/external/wpa_supplicant_8/src/ap/ |
D | ctrl_iface_ap.c | 29 static size_t hostapd_write_ht_mcs_bitmask(char *buf, size_t buflen, in hostapd_write_ht_mcs_bitmask() argument 35 ret = os_snprintf(buf + len, buflen - len, in hostapd_write_ht_mcs_bitmask() 37 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask() 42 len += wpa_snprintf_hex(buf + len, buflen - len, mcs_set, 10); in hostapd_write_ht_mcs_bitmask() 44 ret = os_snprintf(buf + len, buflen - len, "\n"); in hostapd_write_ht_mcs_bitmask() 45 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask() 55 char *buf, size_t buflen) in hostapd_get_sta_tx_rx() argument 64 ret = os_snprintf(buf, buflen, "rx_packets=%lu\ntx_packets=%lu\n" in hostapd_get_sta_tx_rx() 70 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_tx_rx() 74 ret = os_snprintf(buf + len, buflen - len, "rx_rate_info=%lu", in hostapd_get_sta_tx_rx() [all …]
|
D | ctrl_iface_ap.h | 13 char *buf, size_t buflen); 15 char *buf, size_t buflen); 17 char *buf, size_t buflen); 24 char *buf, size_t buflen); 28 size_t buflen);
|
/external/wpa_supplicant_8/src/fst/ |
D | fst_ctrl_iface.c | 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 183 return os_snprintf(buf, buflen, "FAIL\n"); in session_get() 191 return os_snprintf(buf, buflen, in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 222 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 226 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 241 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set() 249 static int session_add(const char *group_id, char *buf, size_t buflen) in session_add() argument 258 return os_snprintf(buf, buflen, "FAIL\n"); in session_add() [all …]
|
/external/webrtc/webrtc/base/ |
D | stringencode.cc | 26 size_t escape(char * buffer, size_t buflen, in escape() argument 30 if (buflen <= 0) in escape() 34 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in escape() 37 if (bufpos + 2 >= buflen) in escape() 48 size_t unescape(char * buffer, size_t buflen, in unescape() argument 52 if (buflen <= 0) in unescape() 56 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in unescape() 67 size_t encode(char * buffer, size_t buflen, in encode() argument 71 if (buflen <= 0) in encode() 75 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in encode() [all …]
|
D | stringencode.h | 28 size_t utf8_encode(char* buffer, size_t buflen, unsigned long value); 35 size_t escape(char * buffer, size_t buflen, 39 size_t unescape(char * buffer, size_t buflen, 47 size_t encode(char * buffer, size_t buflen, 51 size_t decode(char * buffer, size_t buflen, 61 size_t url_encode(char * buffer, size_t buflen, 64 size_t url_decode(char * buffer, size_t buflen, 68 size_t html_encode(char * buffer, size_t buflen, 71 size_t html_decode(char * buffer, size_t buflen, 75 size_t xml_encode(char * buffer, size_t buflen, [all …]
|
D | stringutils.h | 169 size_t strlenn(const CTYPE* buffer, size_t buflen) { in strlenn() argument 171 while (buffer[bufpos] && (bufpos < buflen)) { in strlenn() 181 size_t strcpyn(CTYPE* buffer, size_t buflen, 183 if (buflen <= 0) 187 srclen = strlenn(source, buflen - 1); 188 } else if (srclen >= buflen) { 189 srclen = buflen - 1; 197 size_t strcatn(CTYPE* buffer, size_t buflen, 199 if (buflen <= 0) 202 size_t bufpos = strlenn(buffer, buflen - 1); [all …]
|
/external/ipsec-tools/src/racoon/ |
