/external/google-breakpad/src/processor/ |
cfi_frame_info.cc | 144 size_t token_len = strlen(token); 145 if (token_len >= 1 && token[token_len - 1] == ':') { 147 if (token_len < 2) return false; 152 name_.assign(token, token_len - 1); 156 assert(token_len > 0); // strtok_r guarantees this, I think.
|
/external/wpa_supplicant_8/src/common/ |
sae.h | 66 const u8 **token, size_t *token_len, int *allowed_groups);
|
sae.c | 926 size_t *token_len) 934 if (token_len) 935 *token_len = tlen; 940 if (token_len) 941 *token_len = 0; 1097 const u8 **token, size_t *token_len, int *allowed_groups) 1111 sae_parse_commit_token(sae, &pos, end, token, token_len); [all...] |
/external/syslinux/com32/hdt/ |
hdt-cli.c | 328 int argc_iter = 0, args_pos = 0, token_found = 0, token_len = 0; local 356 token_len = (int)(strchr(pch + 1, '\0') - pch); 357 args_len = token_len; 359 token_len = (int)(tmp_pch_next - pch); 365 *command = malloc((token_len + 1) * sizeof(char)); 366 strlcpy(*command, pch, token_len); 367 (*command)[token_len] = '\0'; 372 *module = malloc((token_len + 1) * sizeof(char)); 373 strlcpy(*module, pch, token_len); 374 (*module)[token_len] = '\0' [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 456 const u8 *token, size_t token_len) 460 if (token_len != SHA256_MAC_LEN) 801 size_t token_len = 0; local 873 &token_len, hapd->conf->sae_groups); 880 if (token && check_sae_token(hapd, sta->addr, token, token_len) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 5027 long int token_len; local [all...] |