), sizeof(toybuf)/2); 45 if (len<0) perror_msg_raw(name); 46 if (len<1) break; 48 for (in = out = 0; in < len; in++) {
|
/external/toybox/toys/posix/ |
tee.c | 57 int len; local 60 len = xread(0, toybuf, sizeof(toybuf)); 61 if (len<1) break; 66 if(len != writeall(fdl ? fdl->fd : 1, toybuf, len)) toys.exitval=1;
|
/external/u-boot/board/amlogic/khadas-vim/ |
khadas-vim.c | 30 ssize_t len; local 36 len = meson_sm_read_efuse(EFUSE_MAC_OFFSET, 38 if (len == EFUSE_MAC_SIZE && is_valid_ethaddr(mac_addr)) 43 len = meson_sm_read_efuse(EFUSE_SN_OFFSET, serial, 45 if (len == EFUSE_SN_SIZE)
|
/external/u-boot/board/amlogic/libretech-cc/ |
libretech-cc.c | 30 ssize_t len; local 36 len = meson_sm_read_efuse(EFUSE_MAC_OFFSET, 38 if (len == EFUSE_MAC_SIZE && is_valid_ethaddr(mac_addr)) 43 len = meson_sm_read_efuse(EFUSE_SN_OFFSET, serial, 45 if (len == EFUSE_SN_SIZE)
|
/external/u-boot/board/amlogic/odroid-c2/ |
odroid-c2.c | 29 ssize_t len; local 40 len = meson_sm_read_efuse(EFUSE_MAC_OFFSET, 42 if (len == EFUSE_MAC_SIZE && is_valid_ethaddr(mac_addr)) 47 len = meson_sm_read_efuse(EFUSE_SN_OFFSET, serial, 49 if (len == EFUSE_SN_SIZE)
|
/external/u-boot/board/amlogic/p212/ |
p212.c | 30 ssize_t len; local 35 len = meson_sm_read_efuse(EFUSE_MAC_OFFSET, 37 if (len == EFUSE_MAC_SIZE && is_valid_ethaddr(mac_addr)) 42 len = meson_sm_read_efuse(EFUSE_SN_OFFSET, serial, 44 if (len == EFUSE_SN_SIZE)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_passphrase.c | 20 size_t len; local 51 len = os_strlen(passphrase); 52 if (len < 8 || len > 63) { 56 if (has_ctrl_char((u8 *) passphrase, len)) {
|
/external/wpa_supplicant_8/src/utils/ |
wpabuf.c | 30 static void wpabuf_overflow(const struct wpabuf *buf, size_t len) 39 wpa_printf(MSG_ERROR, "wpabuf %p (size=%lu used=%lu) overflow len=%lu", 41 (unsigned long) len); 110 * @len: Length for the allocated buffer 113 struct wpabuf * wpabuf_alloc(size_t len) 117 sizeof(struct wpabuf) + len); 124 struct wpabuf *buf = os_zalloc(sizeof(struct wpabuf) + len); 129 buf->size = len; 135 struct wpabuf * wpabuf_alloc_ext_data(u8 *data, size_t len) 151 buf->size = len; 240 size_t len = 0; local 322 size_t len; local [all...] |
const_time.h | 65 * @len: Number of octets to compare 78 size_t len) 85 for (i = 0; i < len; i++) 154 * @len: Number of octets to copy 162 const u8 *false_val, size_t len, 167 for (i = 0; i < len; i++) 172 static inline int const_time_memcmp(const void *a, const void *b, size_t len) 179 if (len == 0) 182 len--; 183 diff = (int) aa[len] - (int) bb[len] [all...] |
/external/curl/lib/ |
curl_gssapi.c | 86 char *buf, size_t len) { 99 if(GSS_LOG_BUFFER_LEN > len + status_string.length + 3) { 100 len += msnprintf(buf + len, GSS_LOG_BUFFER_LEN - len, 107 return len; 126 size_t len = 0; local 129 len = display_gss_error(major, GSS_C_GSS_CODE, buf, len); 131 display_gss_error(minor, GSS_C_MECH_CODE, buf, len); [all...] |
/external/epid-sdk/ext/ipp/sources/ippcp/ |
pcpaes_sivstuff.h | 62 __INLINE void cpAES_CMAC(Ipp8u mac[MBS_RIJ128], const Ipp8u* pSrc, int len, IppsAES_CMACState* pCtx) 64 ippsAES_CMACUpdate(pSrc, len, pCtx); 90 __INLINE void cpAES_S2V_update(Ipp8u v[MBS_RIJ128], const Ipp8u* pSrc, int len, IppsAES_CMACState* pCtx) 93 cpAES_CMAC(t, pSrc, len, pCtx); 98 static void cpAES_S2V_final(Ipp8u v[MBS_RIJ128], const Ipp8u* pSrc, int len, IppsAES_CMACState* pCtx) 102 if(len>=MBS_RIJ128) { 103 ippsAES_CMACUpdate(pSrc, len-MBS_RIJ128, pCtx); 104 XorBlock16(pSrc+len-MBS_RIJ128, v, t); 108 XorBlock(pSrc, t, t, len); 109 t[len] ^= 0x80 [all...] |
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/mmap/ |
24-2.c | 11 * and the range [addr,addr+len) exceeds that allowed 38 size_t len; local 70 len = shm_size; 71 pa = mmap(NULL, len, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); 77 len = rlim.rlim_cur; 79 printf("addr: %lx, len: %lx\n", (unsigned long)addr, 80 (unsigned long)len); 81 /* Make sure addr and len is aligned to page size */ 87 if (len % page_size) { 89 len &= ~(page_size - 1) [all...] |
/external/openssh/ |
