/bionic/libc/netbsd/nameser/ |
ns_print.c | 64 char **buf, size_t *buflen); 67 char **buf, size_t *buflen); 68 static void addlen(size_t len, char **buf, size_t *buflen); 70 char **buf, size_t *buflen); 72 char **buf, size_t *buflen); 86 * ns_sprintrr(handle, rr, name_ctx, origin, buf, buflen) 94 char *buf, size_t buflen) 101 name_ctx, origin, buf, buflen); 108 * name_ctx, origin, buf, buflen) 118 char *buf, size_t buflen) 170 addlen(strlen(buf), &buf, &buflen); local 338 addlen(strlen(buf), &buf, &buflen); local 429 addlen(strlen(buf), &buf, &buflen); local 671 addlen(strlen(buf), &buf, &buflen); local 694 addlen(strlen(buf), &buf, &buflen); local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ctrl_iface_ap.h | 13 char *buf, size_t buflen); 15 char *buf, size_t buflen); 17 char *buf, size_t buflen);
|
ctrl_iface_ap.c | 25 char *buf, size_t buflen) 36 ret = os_snprintf(buf + len, buflen - len, "connected_time=%u\n", 38 if (ret < 0 || (size_t) ret >= buflen - len) 48 char *buf, size_t buflen) 53 ret = os_snprintf(buf, buflen, "FAIL\n"); 54 if (ret < 0 || (size_t) ret >= buflen) 60 ret = os_snprintf(buf + len, buflen - len, MACSTR "\n", 62 if (ret < 0 || (size_t) ret >= buflen - len) 66 res = ieee802_11_get_mib_sta(hapd, sta, buf + len, buflen - len); 69 res = wpa_get_mib_sta(sta->wpa_sm, buf + len, buflen - len) [all...] |
p2p_hostapd.h | 15 char *buf, size_t buflen); 26 char *buf, size_t buflen)
|
/external/jhead/ |
main.c | 510 static int addKeyValueString(char** buf, int bufLen, const char* key, const char* value) { 519 if (newLen >= bufLen) { 521 bufLen = newLen + 5; 522 ALOGE("reallocing to %d", bufLen); 524 bufLen = newLen + 500; 526 *buf = realloc(*buf, bufLen); 532 snprintf(*buf + strlen(*buf), bufLen, "%s%s%s", key, valueLen, value); 537 return bufLen; 541 static int addKeyValueInt(char** buf, int bufLen, const char* key, int value) { 545 return addKeyValueString(buf, bufLen, key, valueStr) [all...] |
/external/clang/test/SemaCXX/ |
PR5086-ambig-resolution-enum.cpp | 12 enum {BUFLEN = 128 }; 13 const char *p = rc.fun1(BUFLEN - 2, C::e1);
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_process.c | 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || 40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { 45 if (omac->buflen == 0 && inlen > 16) { 62 if (omac->buflen == omac->blklen) { 69 omac->buflen = 0; 73 n = MIN(inlen, (unsigned long)(omac->blklen - omac->buflen)); 74 XMEMCPY(omac->block + omac->buflen, in, n); 75 omac->buflen += n;
|
omac_done.c | 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || 40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { 45 if (omac->buflen != omac->blklen) { 47 omac->block[omac->buflen++] = 0x80; 50 while (omac->buflen < omac->blklen) { 51 omac->block[omac->buflen++] = 0x00;
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_add_aad.c | 41 if (gcm->buflen > 16 || gcm->buflen < 0) { 52 if (gcm->ivmode || gcm->buflen != 12) { 53 for (x = 0; x < (unsigned long)gcm->buflen; x++) { 56 if (gcm->buflen) { 57 gcm->totlen += gcm->buflen * CONST64(8); 81 gcm->buflen = 0; 86 if (gcm->mode != GCM_MODE_AAD || gcm->buflen >= 16) { 92 if (gcm->buflen == 0) { 107 gcm->X[gcm->buflen++] ^= *adata++ [all...] |
gcm_add_iv.c | 43 if (gcm->buflen >= 16 || gcm->buflen < 0) { 53 if (IVlen + gcm->buflen > 12) { 59 if (gcm->buflen == 0) { 73 gcm->buf[gcm->buflen++] = *IV++; 75 if (gcm->buflen == 16) { 81 gcm->buflen = 0;
|
gcm_done.c | 37 if (gcm->buflen > 16 || gcm->buflen < 0) { 51 if (gcm->buflen) { 52 gcm->pttotlen += gcm->buflen * CONST64(8);
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican.c | 50 pelmac->buflen = 0; 107 if (pelmac->buflen < 0 || pelmac->buflen > 15) { 112 if (pelmac->buflen == 0) { 126 pelmac->state[pelmac->buflen++] ^= *in++; 127 if (pelmac->buflen == 16) { 129 pelmac->buflen = 0; 147 if (pelmac->buflen < 0 || pelmac->buflen > 16) { 151 if (pelmac->buflen == 16) [all...] |
/external/bison/lib/ |
