/external/ipsec-tools/src/racoon/ |
privsep.c | 290 size_t *buflen; local 301 "corrupted privsep message (short buflen)\n"); 309 data += combuf->bufs.buflen[i]; 310 totallen += combuf->bufs.buflen[i]; 345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; 361 reply->bufs.buflen[0] = privkey->l; 392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; 398 if (combuf->bufs.buflen[count] == 0) 401 [combuf->bufs.buflen[count] - 1] = '\0'; 433 if (combuf->bufs.buflen[count] != sizeof(name)) [all...] |
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican.c | 50 pelmac->buflen = 0; 107 if (pelmac->buflen < 0 || pelmac->buflen > 15) { 112 if (pelmac->buflen == 0) { 126 pelmac->state[pelmac->buflen++] ^= *in++; 127 if (pelmac->buflen == 16) { 129 pelmac->buflen = 0; 147 if (pelmac->buflen < 0 || pelmac->buflen > 16) { 151 if (pelmac->buflen == 16) [all...] |
/frameworks/av/media/libstagefright/ |
SkipCutBuffer.cpp | 43 int32_t buflen = buffer->range_length(); local 48 int32_t to_drop = (buflen < mFrontPadding) ? buflen : mFrontPadding; 50 buflen -= to_drop; 51 buffer->set_range(offset, buflen); 58 write(src, buflen); 70 int32_t buflen = buffer->size(); local 75 int32_t to_drop = (buflen < mFrontPadding) ? buflen : mFrontPadding; 77 buflen -= to_drop [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/X11/extensions/ |
lbxzlib.h | 55 extern int ZlibStuffInput ( int fd, unsigned char *buffer, int buflen ); 58 extern int ZlibWrite ( int fd, unsigned char *buffer, int buflen ); 60 extern int ZlibRead ( int fd, unsigned char *buffer, int buflen );
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/X11/extensions/ |
lbxzlib.h | 55 extern int ZlibStuffInput ( int fd, unsigned char *buffer, int buflen ); 58 extern int ZlibWrite ( int fd, unsigned char *buffer, int buflen ); 60 extern int ZlibRead ( int fd, unsigned char *buffer, int buflen );
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/X11/extensions/ |
lbxzlib.h | 55 extern int ZlibStuffInput ( int fd, unsigned char *buffer, int buflen ); 58 extern int ZlibWrite ( int fd, unsigned char *buffer, int buflen ); 60 extern int ZlibRead ( int fd, unsigned char *buffer, int buflen );
|
/external/wpa_supplicant_8/src/ap/ |
ctrl_iface_ap.c | 25 char *buf, size_t buflen) 36 ret = os_snprintf(buf + len, buflen - len, "connected_time=%u\n", 38 if (ret < 0 || (size_t) ret >= buflen - len) 48 char *buf, size_t buflen) 53 ret = os_snprintf(buf, buflen, "FAIL\n"); 54 if (ret < 0 || (size_t) ret >= buflen) 60 ret = os_snprintf(buf + len, buflen - len, MACSTR "\n", 62 if (ret < 0 || (size_t) ret >= buflen - len) 66 res = ieee802_11_get_mib_sta(hapd, sta, buf + len, buflen - len); 69 res = wpa_get_mib_sta(sta->wpa_sm, buf + len, buflen - len) [all...] |
/bionic/libc/bionic/ |
ptsname_r.c | 35 int ptsname_r( int fd, char* buf, size_t buflen) 52 if (len+1 > (int)buflen) {
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_process.c | 44 if (gcm->buflen > 16 || gcm->buflen < 0) { 55 if (gcm->buflen) { 56 gcm->totlen += gcm->buflen * CONST64(8); 69 gcm->buflen = 0; 79 if (gcm->buflen == 0) { 122 if (gcm->buflen == 16) { 133 gcm->buflen = 0; 137 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen]; 140 pt[x] = ct[x] ^ gcm->buf[gcm->buflen]; [all...] |
gcm_done.c | 37 if (gcm->buflen > 16 || gcm->buflen < 0) { 51 if (gcm->buflen) { 52 gcm->pttotlen += gcm->buflen * CONST64(8);
|
gcm_reset.c | 33 gcm->buflen = 0;
|
/external/chromium/third_party/libjingle/source/talk/base/ |