buffer.c | 30 buffer_append(Buffer *buffer, const void *data, u_int len) 34 if ((ret = sshbuf_put(buffer, data, len)) != 0) 39 buffer_append_space(Buffer *buffer, u_int len) 44 if ((ret = sshbuf_reserve(buffer, len, &p)) != 0) 50 buffer_check_alloc(Buffer *buffer, u_int len) 52 int ret = sshbuf_check_reserve(buffer, len); 62 buffer_get_ret(Buffer *buffer, void *buf, u_int len) 66 if ((ret = sshbuf_get(buffer, buf, len)) != 0) { 74 buffer_get(Buffer *buffer, void *buf, u_int len) 76 if (buffer_get_ret(buffer, buf, len) == -1 [all...] |
/external/sfntly/cpp/src/test/tinyxml/ |
tinystr.cpp | 49 TiXmlString& TiXmlString::assign(const char* str, size_type len) 52 if (len > cap || cap > 3*(len + 8)) 55 tmp.init(len); 56 memcpy(tmp.start(), str, len); 61 memmove(start(), str, len); local 62 set_size(len); 68 TiXmlString& TiXmlString::append(const char* str, size_type len) 70 size_type newsize = length() + len; 75 memmove(finish(), str, len); local [all...] |
/external/tinyxml/ |
tinystr.cpp | 53 TiXmlString& TiXmlString::assign(const char* str, size_type len) 56 if (len > cap || cap > 3*(len + 8)) 59 tmp.init(len); 60 memcpy(tmp.start(), str, len); 65 memmove(start(), str, len); local 66 set_size(len); 72 TiXmlString& TiXmlString::append(const char* str, size_type len) 74 size_type newsize = length() + len; 79 memmove(finish(), str, len); local [all...] |
/external/tinyxml2/ |
setversion.py | 34 if len(args) != 3:
53 if line[0:len(matchMajor)] == matchMajor:
57 elif line[0:len(matchMinor)] == matchMinor:
61 elif line[0:len(matchBuild)] == matchBuild:
76 if line[0:len(matchMajor)] == matchMajor:
80 elif line[0:len(matchMinor)] == matchMinor:
84 elif line[0:len(matchBuild)] == matchBuild:
99 if line[0:len( match )] == match:
115 if line[0:len(matchVersion)] == matchVersion:
128 if line[0:len(matchSoversion)] == matchSoversion: [all...] |
/external/toybox/lib/ |
commas.c | 10 char *(*callback)(void *data, char *str, int len)) 13 int len; local 19 while ((next = comma_iterate(&arg, &len))) 20 if ((next = callback(data, next, len))) 46 // sets *len to length of entry (not including comma) 48 char *comma_iterate(char **list, int *len) 55 *len = strlen(*list); 57 } else *list += (*len = end-start)+1; 66 int optlen = strlen(opt), len, no, got = 0; local 69 char *s = comma_iterate(&optlist, &len); [all...] |
/external/u-boot/drivers/usb/gadget/ |
usbstring.c | 17 static int utf8_to_utf16le(const char *s, __le16 *cp, unsigned len) 28 while (len != 0 && (c = (u8) *s++) != 0) { 79 len--; 108 int len; local 130 len = min((size_t) 126, strlen(s->s)); 131 memset(buf + 2, 0, 2 * len); /* zero all the bytes */ 132 len = utf8_to_utf16le(s->s, (__le16 *)&buf[2], len); 133 if (len < 0) 135 buf[0] = (len + 1) * 2 [all...] |
/external/vboot_reference/firmware/lib/cryptolib/include/ |
sha.h | 42 uint32_t len; member in struct:__anon48875 50 uint32_t len; member in struct:__anon48876 57 void SHA1_update(SHA1_CTX* ctx, const uint8_t* data, uint64_t len); 61 void SHA256_update(VB_SHA256_CTX* ctx, const uint8_t* data, uint32_t len); 65 void SHA512_update(VB_SHA512_CTX* ctx, const uint8_t* data, uint32_t len); 68 /* Convenience function for SHA-1. Computes hash on [data] of length [len]. 72 uint8_t* internal_SHA1(const uint8_t* data, uint64_t len, uint8_t* digest); 74 /* Convenience function for SHA-256. Computes hash on [data] of length [len]. 78 uint8_t* internal_SHA256(const uint8_t* data, uint64_t len, uint8_t* digest); 80 /* Convenience function for SHA-512. Computes hash on [data] of length [len] [all...] |
/external/aac/libFDK/src/ |
scale.cpp | 125 * \param len must be larger than 4 131 INT len, /*!< Length */ 141 for (i = len & 3; i--;) { 144 for (i = len >> 2; i--;) { 152 for (i = len & 3; i--;) { 155 for (i = len >> 2; i--;) { 169 * \param len must be larger than 4 176 INT len, /*!< Length */ 186 for (i = len & 3; i--;) { 189 for (i = len >> 2; i--;) [all...] |
/external/u-boot/lib/rsa/ |
rsa-mod-exp.c | 41 for (i = 0; i < key->len; i++) { 60 for (i = (int)key->len - 1; i >= 0; i--) { 90 for (i = 1; i < key->len; i++) { 120 for (i = 0; i < key->len; ++i) 122 for (i = 0; i < key->len; ++i) 180 /* Sanity check for stack size - key->len is in 32-bit words */ 181 if (key->len > RSA_MAX_KEY_BITS / 32) { 182 debug("RSA key words %u exceeds maximum %d\n", key->len, 187 uint32_t val[key->len], acc[key->len], tmp[key->len] [all...] |