strerror_r.c | 37 extern int __xpg_strerror_r (int errnum, char *buf, size_t buflen); 96 local_snprintf (char *buf, size_t buflen, const char *format, ...) 102 result = _vsnprintf (buf, buflen, format, args); 104 if (buflen > 0 && (result < 0 || result >= buflen)) 105 buf[buflen - 1] = '\0'; 112 Return 0 if MSG fit in BUFLEN, otherwise return ERANGE. */ 114 safe_copy (char *buf, size_t buflen, const char *msg) 119 if (len < buflen) 128 memcpy (buf, msg, buflen - 1) [all...] |
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_process.c | 42 (xcbc->buflen > xcbc->blocksize) || (xcbc->buflen < 0)) { 47 if (xcbc->buflen == 0) { 60 if (xcbc->buflen == xcbc->blocksize) { 62 xcbc->buflen = 0; 64 xcbc->IV[xcbc->buflen++] ^= *in++;
|
/external/chromium_org/android_webview/javatests/src/org/chromium/android_webview/test/util/ |
VideoTestWebServer.java | 77 int buflen = 128; local 78 byte[] buffer = new byte[buflen]; 79 int len = in.read(buffer, 0, buflen); 82 if (len < buflen) break; 83 len = in.read(buffer, 0, buflen);
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_done.c | 30 if ((state->buflen > (int)sizeof(state->block)) || (state->buflen < 0) || 31 (state->block_len > (int)sizeof(state->block)) || (state->buflen > state->block_len)) { 38 if (state->buflen == state->block_len) { 45 for (x = 0; x < state->buflen; x++) {
|
pmac_process.c | 40 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || 41 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { 46 if (pmac->buflen == 0 && inlen > 16) { 67 if (pmac->buflen == pmac->block_len) { 78 pmac->buflen = 0; 82 n = MIN(inlen, (unsigned long)(pmac->block_len - pmac->buflen)); 83 XMEMCPY(pmac->block + pmac->buflen, in, n); 84 pmac->buflen += n;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ap.h | 21 const char *pin, char *buf, size_t buflen, 30 char *buf, size_t buflen); 32 char *buf, size_t buflen); 34 char *buf, size_t buflen); 40 size_t buflen, int verbose);
|
main_winsvc.c | 67 DWORD buflen, val; local 81 buflen = sizeof(ctrl_interface); 83 (LPBYTE) ctrl_interface, &buflen); 88 (int) buflen, (char *) ctrl_interface); 92 buflen = sizeof(adapter); 94 (LPBYTE) adapter, &buflen); 99 (int) buflen, (char *) adapter); 103 buflen = sizeof(config); 105 (LPBYTE) config, &buflen); 110 (int) buflen, (char *) config) 140 DWORD val, buflen, i; local [all...] |
/external/ipsec-tools/src/racoon/ |
privsep.c | 290 size_t *buflen; local 301 "corrupted privsep message (short buflen)\n"); 309 data += combuf->bufs.buflen[i]; 310 totallen += combuf->bufs.buflen[i]; 345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; 361 reply->bufs.buflen[0] = privkey->l; 392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; 398 if (combuf->bufs.buflen[count] == 0) 401 [combuf->bufs.buflen[count] - 1] = '\0'; 433 if (combuf->bufs.buflen[count] != sizeof(name)) [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
stringencode.cc | 43 size_t escape(char * buffer, size_t buflen, 47 if (buflen <= 0) 51 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { 54 if (bufpos + 2 >= buflen) 65 size_t unescape(char * buffer, size_t buflen, 69 if (buflen <= 0) 73 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { 84 size_t encode(char * buffer, size_t buflen, 88 if (buflen <= 0) 92 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_process.c | 39 (f9->buflen > f9->blocksize) || (f9->buflen < 0)) { 44 if (f9->buflen == 0) { 60 if (f9->buflen == f9->blocksize) { 65 f9->buflen = 0; 67 f9->IV[f9->buflen++] ^= *in++;
|
/bionic/libc/netbsd/resolv/ |
__res_send.c | 31 res_send(const u_char *buf, int buflen, u_char *ans, int anssiz) 34 return __res_send(buf, buflen, ans, anssiz);
|
/external/chromium/third_party/libjingle/source/talk/base/ |
stringutils.h | 189 size_t strlenn(const CTYPE* buffer, size_t buflen) { 191 while (buffer[bufpos] && (bufpos < buflen)) { 201 size_t strcpyn(CTYPE* buffer, size_t buflen, 203 if (buflen <= 0) 207 srclen = strlenn(source, buflen - 1); 208 } else if (srclen >= buflen) { 209 srclen = buflen - 1; 217 size_t strcatn(CTYPE* buffer, size_t buflen, 219 if (buflen <= 0) 222 size_t bufpos = strlenn(buffer, buflen - 1) [all...] |
/external/icu4c/samples/datefmt/ |
util.cpp | 53 // int32_t bufLen = str.extract(0, len, buf); // Preflight 56 int32_t bufLen = len + 16; 58 buf = new char[bufLen + 1]; 59 actualLen = str.extract(0, len, buf/*, bufLen*/); // Default codepage conversion
|