HomeSort by relevance Sort by last modified time
    Searched refs:buflen (Results 26 - 50 of 368) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/ipsec-tools/src/racoon/
privsep.c 290 size_t *buflen; local
301 "corrupted privsep message (short buflen)\n");
309 data += combuf->bufs.buflen[i];
310 totallen += combuf->bufs.buflen[i];
345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0';
361 reply->bufs.buflen[0] = privkey->l;
392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0';
398 if (combuf->bufs.buflen[count] == 0)
401 [combuf->bufs.buflen[count] - 1] = '\0';
433 if (combuf->bufs.buflen[count] != sizeof(name))
    [all...]
  /external/dropbear/libtomcrypt/src/mac/pelican/
pelican.c 50 pelmac->buflen = 0;
107 if (pelmac->buflen < 0 || pelmac->buflen > 15) {
112 if (pelmac->buflen == 0) {
126 pelmac->state[pelmac->buflen++] ^= *in++;
127 if (pelmac->buflen == 16) {
129 pelmac->buflen = 0;
147 if (pelmac->buflen < 0 || pelmac->buflen > 16) {
151 if (pelmac->buflen == 16)
    [all...]
  /frameworks/av/media/libstagefright/
SkipCutBuffer.cpp 43 int32_t buflen = buffer->range_length(); local
48 int32_t to_drop = (buflen < mFrontPadding) ? buflen : mFrontPadding;
50 buflen -= to_drop;
51 buffer->set_range(offset, buflen);
58 write(src, buflen);
70 int32_t buflen = buffer->size(); local
75 int32_t to_drop = (buflen < mFrontPadding) ? buflen : mFrontPadding;
77 buflen -= to_drop
    [all...]
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/X11/extensions/
lbxzlib.h 55 extern int ZlibStuffInput ( int fd, unsigned char *buffer, int buflen );
58 extern int ZlibWrite ( int fd, unsigned char *buffer, int buflen );
60 extern int ZlibRead ( int fd, unsigned char *buffer, int buflen );
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/X11/extensions/
lbxzlib.h 55 extern int ZlibStuffInput ( int fd, unsigned char *buffer, int buflen );
58 extern int ZlibWrite ( int fd, unsigned char *buffer, int buflen );
60 extern int ZlibRead ( int fd, unsigned char *buffer, int buflen );
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/X11/extensions/
lbxzlib.h 55 extern int ZlibStuffInput ( int fd, unsigned char *buffer, int buflen );
58 extern int ZlibWrite ( int fd, unsigned char *buffer, int buflen );
60 extern int ZlibRead ( int fd, unsigned char *buffer, int buflen );
  /external/wpa_supplicant_8/src/ap/
ctrl_iface_ap.c 25 char *buf, size_t buflen)
36 ret = os_snprintf(buf + len, buflen - len, "connected_time=%u\n",
38 if (ret < 0 || (size_t) ret >= buflen - len)
48 char *buf, size_t buflen)
53 ret = os_snprintf(buf, buflen, "FAIL\n");
54 if (ret < 0 || (size_t) ret >= buflen)
60 ret = os_snprintf(buf + len, buflen - len, MACSTR "\n",
62 if (ret < 0 || (size_t) ret >= buflen - len)
66 res = ieee802_11_get_mib_sta(hapd, sta, buf + len, buflen - len);
69 res = wpa_get_mib_sta(sta->wpa_sm, buf + len, buflen - len)
    [all...]
  /bionic/libc/bionic/
ptsname_r.c 35 int ptsname_r( int fd, char* buf, size_t buflen)
52 if (len+1 > (int)buflen) {
  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_process.c 44 if (gcm->buflen > 16 || gcm->buflen < 0) {
55 if (gcm->buflen) {
56 gcm->totlen += gcm->buflen * CONST64(8);
69 gcm->buflen = 0;
79 if (gcm->buflen == 0) {
122 if (gcm->buflen == 16) {
133 gcm->buflen = 0;
137 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen];
140 pt[x] = ct[x] ^ gcm->buf[gcm->buflen];
    [all...]
