HomeSort by relevance Sort by last modified time
    Searched refs:len (Results 526 - 550 of 16257) sorted by null

<<21222324252627282930>>

  /external/strace/
netlink_kobject_uevent.c 37 kernel_ulong_t len)
44 !addr || len < offset || umove(tcp, addr, &uh) ||
46 printstrn(tcp, addr, len);
60 if (len > offset) {
62 printstrn(tcp, addr + offset, len - offset);
  /external/tcpdump/
print-carp.c 49 carp_print(netdissect_options *ndo, register const u_char *bp, register u_int len, int ttl)
61 ND_PRINT((ndo, "CARPv%d-%s %d: ", version, type_s, len));
73 vec[0].len = len;
74 if (ND_TTEST2(bp[0], len) && in_cksum(vec, 1))
print-ip6.c 57 int i, len; local
101 len = dp->ip6r_len;
107 if (len % 2 == 1)
109 len >>= 1;
111 for (i = 0; i < len; i++) {
165 u_int len, u_int covlen, u_int next_proto)
199 ph.ph_len = htonl(len);
203 vec[0].len = sizeof(ph);
205 vec[1].len = covlen;
218 u_int len; local
    [all...]
print-pim.c 140 static void pimv2_print(netdissect_options *, register const u_char *bp, register u_int len, const u_char *);
144 register const u_char *bp, register u_int len)
172 if (len < sizeof(struct in_addr))
179 len -= 4;
180 if (len < 4)
190 len -= 4;
192 if (len < 4)
197 len -= 4;
203 if (len < 4)
208 len -= 4
    [all...]
  /external/toybox/toys/other/
dos2unix.c 42 int len, in, out; local
44 len = read(fd, toybuf+(sizeof(toybuf)/2), sizeof(toybuf)/2);
45 if (len<0) perror_msg_raw(name);
46 if (len<1) break;
48 for (in = out = 0; in < len; in++) {
  /external/toybox/toys/posix/
tee.c 57 int len; local
60 len = xread(0, toybuf, sizeof(toybuf));
61 if (len<1) break;
66 if(len != writeall(fdl ? fdl->fd : 1, toybuf, len)) toys.exitval=1;
  /external/u-boot/board/amlogic/khadas-vim/
khadas-vim.c 30 ssize_t len; local
36 len = meson_sm_read_efuse(EFUSE_MAC_OFFSET,
38 if (len == EFUSE_MAC_SIZE && is_valid_ethaddr(mac_addr))
43 len = meson_sm_read_efuse(EFUSE_SN_OFFSET, serial,
45 if (len == EFUSE_SN_SIZE)
  /external/u-boot/board/amlogic/libretech-cc/
libretech-cc.c 30 ssize_t len; local
36 len = meson_sm_read_efuse(EFUSE_MAC_OFFSET,
38 if (len == EFUSE_MAC_SIZE && is_valid_ethaddr(mac_addr))
43 len = meson_sm_read_efuse(EFUSE_SN_OFFSET, serial,
45 if (len == EFUSE_SN_SIZE)
  /external/u-boot/board/amlogic/odroid-c2/
odroid-c2.c 29 ssize_t len; local
40 len = meson_sm_read_efuse(EFUSE_MAC_OFFSET,
42 if (len == EFUSE_MAC_SIZE && is_valid_ethaddr(mac_addr))
47 len = meson_sm_read_efuse(EFUSE_SN_OFFSET, serial,
49 if (len == EFUSE_SN_SIZE)
  /external/u-boot/board/amlogic/p212/
p212.c 30 ssize_t len; local
35 len = meson_sm_read_efuse(EFUSE_MAC_OFFSET,
37 if (len == EFUSE_MAC_SIZE && is_valid_ethaddr(mac_addr))
42 len = meson_sm_read_efuse(EFUSE_SN_OFFSET, serial,
44 if (len == EFUSE_SN_SIZE)
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_passphrase.c 20 size_t len; local
51 len = os_strlen(passphrase);
52 if (len < 8 || len > 63) {
56 if (has_ctrl_char((u8 *) passphrase, len)) {
  /external/wpa_supplicant_8/src/utils/
wpabuf.c 30 static void wpabuf_overflow(const struct wpabuf *buf, size_t len)
39 wpa_printf(MSG_ERROR, "wpabuf %p (size=%lu used=%lu) overflow len=%lu",
41 (unsigned long) len);
110 * @len: Length for the allocated buffer
113 struct wpabuf * wpabuf_alloc(size_t len)
117 sizeof(struct wpabuf) + len);
124 struct wpabuf *buf = os_zalloc(sizeof(struct wpabuf) + len);
129 buf->size = len;
135 struct wpabuf * wpabuf_alloc_ext_data(u8 *data, size_t len)
151 buf->size = len;
240 size_t len = 0; local
322 size_t len; local
    [all...]
