/external/google-breakpad/src/third_party/libdisasm/ |
ia32_invariant.h | 6 size_t ia32_disasm_invariant( unsigned char *buf, size_t buf_len, 9 size_t ia32_disasm_size( unsigned char *buf, size_t buf_len );
|
x86_imm.h | 13 unsigned int x86_imm_sized( unsigned char *buf, size_t buf_len, void *dest, 16 unsigned int x86_imm_signsized( unsigned char *buf, size_t buf_len, void *dest,
|
ia32_operand.h | 7 size_t ia32_decode_operand( unsigned char *buf, size_t buf_len,
|
x86_disasm.c | 16 unsigned int x86_disasm( unsigned char *buf, unsigned int buf_len, 22 if ( ! buf || ! insn || ! buf_len ) { 36 if ( offset >= buf_len ) { 42 len = buf_len - offset; 77 unsigned int buf_len, size, count = 0, bytes = 0; local 79 /* buf_len is implied by the arguments */ 80 buf_len = len + offset; 83 size = x86_disasm( buf, buf_len, buf_rva, offset + bytes, 127 unsigned int x86_disasm_forward( unsigned char *buf, unsigned int buf_len, 137 while ( cont && bytes < buf_len ) { [all...] |
ia32_modrm.h | 7 size_t ia32_modrm_decode( unsigned char *buf, unsigned int buf_len,
|
x86_imm.c | 6 unsigned int x86_imm_signsized( unsigned char * buf, size_t buf_len, 13 if ( size > buf_len ) { 38 unsigned int x86_imm_sized( unsigned char * buf, size_t buf_len, void *dest, 45 if ( size > buf_len ) {
|
ia32_modrm.c | 69 static unsigned int imm32_signsized( unsigned char *buf, size_t buf_len, 71 if ( size > buf_len ) { 102 static size_t sib_decode( unsigned char *buf, size_t buf_len, x86_ea_t *ea, 112 if ( buf_len < 1 ) { 122 imm32_signsized( &buf[1], buf_len, &ea->disp, sizeof(int32_t)); 143 static size_t modrm_decode16( unsigned char *buf, unsigned int buf_len, 187 --buf_len; 190 imm32_signsized( buf, buf_len, &ea->disp, sizeof(char) ); 195 imm32_signsized( buf, buf_len, &ea->disp, sizeof(short) ); 208 size_t ia32_modrm_decode( unsigned char *buf, unsigned int buf_len, [all...] |
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
open_memstream.cc | 30 size_t buf_len; local 31 fprintf(stderr, " &buf %p, &buf_len %p\n", &buf, &buf_len); 32 FILE *fp = open_memstream(&buf, &buf_len); 37 check_mem_is_good(&buf_len, sizeof(buf_len)); 38 check_mem_is_good(buf, buf_len); 50 fprintf(stderr, " %p addr %p, len %zu\n", &buf, buf, buf_len); 52 check_mem_is_good(&buf_len, sizeof(buf_len)); [all...] |
/external/libbrillo/brillo/ |
userdb_utils.cc | 20 ssize_t buf_len = sysconf(_SC_GETPW_R_SIZE_MAX); local 21 if (buf_len < 0) 22 buf_len = 16384; // 16K should be enough?... 25 std::vector<char> buf(buf_len); 26 if (getpwnam_r(user.c_str(), &pwd_buf, buf.data(), buf_len, &pwd) || !pwd) { 39 ssize_t buf_len = sysconf(_SC_GETGR_R_SIZE_MAX); local 40 if (buf_len < 0) 41 buf_len = 16384; // 16K should be enough?... 44 std::vector<char> buf(buf_len); 45 if (getgrnam_r(group.c_str(), &grp_buf, buf.data(), buf_len, &grp) || !grp) [all...] |
/external/libunwind/src/ptrace/ |
_UPT_get_proc_name.c | 31 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 36 return _Uelf64_get_proc_name (as, ui->pid, ip, buf, buf_len, offp, arg); 38 return _Uelf32_get_proc_name (as, ui->pid, ip, buf, buf_len, offp, arg);
|
/external/google-breakpad/src/common/linux/ |
guid_creator.h | 46 bool GUIDToString(const GUID *guid, char *buf, int buf_len);
|
/external/google-breakpad/src/common/solaris/ |
guid_creator.h | 48 bool GUIDToString(const GUID *guid, char *buf, int buf_len);
|
/external/wpa_supplicant_8/src/crypto/ |
aes-eax.c | 33 size_t buf_len; local 39 buf_len = nonce_len; 41 buf_len = data_len; 42 if (hdr_len > buf_len) 43 buf_len = hdr_len; 44 buf_len += 16; 46 buf = os_malloc(buf_len); 74 bin_clear_free(buf, buf_len); 97 size_t buf_len; local 103 buf_len = nonce_len [all...] |
sha1-tprf.c | 23 * @buf_len: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 51 output_len[0] = (buf_len >> 8) & 0xff; 52 output_len[1] = buf_len & 0xff; 54 while (pos < buf_len) { 56 plen = buf_len - pos;
|