gcm_done.c 37 if (gcm->buflen > 16 || gcm->buflen < 0) {
51 if (gcm->buflen) {
52 gcm->pttotlen += gcm->buflen * CONST64(8);
gcm_reset.c 33 gcm->buflen = 0;
  /external/chromium/third_party/libjingle/source/talk/base/
stringutils.h 189 size_t strlenn(const CTYPE* buffer, size_t buflen) {
191 while (buffer[bufpos] && (bufpos < buflen)) {
201 size_t strcpyn(CTYPE* buffer, size_t buflen,
203 if (buflen <= 0)
207 srclen = strlenn(source, buflen - 1);
208 } else if (srclen >= buflen) {
209 srclen = buflen - 1;
217 size_t strcatn(CTYPE* buffer, size_t buflen,
219 if (buflen <= 0)
222 size_t bufpos = strlenn(buffer, buflen - 1)
    [all...]
stringutils.cc 87 size_t asccpyn(wchar_t* buffer, size_t buflen,
89 if (buflen <= 0)
93 srclen = strlenn(source, buflen - 1);
94 } else if (srclen >= buflen) {
95 srclen = buflen - 1;
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_decrypt_verify_memory.c 49 unsigned long buflen; local
81 buflen = taglen;
82 if ((err = eax_done(eax, buf, &buflen)) != CRYPT_OK) {
87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) {
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_done.c 38 (f9->buflen > f9->blocksize) || (f9->buflen < 0)) {
42 if (f9->buflen != 0) {
45 f9->buflen = 0;
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_done.c 38 (xcbc->buflen > xcbc->blocksize) || (xcbc->buflen < 0)) {
43 if (xcbc->buflen == xcbc->blocksize) {
49 xcbc->IV[xcbc->buflen] ^= 0x80;
  /external/wpa_supplicant_8/src/utils/
ip_addr.c 15 size_t buflen)
17 if (buflen == 0 || addr == NULL)
21 os_strlcpy(buf, inet_ntoa(addr->u.v4), buflen);
27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL)
ip_addr.h 24 size_t buflen);
  /external/wpa_supplicant_8/wpa_supplicant/
wifi_display.h 18 char *buf, size_t buflen);
ap.h 21 const char *pin, char *buf, size_t buflen,
30 char *buf, size_t buflen);
32 char *buf, size_t buflen);
34 char *buf, size_t buflen);
40 size_t buflen, int verbose);
  /bionic/libc/upstream-netbsd/libc/stdio/
getdelim.c 57 __getdelim(char **__restrict buf, size_t *__restrict buflen,
66 if (buf == NULL || buflen == NULL) {
73 *buflen = 0;
100 if (newlen > *buflen) {
121 *buflen = newlen;
145 getdelim(char **__restrict buf, size_t *__restrict buflen,
151 n = __getdelim(buf, buflen, sep, fp);
  /external/grub/stage2/
md5.c 154 int buflen = length & 63; local
156 if (buflen + inputlen < 64)
158 memcpy (buffer + buflen, input, inputlen);
159 buflen += inputlen;
163 memcpy (buffer + buflen, input, 64 - buflen);
165 input += 64 - buflen;
166 inputlen -= 64 - buflen;
174 buflen = inputlen;
180 int i, buflen = length & 63 local
    [all...]
  /external/chromium/third_party/libevent/
evutil.c 224 evutil_snprintf(char *buf, size_t buflen, const char *format, ...)
229 r = evutil_vsnprintf(buf, buflen, format, ap);
235 evutil_vsnprintf(char *buf, size_t buflen, const char *format, va_list ap)
238 int r = _vsnprintf(buf, buflen, format, ap);
239 buf[buflen-1] = '\0';
245 int r = vsnprintf(buf, buflen, format, ap);
246 buf[buflen-1] = '\0';
  /external/ipsec-tools/src/libipsec/
ipsec_dump_policy.c 99 size_t off, buflen; local
187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir])
197 if ((buf = malloc(buflen)) == NULL) {
204 snprintf(buf, buflen, "%s %s %c %u %s",
210 snprintf(buf, buflen, "%s %s %s",
216 snprintf(buf, buflen, "%s %s",
221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir],
256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1;
257 newbuf = (char *)realloc(buf, buflen);
264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf)
    [all...]
  /external/dropbear/
random.c 41 static void readrand(unsigned char* buf, unsigned int buflen);
53 static void readrand(unsigned char* buf, unsigned int buflen) {
87 if (buflen > 255)
90 egdcmd[1] = (unsigned char)buflen;
116 readlen = read(readfd, &buf[readpos], buflen - readpos);
124 } while (readpos < buflen);

Completed in 616 milliseconds

12 3 4 5 6 7 8 91011>>