const_time.h 65 * @len: Number of octets to compare
78 size_t len)
85 for (i = 0; i < len; i++)
154 * @len: Number of octets to copy
162 const u8 *false_val, size_t len,
167 for (i = 0; i < len; i++)
172 static inline int const_time_memcmp(const void *a, const void *b, size_t len)
179 if (len == 0)
182 len--;
183 diff = (int) aa[len] - (int) bb[len]
    [all...]
  /external/curl/lib/
curl_gssapi.c 86 char *buf, size_t len) {
99 if(GSS_LOG_BUFFER_LEN > len + status_string.length + 3) {
100 len += msnprintf(buf + len, GSS_LOG_BUFFER_LEN - len,
107 return len;
126 size_t len = 0; local
129 len = display_gss_error(major, GSS_C_GSS_CODE, buf, len);
131 display_gss_error(minor, GSS_C_MECH_CODE, buf, len);
    [all...]
  /external/epid-sdk/ext/ipp/sources/ippcp/
pcpaes_sivstuff.h 62 __INLINE void cpAES_CMAC(Ipp8u mac[MBS_RIJ128], const Ipp8u* pSrc, int len, IppsAES_CMACState* pCtx)
64 ippsAES_CMACUpdate(pSrc, len, pCtx);
90 __INLINE void cpAES_S2V_update(Ipp8u v[MBS_RIJ128], const Ipp8u* pSrc, int len, IppsAES_CMACState* pCtx)
93 cpAES_CMAC(t, pSrc, len, pCtx);
98 static void cpAES_S2V_final(Ipp8u v[MBS_RIJ128], const Ipp8u* pSrc, int len, IppsAES_CMACState* pCtx)
102 if(len>=MBS_RIJ128) {
103 ippsAES_CMACUpdate(pSrc, len-MBS_RIJ128, pCtx);
104 XorBlock16(pSrc+len-MBS_RIJ128, v, t);
108 XorBlock(pSrc, t, t, len);
109 t[len] ^= 0x80
    [all...]
  /external/ltp/testcases/open_posix_testsuite/conformance/interfaces/mmap/
24-2.c 11 * and the range [addr,addr+len) exceeds that allowed
38 size_t len; local
70 len = shm_size;
71 pa = mmap(NULL, len, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
77 len = rlim.rlim_cur;
79 printf("addr: %lx, len: %lx\n", (unsigned long)addr,
80 (unsigned long)len);
81 /* Make sure addr and len is aligned to page size */
87 if (len % page_size) {
89 len &= ~(page_size - 1)
    [all...]
  /external/openssh/
buffer.c 30 buffer_append(Buffer *buffer, const void *data, u_int len)
34 if ((ret = sshbuf_put(buffer, data, len)) != 0)
39 buffer_append_space(Buffer *buffer, u_int len)
44 if ((ret = sshbuf_reserve(buffer, len, &p)) != 0)
50 buffer_check_alloc(Buffer *buffer, u_int len)
52 int ret = sshbuf_check_reserve(buffer, len);
62 buffer_get_ret(Buffer *buffer, void *buf, u_int len)
66 if ((ret = sshbuf_get(buffer, buf, len)) != 0) {
74 buffer_get(Buffer *buffer, void *buf, u_int len)
76 if (buffer_get_ret(buffer, buf, len) == -1
    [all...]
  /external/sfntly/cpp/src/test/tinyxml/
tinystr.cpp 49 TiXmlString& TiXmlString::assign(const char* str, size_type len)
52 if (len > cap || cap > 3*(len + 8))
55 tmp.init(len);
56 memcpy(tmp.start(), str, len);
61 memmove(start(), str, len); local
62 set_size(len);
68 TiXmlString& TiXmlString::append(const char* str, size_type len)
70 size_type newsize = length() + len;
75 memmove(finish(), str, len); local
    [all...]
