/bionic/libc/unistd/ |
recv.c | 31 ssize_t recv(int socket, void *buf, size_t buflen, unsigned int flags) 33 return recvfrom(socket, buf, buflen, flags, NULL, 0);
|
send.c | 31 ssize_t send(int socket, const void *buf, size_t buflen, unsigned int flags) 33 return (ssize_t) sendto(socket, buf, buflen, flags, NULL, 0);
|
gethostname.c | 33 int gethostname(char* buff, size_t buflen) 43 if ((int)buflen < namelen+1) {
|
ptsname_r.c | 35 int ptsname_r( int fd, char* buf, size_t buflen) 52 if (len+1 > (int)buflen) {
|
/external/tcpdump/ |
decode_prefix.h | 36 extern int decode_prefix4(const u_char *pptr, char *buf, u_int buflen); 38 extern int decode_prefix6(const u_char *pd, char *buf, u_int buflen);
|
/bionic/libc/netbsd/nameser/ |
ns_print.c | 64 char **buf, size_t *buflen); 67 char **buf, size_t *buflen); 68 static void addlen(size_t len, char **buf, size_t *buflen); 70 char **buf, size_t *buflen); 72 char **buf, size_t *buflen); 86 * ns_sprintrr(handle, rr, name_ctx, origin, buf, buflen) 94 char *buf, size_t buflen) 101 name_ctx, origin, buf, buflen); 108 * name_ctx, origin, buf, buflen) 118 char *buf, size_t buflen) 170 addlen(strlen(buf), &buf, &buflen); local 338 addlen(strlen(buf), &buf, &buflen); local 429 addlen(strlen(buf), &buf, &buflen); local 671 addlen(strlen(buf), &buf, &buflen); local 694 addlen(strlen(buf), &buf, &buflen); local [all...] |
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_add_aad.c | 41 if (gcm->buflen > 16 || gcm->buflen < 0) { 52 if (gcm->ivmode || gcm->buflen != 12) { 53 for (x = 0; x < (unsigned long)gcm->buflen; x++) { 56 if (gcm->buflen) { 57 gcm->totlen += gcm->buflen * CONST64(8); 81 gcm->buflen = 0; 86 if (gcm->mode != GCM_MODE_AAD || gcm->buflen >= 16) { 92 if (gcm->buflen == 0) { 107 gcm->X[gcm->buflen++] ^= *adata++ [all...] |
gcm_add_iv.c | 43 if (gcm->buflen >= 16 || gcm->buflen < 0) { 53 if (IVlen + gcm->buflen > 12) { 59 if (gcm->buflen == 0) { 73 gcm->buf[gcm->buflen++] = *IV++; 75 if (gcm->buflen == 16) { 81 gcm->buflen = 0;
|
gcm_process.c | 44 if (gcm->buflen > 16 || gcm->buflen < 0) { 55 if (gcm->buflen) { 56 gcm->totlen += gcm->buflen * CONST64(8); 69 gcm->buflen = 0; 79 if (gcm->buflen == 0) { 122 if (gcm->buflen == 16) { 133 gcm->buflen = 0; 137 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen]; 140 pt[x] = ct[x] ^ gcm->buf[gcm->buflen]; [all...] |
gcm_done.c | 37 if (gcm->buflen > 16 || gcm->buflen < 0) { 51 if (gcm->buflen) { 52 gcm->pttotlen += gcm->buflen * CONST64(8);
|
gcm_reset.c | 33 gcm->buflen = 0;
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_process.c | 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || 40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { 45 if (omac->buflen == 0 && inlen > 16) { 62 if (omac->buflen == omac->blklen) { 69 omac->buflen = 0; 73 n = MIN(inlen, (unsigned long)(omac->blklen - omac->buflen)); 74 XMEMCPY(omac->block + omac->buflen, in, n); 75 omac->buflen += n;
|
omac_done.c | 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || 40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { 45 if (omac->buflen != omac->blklen) { 47 omac->block[omac->buflen++] = 0x80; 50 while (omac->buflen < omac->blklen) { 51 omac->block[omac->buflen++] = 0x00;
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_process.c | 40 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || 41 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { 46 if (pmac->buflen == 0 && inlen > 16) { 67 if (pmac->buflen == pmac->block_len) { 78 pmac->buflen = 0; 82 n = MIN(inlen, (unsigned long)(pmac->block_len - pmac->buflen)); 83 XMEMCPY(pmac->block + pmac->buflen, in, n); 84 pmac->buflen += n;
|
