/hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib/ |
driver_cmd_nl80211.c | 68 size_t buf_len ) 87 ret = os_snprintf(buf, buf_len, 96 priv_cmd.used_len = buf_len; 97 priv_cmd.total_len = buf_len; 129 wpa_printf(MSG_DEBUG, "%s %s len = %d, %zu", __func__, buf, ret, buf_len);
|
/external/google-breakpad/src/common/linux/ |
guid_creator.cc | 92 bool GUIDToString(const GUID *guid, char *buf, int buf_len) { 94 assert(buf_len > kGUIDStringLength); 95 int num = snprintf(buf, buf_len, kGUIDFormatString,
|
/bionic/libc/bionic/ |
mntent.cpp | 43 mntent* getmntent_r(FILE* fp, struct mntent* e, char* buf, int buf_len) { 45 while (fgets(buf, buf_len, fp) != NULL) {
|
/external/wpa_supplicant_8/src/crypto/ |
tls_none.c | 192 int tls_get_library_version(char *buf, size_t buf_len) 194 return os_snprintf(buf, buf_len, "none");
|
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 113 const u8 *buf, size_t buf_len) 116 if (buf_len < 2 + 2 * MSCHAPV2_AUTH_RESPONSE_LEN ||
|
/external/boringssl/src/crypto/evp/ |
p_dsa_asn1.c | 365 size_t buf_len = 0; local 387 update_buflen(x->p, &buf_len); 388 update_buflen(x->q, &buf_len); 389 update_buflen(x->g, &buf_len); 390 update_buflen(priv_key, &buf_len); 391 update_buflen(pub_key, &buf_len); 393 m = (uint8_t *)OPENSSL_malloc(buf_len + 10); 482 size_t buf_len = 0; local 485 update_buflen(dsa_sig->r, &buf_len); 486 update_buflen(dsa_sig->s, &buf_len); [all...] |
p_rsa_asn1.c | 192 size_t buf_len = 0; local 194 update_buflen(rsa->n, &buf_len); 195 update_buflen(rsa->e, &buf_len); 198 update_buflen(rsa->d, &buf_len); 199 update_buflen(rsa->p, &buf_len); 200 update_buflen(rsa->q, &buf_len); 201 update_buflen(rsa->dmp1, &buf_len); 202 update_buflen(rsa->dmq1, &buf_len); 203 update_buflen(rsa->iqmp, &buf_len); 212 update_buflen(ap->prime, &buf_len); [all...] |
/external/google-breakpad/src/third_party/libdisasm/swig/ |
libdisasm_oop.i | 48 (unsigned char *buf, size_t buf_len) 840 size_t x86_invariant_disasm( unsigned char *buf, int buf_len, 842 size_t x86_size_disasm( unsigned char *buf, unsigned int buf_len ); 843 int x86_disasm( unsigned char *buf, unsigned int buf_len, 849 int x86_disasm_forward( unsigned char *buf, unsigned int buf_len, 940 x86_insn_t * disasm( unsigned char *buf, size_t buf_len, 943 x86_disasm( buf, buf_len, buf_rva, offset, insn ); 947 int disasm_range( unsigned char *buf, size_t buf_len, 953 if ( len > buf_len ) { 954 len = buf_len; [all...] |
/external/libmicrohttpd/src/examples/ |
demo.c | 236 size_t buf_len; member in struct:ResponseDataContext 239 * Current position where we append to 'buf'. Must be smaller or equal to 'buf_len'. 277 if (rdc->off + 1024 > rdc->buf_len) 281 if ( (2 * rdc->buf_len + 1024) < rdc->buf_len) 283 rdc->buf_len = 2 * rdc->buf_len + 1024; 284 if (NULL == (r = realloc (rdc->buf, rdc->buf_len))) 289 rdc->buf_len - rdc->off, 315 rdc.buf_len = initial_allocation [all...] |
demo_https.c | 237 size_t buf_len; member in struct:ResponseDataContext 240 * Current position where we append to 'buf'. Must be smaller or equal to 'buf_len'. 278 if (rdc->off + 1024 > rdc->buf_len) 282 if ( (2 * rdc->buf_len + 1024) < rdc->buf_len) 284 rdc->buf_len = 2 * rdc->buf_len + 1024; 285 if (NULL == (r = realloc (rdc->buf, rdc->buf_len))) 290 rdc->buf_len - rdc->off, 316 rdc.buf_len = initial_allocation [all...] |
/external/selinux/policycoreutils/restorecond/ |
watch.c | 26 #define BUF_LEN (1024 * (EVENT_SIZE + 16)) 167 char buf[BUF_LEN]; 171 len = read(fd, buf, BUF_LEN); 180 /* BUF_LEN too small? */
