/bionic/libc/string/ |
strlcat.c | 35 size_t dlen; local 40 dlen = d - dst; 41 n = siz - dlen; 44 return(dlen + strlen(s)); 54 return(dlen + (s - src)); /* count does not include NUL */
|
/bionic/libc/wchar/ |
wcslcat.c | 54 size_t dlen; local 59 dlen = d - dst; 60 n = siz - dlen; 63 return(dlen + wcslen(s)); 73 return(dlen + (s - src)); /* count does not include NUL */
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
der_decode_bit_string.c | 32 unsigned long dlen, blen, x, y; local 62 dlen = 0; 64 dlen = (dlen << 8) | (unsigned long)in[x++]; 68 dlen = in[x++] & 0x7F; 72 if ((dlen == 0) || (dlen + x > inlen)) { 77 blen = ((dlen - 1) << 3) - (in[x++] & 7);
|
/external/tcpdump/missing/ |
strlcat.c | 56 size_t dlen; local 61 dlen = d - dst; 62 n = siz - dlen; 65 return(dlen + strlen(s)); 75 return(dlen + (s - src)); /* count does not include NUL */
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
pg.h | 47 int dlen; /* number of bytes expected to transfer */ member in struct:pg_write_hdr 57 int dlen; /* size of device transfer request */ member in struct:pg_read_hdr
|
/external/dropbear/ |
compat.c | 135 size_t dlen; local 140 dlen = d - dst; 141 n = siz - dlen; 144 return(dlen + strlen(s)); 154 return(dlen + (s - src)); /* count does not include NUL */
|
/external/skia/src/effects/ |
SkDashPathEffect.cpp | 113 SkScalar dlen = SkScalarMul(fInitialDashLength, scale); local 116 SkASSERT(dlen >= 0); 118 if (is_even(index) && dlen > 0 && !skipFirstSegment) { 120 meas.getSegment(distance, distance + dlen, dst, true); 122 distance += dlen; 134 // fetch our next dlen 135 dlen = SkScalarMul(intervals[index], scale);
|
/frameworks/base/core/java/android/text/method/ |
DigitsKeyListener.java | 141 int dlen = dest.length(); local 156 for (int i = dend; i < dlen; i++) {
|
/external/qemu/audio/ |
wavcapture.c | 35 uint8_t dlen[4]; local 41 le_store (dlen, datalen, 4); 47 qemu_put_buffer (wav->f, dlen, 4);
|
wavaudio.c | 181 uint8_t dlen[4]; local 190 le_store (dlen, datalen, 4); 196 qemu_put_buffer (wav->f, dlen, 4);
|
/ndk/sources/host-tools/sed-4.2.1/lib/ |
tempname.c | 128 size_t dlen, plen; local 165 dlen = strlen (dir); 166 while (dlen > 1 && dir[dlen - 1] == '/') 167 dlen--; /* remove trailing slashes */ 170 if (tmpl_len < dlen + 1 + plen + 6 + 1) 176 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/external/iproute2/tc/ |
m_ematch.c | 371 int dlen; local 378 dlen = RTA_PAYLOAD(tb[i]) - sizeof(*hdr); 381 if (dlen < 0) 392 if (dlen < sizeof(__u32)) 414 if (e->print_eopt(fd, hdr, data, dlen) < 0)
|
/external/bluetooth/hcidump/parser/ |
l2cap.c | 630 printf("Echo req: dlen %d\n", btohs(cmd->len)); 639 printf("Echo rsp: dlen %d\n", btohs(cmd->len)); 713 uint16_t dlen = btohs(hdr->len); local 804 printf("L2CAP(c): len %d psm %d\n", dlen, psm); 826 printf("L2CAP(d): cid 0x%4.4x len %d", cid, dlen); 942 uint16_t dlen; local 946 dlen = btohs(hdr->len); 948 if ((int) frm->len == (dlen + L2CAP_HDR_SIZE)) { 963 if (!(fr->data = malloc(dlen + L2CAP_HDR_SIZE))) { 968 fr->data_len = dlen + L2CAP_HDR_SIZE [all...] |
/external/ppp/pppd/ |
utils.c | 117 size_t dlen = strlen(dest); local 119 return dlen + strlcpy(dest + dlen, src, (len > dlen? len - dlen: 0));
|
/external/wpa_supplicant/ |
crypto_cryptoapi.c | 182 DWORD dlen; local 229 dlen = 8; 230 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 318 DWORD dlen; local 321 dlen = 16; 322 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 350 DWORD dlen; local 353 dlen = 16; 355 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 618 DWORD dlen; local 635 DWORD dlen; local [all...] |
radius.c | 1097 size_t i, dlen; local 1109 dlen = attr->length - sizeof(*attr); 1111 os_memcpy(buf, (attr + 1), dlen > len ? len : dlen); 1112 return dlen; 1175 size_t dlen; local 1182 dlen = attr->length - sizeof(*attr); 1207 dlen--; 1209 if (dlen >= sizeof(buf)) 1211 os_memcpy(buf, data, dlen); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_cryptoapi.c | 167 DWORD dlen; local 214 dlen = 8; 215 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 303 DWORD dlen; local 306 dlen = 16; 307 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 335 DWORD dlen; local 338 dlen = 16; 340 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 603 DWORD dlen; local 620 DWORD dlen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 165 DWORD dlen; local 212 dlen = 8; 213 if (!CryptEncrypt(ckey, 0, FALSE, 0, cypher, &dlen, 8)) { 300 DWORD dlen; local 303 dlen = 16; 304 if (!CryptEncrypt(akey->ckey, 0, FALSE, 0, crypt, &dlen, 16)) { 332 DWORD dlen; local 335 dlen = 16; 337 if (!CryptDecrypt(akey->ckey, 0, FALSE, 0, plain, &dlen)) { 599 DWORD dlen; local 616 DWORD dlen; local [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_xauth.c | 1452 size_t dlen = 0; local 1617 size_t dlen = 0; local [all...] |
/external/libpcap/ |
pcap-dlpi.c | 1499 int dlen; local [all...] |
/external/tcpdump/ |
print-udp.c | 144 u_int dlen = EXTRACT_16BITS(&up->uh_ulen) - sizeof(*up) - 8; local 163 dlen -= 4; 170 dlen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ralink.c | 550 int dlen = dpos - (char *) &iwe_buf; local 552 sizeof(struct iw_event) - dlen); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 1101 size_t i, dlen; local 1114 dlen = attr->length - sizeof(*attr); 1116 os_memcpy(buf, (attr + 1), dlen > len ? len : dlen); 1117 return dlen; 1181 size_t dlen; local 1188 dlen = attr->length - sizeof(*attr); 1212 dlen--; 1214 if (dlen >= sizeof(buf)) 1216 os_memcpy(buf, data, dlen); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_atheros.c | 1012 int dlen = dpos - (char *) &iwe_buf; local 1014 sizeof(struct iw_event) - dlen); [all...] |
driver_ralink.c | 581 int dlen = dpos - (char *) &iwe_buf; local 583 sizeof(struct iw_event) - dlen); [all...] |