sha256-prf.c | 24 * @buf_len: Number of bytes of key to generate 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 34 buf_len * 8); 46 * @buf_len: Number of bits of key to generate 50 * given key. If the requested buf_len is not divisible by eight, the least 64 size_t buf_len = (buf_len_bits + 7) / 8; local 77 while (pos < buf_len) { 78 plen = buf_len - pos;
|
sha384-prf.c | 24 * @buf_len: Number of bytes of key to generate 30 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 32 sha384_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 44 * @buf_len: Number of bits of key to generate 47 * given key. If the requested buf_len is not divisible by eight, the least 61 size_t buf_len = (buf_len_bits + 7) / 8; local 74 while (pos < buf_len) { 75 plen = buf_len - pos;
|
/external/libunwind/src/coredump/ |
_UCD_get_proc_name.c | 34 char *buf, size_t buf_len, unw_word_t *offp) 52 ret = elf_w (get_proc_name_in_image) (as, &ui->edi.ei, segbase, mapoff, ip, buf, buf_len, offp); 59 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 64 return _Uelf64_CD_get_proc_name (ui, as, ip, buf, buf_len, offp); 66 return _Uelf32_CD_get_proc_name (ui, as, ip, buf, buf_len, offp);
|
/external/libunwind/src/mi/ |
Gget_proc_name.c | 31 unw_word_t addr, char *buf, size_t buf_len, void *arg) 36 for (i = 0; i < buf_len; ++i) 44 buf[buf_len - 1] = '\0'; /* ensure string is NUL terminated */ 50 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 69 ret = intern_string (as, a, di->u.pi.name_ptr, buf, buf_len, arg); 93 return (*a->get_proc_name) (as, ip, buf, buf_len, offp, arg); 99 unw_get_proc_name (unw_cursor_t *cursor, char *buf, size_t buf_len, 104 return get_proc_name (tdep_get_as (c), tdep_get_ip (c), buf, buf_len, offp, 111 size_t buf_len, unw_word_t *offp, void *as_arg) 113 return get_proc_name (as, ip, buf, buf_len, offp, as_arg) [all...] |
/external/ltp/lib/ |
get_path.c | 57 int tst_get_path(const char *prog_name, char *buf, size_t buf_len) 71 snprintf(buf, MIN(buf_len, (size_t) (end - start + 1)), 74 snprintf(buf, buf_len, "%s", start); 83 snprintf(buf, buf_len, "."); 92 snprintf(buf + size, buf_len - size, "/%s", 96 snprintf(buf + size, buf_len - size, "%s", 99 if (buf_len - size > ret && file_exist(buf))
|
/bionic/libc/bionic/ |
strerror_r.cpp | 52 int strerror_r(int error_number, char* buf, size_t buf_len) { 58 length = strlcpy(buf, error_name, buf_len); 60 length = __libc_format_buffer(buf, buf_len, "Unknown error %d", error_number); 62 if (length >= buf_len) { 70 extern "C" char* __gnu_strerror_r(int error_number, char* buf, size_t buf_len) { 72 strerror_r(error_number, buf, buf_len); 76 extern "C" __LIBC_HIDDEN__ const char* __strsignal(int signal_number, char* buf, size_t buf_len) { 87 size_t length = snprintf(buf, buf_len, "%s signal %d", prefix, signal_number); 88 if (length >= buf_len) {
|
/cts/hostsidetests/security/securityPatch/CVE-2017-0577/ |
poc.c | 36 size_t buf_len = 0xfffff; local 37 char* buf = (char*) malloc(buf_len); 43 ret = write(fd, buf, buf_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_peap_common.h | 14 u8 *buf, size_t buf_len);
|
/external/openssh/ |
crypto_api.h | 19 #define randombytes(buf, buf_len) arc4random_buf((buf), (buf_len))
|
/external/boringssl/src/decrepit/bio/ |
base64_bio.c | 79 int buf_len; member in struct:b64_struct 138 ctx->buf_len = 0; 145 if (ctx->buf_len > 0) { 146 assert(ctx->buf_len >= ctx->buf_off); 147 i = ctx->buf_len - ctx->buf_off; 157 if (ctx->buf_len == ctx->buf_off) { 158 ctx->buf_len = 0; 282 ctx->buf_len = 0; 284 ctx->buf_len = z; 289 &ctx->buf_len, (uint8_t *)ctx->tmp, i) [all...] |
/external/ltp/testcases/kernel/sched/nptl/ |
nptl01.c | 72 void call_mutex_init(pthread_mutex_t * mutex, char *buf, size_t buf_len) 78 strerror_r(ret, buf, buf_len)); 82 void call_mutex_lock(pthread_mutex_t * mutex, char *buf, size_t buf_len) 88 strerror_r(ret, buf, buf_len)); 92 void call_mutex_unlock(pthread_mutex_t * mutex, char *buf, size_t buf_len) 98 strerror_r(ret, buf, buf_len)); 102 void call_cond_init(pthread_cond_t * cond, char *buf, size_t buf_len) 108 strerror_r(ret, buf, buf_len)); 113 char *buf, size_t buf_len) 119 strerror_r(ret, buf, buf_len)); [all...] |