|
/external/wpa_supplicant_8/wpa_supplicant/ |
hs20_supplicant.h | 43 char *reply, size_t buf_len);
|
p2p_supplicant_sd.c | 102 static int p2p_sd_dns_uncompress(char *buf, size_t buf_len, const u8 *msg, 112 if (buf_len < 2) 129 uend = buf + buf_len; 699 size_t buf_len; local 704 buf_len = 2 * tlvs_len + 1; 705 buf = os_malloc(buf_len); 707 wpa_snprintf_hex(buf, buf_len, tlvs, tlvs_len); 826 size_t buf_len; local 854 buf_len = WPA_GET_LE16(pos); 858 if (buf_len > (unsigned int) (tlv_end - pos) 896 size_t buf_len; local [all...] |
/prebuilts/gdb/darwin-x86/include/python2.7/ |
pystrtod.h | 13 PyAPI_FUNC(char *) PyOS_ascii_formatd(char *buffer, size_t buf_len,
|
/prebuilts/gdb/linux-x86/include/python2.7/ |
pystrtod.h | 13 PyAPI_FUNC(char *) PyOS_ascii_formatd(char *buffer, size_t buf_len,
|
/prebuilts/python/darwin-x86/2.7.5/include/python2.7/ |
pystrtod.h | 13 PyAPI_FUNC(char *) PyOS_ascii_formatd(char *buffer, size_t buf_len,
|
/prebuilts/python/linux-x86/2.7.5/include/python2.7/ |
pystrtod.h | 13 PyAPI_FUNC(char *) PyOS_ascii_formatd(char *buffer, size_t buf_len,
|
/external/boringssl/src/crypto/cipher/ |
cipher.c | 238 ctx->buf_len = 0; 273 if (ctx->buf_len == 0 && (in_len & ctx->block_mask) == 0) { 283 i = ctx->buf_len; 289 ctx->buf_len += in_len; 319 ctx->buf_len = i; 344 bl = ctx->buf_len; 409 if (b > 1 && !ctx->buf_len) { 441 if (ctx->buf_len) { 450 if (ctx->buf_len || !ctx->final_used) {
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_cmd_wext.c | 131 static int wpa_driver_wext_set_cscan_params(char *buf, size_t buf_len, char *cmd) 160 if ((size_t)(bp + 12) >= buf_len) 281 int wpa_driver_wext_driver_cmd( void *priv, char *cmd, char *buf, size_t buf_len ) 288 wpa_printf(MSG_DEBUG, "%s %s len = %d", __func__, cmd, buf_len); 325 iwr.u.data.length = buf_len; 330 iwr.u.data.length = wpa_driver_wext_set_cscan_params(buf, buf_len, cmd);
|
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
socket.py | 362 buf_len = buf.tell() 363 if buf_len >= size: 373 left = size - buf_len 388 if n == size and not buf_len: 401 buf_len += n 403 #assert buf_len == buf.tell() 466 buf_len = buf.tell() 467 if buf_len >= size: 483 left = size - buf_len 490 if buf_len [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
socket.py | 362 buf_len = buf.tell() 363 if buf_len >= size: 373 left = size - buf_len 388 if n == size and not buf_len: 401 buf_len += n 403 #assert buf_len == buf.tell() 466 buf_len = buf.tell() 467 if buf_len >= size: 483 left = size - buf_len 490 if buf_len [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
socket.py | 362 buf_len = buf.tell() 363 if buf_len >= size: 373 left = size - buf_len 388 if n == size and not buf_len: 401 buf_len += n 403 #assert buf_len == buf.tell() 466 buf_len = buf.tell() 467 if buf_len >= size: 483 left = size - buf_len 490 if buf_len [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
socket.py | 362 buf_len = buf.tell() 363 if buf_len >= size: 373 left = size - buf_len 388 if n == size and not buf_len: 401 buf_len += n 403 #assert buf_len == buf.tell() 466 buf_len = buf.tell() 467 if buf_len >= size: 483 left = size - buf_len 490 if buf_len [all...] |
/external/fio/ |
server.h | 145 uint32_t buf_len; member in struct:cmd_job_pdu 168 uint32_t buf_len; member in struct:cmd_text_pdu
|
/external/harfbuzz_ng/src/ |
hb-buffer-deserialize-json.rl | 102 unsigned int buf_len, 106 const char *p = buf, *pe = buf + buf_len;
|