pmac_done.c | 30 if ((state->buflen > (int)sizeof(state->block)) || (state->buflen < 0) || 31 (state->block_len > (int)sizeof(state->block)) || (state->buflen > state->block_len)) { 38 if (state->buflen == state->block_len) { 45 for (x = 0; x < state->buflen; x++) {
|
/bionic/libc/string/ |
strerror_r.c | 93 strerror_r(int errnum, char *strerrbuf, size_t buflen) 102 len = strlcpy(strerrbuf, msg, buflen); 103 if ((size_t)len >= buflen) 106 len = strlcpy(strerrbuf, "Unknown error: ", buflen); 107 if ((size_t)len >= buflen) 110 int ret = __itoa(errnum, 1, strerrbuf, len, buflen); 128 __num2string(int num, int sign, int setid, char *buf, size_t buflen, 135 len = strlcpy(buf, def, buflen); 136 if (len >= buflen) 139 len = strlcpy(buf, def, buflen); [all...] |
/bionic/libc/netbsd/resolv/ |
__res_send.c | 31 res_send(const u_char *buf, int buflen, u_char *ans, int anssiz) 34 return __res_send(buf, buflen, ans, anssiz);
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_process.c | 39 (f9->buflen > f9->blocksize) || (f9->buflen < 0)) { 44 if (f9->buflen == 0) { 60 if (f9->buflen == f9->blocksize) { 65 f9->buflen = 0; 67 f9->IV[f9->buflen++] ^= *in++;
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_process.c | 42 (xcbc->buflen > xcbc->blocksize) || (xcbc->buflen < 0)) { 47 if (xcbc->buflen == 0) { 60 if (xcbc->buflen == xcbc->blocksize) { 62 xcbc->buflen = 0; 64 xcbc->IV[xcbc->buflen++] ^= *in++;
|
/external/openssl/crypto/ecdh/ |
ech_ossl.c | 118 size_t buflen, len; local 169 buflen = (EC_GROUP_get_degree(group) + 7)/8; 171 if (len > buflen) 176 if ((buf = OPENSSL_malloc(buflen)) == NULL) 182 memset(buf, 0, buflen - len); 183 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) 191 if (KDF(buf, buflen, out, &outlen) == NULL) 201 if (outlen > buflen) 202 outlen = buflen;
|
/hardware/ril/mock-ril/src/cpp/ |
node_util.cpp | 97 size_t buflen, 118 str->WriteUtf8(buf, buflen); 119 return buflen; 123 str->WriteAscii(buf, 0, buflen); 124 return buflen; 131 uint16_t * twobytebuf = new uint16_t[buflen]; 133 str->Write(twobytebuf, 0, buflen); 135 for (size_t i = 0; i < buflen; i++) { 143 return buflen;
|
/external/wpa_supplicant_6/wpa_supplicant/ |
main_winsvc.c | 73 DWORD buflen, val; local 87 buflen = sizeof(ctrl_interface); 89 (LPBYTE) ctrl_interface, &buflen); 94 (int) buflen, (char *) ctrl_interface); 98 buflen = sizeof(adapter); 100 (LPBYTE) adapter, &buflen); 105 (int) buflen, (char *) adapter); 109 buflen = sizeof(config); 111 (LPBYTE) config, &buflen); 116 (int) buflen, (char *) config) 146 DWORD val, buflen, i; local [all...] |
/external/ipsec-tools/src/racoon/ |
privsep.c | 290 size_t *buflen; local 301 "corrupted privsep message (short buflen)\n"); 309 data += combuf->bufs.buflen[i]; 310 totallen += combuf->bufs.buflen[i]; 345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; 361 reply->bufs.buflen[0] = privkey->l; 392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; 398 if (combuf->bufs.buflen[count] == 0) 401 [combuf->bufs.buflen[count] - 1] = '\0'; 433 if (combuf->bufs.buflen[count] != sizeof(name)) [all...] |
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican.c | 50 pelmac->buflen = 0; 107 if (pelmac->buflen < 0 || pelmac->buflen > 15) { 112 if (pelmac->buflen == 0) { 126 pelmac->state[pelmac->buflen++] ^= *in++; 127 if (pelmac->buflen == 16) { 129 pelmac->buflen = 0; 147 if (pelmac->buflen < 0 || pelmac->buflen > 16) { 151 if (pelmac->buflen == 16) [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 49 unsigned long buflen; local 81 buflen = taglen; 82 if ((err = eax_done(eax, buf, &buflen)) != CRYPT_OK) { 87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) {
|