  /external/tinyxml/
tinystr.cpp 53 TiXmlString& TiXmlString::assign(const char* str, size_type len)
56 if (len > cap || cap > 3*(len + 8))
59 tmp.init(len);
60 memcpy(tmp.start(), str, len);
65 memmove(start(), str, len); local
66 set_size(len);
72 TiXmlString& TiXmlString::append(const char* str, size_type len)
74 size_type newsize = length() + len;
79 memmove(finish(), str, len); local
    [all...]
  /external/tinyxml2/
setversion.py 34 if len(args) != 3:
53 if line[0:len(matchMajor)] == matchMajor:
57 elif line[0:len(matchMinor)] == matchMinor:
61 elif line[0:len(matchBuild)] == matchBuild:
76 if line[0:len(matchMajor)] == matchMajor:
80 elif line[0:len(matchMinor)] == matchMinor:
84 elif line[0:len(matchBuild)] == matchBuild:
99 if line[0:len( match )] == match:
115 if line[0:len(matchVersion)] == matchVersion:
128 if line[0:len(matchSoversion)] == matchSoversion:
    [all...]
  /external/toybox/lib/
commas.c 10 char *(*callback)(void *data, char *str, int len))
13 int len; local
19 while ((next = comma_iterate(&arg, &len)))
20 if ((next = callback(data, next, len)))
46 // sets *len to length of entry (not including comma)
48 char *comma_iterate(char **list, int *len)
55 *len = strlen(*list);
57 } else *list += (*len = end-start)+1;
66 int optlen = strlen(opt), len, no, got = 0; local
69 char *s = comma_iterate(&optlist, &len);
    [all...]
  /external/u-boot/drivers/usb/gadget/
usbstring.c 17 static int utf8_to_utf16le(const char *s, __le16 *cp, unsigned len)
28 while (len != 0 && (c = (u8) *s++) != 0) {
79 len--;
108 int len; local
130 len = min((size_t) 126, strlen(s->s));
131 memset(buf + 2, 0, 2 * len); /* zero all the bytes */
132 len = utf8_to_utf16le(s->s, (__le16 *)&buf[2], len);
133 if (len < 0)
135 buf[0] = (len + 1) * 2
    [all...]
  /external/vboot_reference/firmware/lib/cryptolib/include/
sha.h 42 uint32_t len; member in struct:__anon48875
50 uint32_t len; member in struct:__anon48876
57 void SHA1_update(SHA1_CTX* ctx, const uint8_t* data, uint64_t len);
61 void SHA256_update(VB_SHA256_CTX* ctx, const uint8_t* data, uint32_t len);
65 void SHA512_update(VB_SHA512_CTX* ctx, const uint8_t* data, uint32_t len);
68 /* Convenience function for SHA-1. Computes hash on [data] of length [len].
72 uint8_t* internal_SHA1(const uint8_t* data, uint64_t len, uint8_t* digest);
74 /* Convenience function for SHA-256. Computes hash on [data] of length [len].
78 uint8_t* internal_SHA256(const uint8_t* data, uint64_t len, uint8_t* digest);
80 /* Convenience function for SHA-512. Computes hash on [data] of length [len]
    [all...]
  /external/aac/libFDK/src/
scale.cpp 125 * \param len must be larger than 4
131 INT len, /*!< Length */
141 for (i = len & 3; i--;) {
144 for (i = len >> 2; i--;) {
152 for (i = len & 3; i--;) {
155 for (i = len >> 2; i--;) {
169 * \param len must be larger than 4
176 INT len, /*!< Length */
186 for (i = len & 3; i--;) {
189 for (i = len >> 2; i--;)
    [all...]
  /external/u-boot/lib/rsa/
rsa-mod-exp.c 41 for (i = 0; i < key->len; i++) {
60 for (i = (int)key->len - 1; i >= 0; i--) {
90 for (i = 1; i < key->len; i++) {
120 for (i = 0; i < key->len; ++i)
122 for (i = 0; i < key->len; ++i)
180 /* Sanity check for stack size - key->len is in 32-bit words */
181 if (key->len > RSA_MAX_KEY_BITS / 32) {
182 debug("RSA key words %u exceeds maximum %d\n", key->len,
187 uint32_t val[key->len], acc[key->len], tmp[key->len]
    [all...]

Completed in 5599 milliseconds

<<21222324252627282930>>