stringutils.h | 189 size_t strlenn(const CTYPE* buffer, size_t buflen) { 191 while (buffer[bufpos] && (bufpos < buflen)) { 201 size_t strcpyn(CTYPE* buffer, size_t buflen, 203 if (buflen <= 0) 207 srclen = strlenn(source, buflen - 1); 208 } else if (srclen >= buflen) { 209 srclen = buflen - 1; 217 size_t strcatn(CTYPE* buffer, size_t buflen, 219 if (buflen <= 0) 222 size_t bufpos = strlenn(buffer, buflen - 1) [all...] |
stringutils.cc | 87 size_t asccpyn(wchar_t* buffer, size_t buflen, 89 if (buflen <= 0) 93 srclen = strlenn(source, buflen - 1); 94 } else if (srclen >= buflen) { 95 srclen = buflen - 1;
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 49 unsigned long buflen; local 81 buflen = taglen; 82 if ((err = eax_done(eax, buf, &buflen)) != CRYPT_OK) { 87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_done.c | 38 (f9->buflen > f9->blocksize) || (f9->buflen < 0)) { 42 if (f9->buflen != 0) { 45 f9->buflen = 0;
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_done.c | 38 (xcbc->buflen > xcbc->blocksize) || (xcbc->buflen < 0)) { 43 if (xcbc->buflen == xcbc->blocksize) { 49 xcbc->IV[xcbc->buflen] ^= 0x80;
|
/external/wpa_supplicant_8/src/utils/ |
ip_addr.c | 15 size_t buflen) 17 if (buflen == 0 || addr == NULL) 21 os_strlcpy(buf, inet_ntoa(addr->u.v4), buflen); 27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL)
|
ip_addr.h | 24 size_t buflen);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wifi_display.h | 18 char *buf, size_t buflen);
|
ap.h | 21 const char *pin, char *buf, size_t buflen, 30 char *buf, size_t buflen); 32 char *buf, size_t buflen); 34 char *buf, size_t buflen); 40 size_t buflen, int verbose);
|
/bionic/libc/upstream-netbsd/libc/stdio/ |
getdelim.c | 57 __getdelim(char **__restrict buf, size_t *__restrict buflen, 66 if (buf == NULL || buflen == NULL) { 73 *buflen = 0; 100 if (newlen > *buflen) { 121 *buflen = newlen; 145 getdelim(char **__restrict buf, size_t *__restrict buflen, 151 n = __getdelim(buf, buflen, sep, fp);
|
/external/grub/stage2/ |
md5.c | 154 int buflen = length & 63; local 156 if (buflen + inputlen < 64) 158 memcpy (buffer + buflen, input, inputlen); 159 buflen += inputlen; 163 memcpy (buffer + buflen, input, 64 - buflen); 165 input += 64 - buflen; 166 inputlen -= 64 - buflen; 174 buflen = inputlen; 180 int i, buflen = length & 63 local [all...] |
/external/chromium/third_party/libevent/ |
evutil.c | 224 evutil_snprintf(char *buf, size_t buflen, const char *format, ...) 229 r = evutil_vsnprintf(buf, buflen, format, ap); 235 evutil_vsnprintf(char *buf, size_t buflen, const char *format, va_list ap) 238 int r = _vsnprintf(buf, buflen, format, ap); 239 buf[buflen-1] = '\0'; 245 int r = vsnprintf(buf, buflen, format, ap); 246 buf[buflen-1] = '\0';
|
/external/ipsec-tools/src/libipsec/ |
ipsec_dump_policy.c | 99 size_t off, buflen; local 187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir]) 197 if ((buf = malloc(buflen)) == NULL) { 204 snprintf(buf, buflen, "%s %s %c %u %s", 210 snprintf(buf, buflen, "%s %s %s", 216 snprintf(buf, buflen, "%s %s", 221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir], 256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1; 257 newbuf = (char *)realloc(buf, buflen); 264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf) [all...] |
/external/dropbear/ |
random.c | 41 static void readrand(unsigned char* buf, unsigned int buflen); 53 static void readrand(unsigned char* buf, unsigned int buflen) { 87 if (buflen > 255) 90 egdcmd[1] = (unsigned char)buflen; 116 readlen = read(readfd, &buf[readpos], buflen - readpos); 124 } while (readpos < buflen);
|