D | privsep.c | 290 size_t *buflen; in privsep_init() local 309 data += combuf->bufs.buflen[i]; in privsep_init() 310 totallen += combuf->bufs.buflen[i]; in privsep_init() 345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 361 reply->bufs.buflen[0] = privkey->l; in privsep_init() 392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 398 if (combuf->bufs.buflen[count] == 0) in privsep_init() 401 [combuf->bufs.buflen[count] - 1] = '\0'; in privsep_init() 433 if (combuf->bufs.buflen[count] != sizeof(name)) { in privsep_init() 440 for (i = 0; combuf->bufs.buflen[count]; count++) in privsep_init() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | main_winsvc.c | 67 DWORD buflen, val; in read_interface() local 81 buflen = sizeof(ctrl_interface); in read_interface() 83 (LPBYTE) ctrl_interface, &buflen); in read_interface() 88 (int) buflen, (char *) ctrl_interface); in read_interface() 92 buflen = sizeof(adapter); in read_interface() 94 (LPBYTE) adapter, &buflen); in read_interface() 99 (int) buflen, (char *) adapter); in read_interface() 103 buflen = sizeof(config); in read_interface() 105 (LPBYTE) config, &buflen); in read_interface() 110 (int) buflen, (char *) config); in read_interface() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | wpa_debug.c | 132 ssize_t buflen; in wpa_debug_open_linux_tracing() local 141 buflen = read(mounts, buf, sizeof(buf) - 1); in wpa_debug_open_linux_tracing() 143 if (buflen < 0) { in wpa_debug_open_linux_tracing() 641 int buflen; in wpa_msg() local 646 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg() 649 buf = os_malloc(buflen); in wpa_msg() 666 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg() 671 bin_clear_free(buf, buflen); in wpa_msg() 679 int buflen; in wpa_msg_ctrl() local 686 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_ctrl() [all …]
|
/external/dtc/tests/ |
D | get_path.c | 32 static void check_path_buf(void *fdt, const char *path, int pathlen, int buflen) in check_path_buf() argument 35 char buf[buflen+1]; in check_path_buf() 44 len = fdt_get_path(fdt, offset, buf, buflen); in check_path_buf() 47 if (buflen <= pathlen) { in check_path_buf() 50 "insufficient buffer space", buflen, len); in check_path_buf() 53 FAIL("fdt_get_path([%d bytes]): %s", buflen, in check_path_buf() 57 "instead of 0", buflen, len); in check_path_buf() 60 "instead of \"%s\"", buflen, buf, path); in check_path_buf() 63 if (buf[buflen] != POISON) in check_path_buf() 64 FAIL("fdt_get_path([%d bytes]) overran buffer", buflen); in check_path_buf()
|
/external/ltp/utils/sctp/func_tests/ |
D | test_sctp_sendrecvmsg.c | 87 size_t buflen; in main() local 175 buflen = REALLY_BIG; in main() 176 big_buffer = test_malloc(buflen); in main() 179 error = test_sctp_recvmsg(sk2, big_buffer, buflen, in main() 199 buflen = REALLY_BIG; in main() 202 error = test_sctp_recvmsg(sk1, big_buffer, buflen, in main() 213 buflen = REALLY_BIG; in main() 216 error = test_sctp_recvmsg(sk2, big_buffer, buflen, in main() 275 buflen = REALLY_BIG; in main() 278 test_sctp_recvmsg(sk2, big_buffer, buflen, in main() [all …]
|
/external/curl/src/ |
D | tool_getpass.c | 68 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 90 &iosb, 0, 0, buffer, buflen, 0, 0, in getpass_r() 109 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 114 for(i = 0; i < buflen; i++) { in getpass_r() 131 if(i == buflen) in getpass_r() 132 buffer[buflen-1] = '\0'; in getpass_r() 142 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 144 return getpassword(prompt, buffer, buflen); in getpass_r() 147 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 169 } while((buffer[i-1] != 13) && (i < buflen)); in getpass_r() [all …]
|
/external/libpcap/ |
D | bpf_filter.c | 120 u_int wirelen, u_int buflen, const struct bpf_aux_data *aux_data) in bpf_filter_with_aux_data() argument 148 if (k > buflen || sizeof(int32_t) > buflen - k) { in bpf_filter_with_aux_data() 156 if (k > buflen || sizeof(int16_t) > buflen - k) { in bpf_filter_with_aux_data() 180 if (k >= buflen) { in bpf_filter_with_aux_data() 198 if (pc->k > buflen || X > buflen - pc->k || in bpf_filter_with_aux_data() 199 sizeof(int32_t) > buflen - k) { in bpf_filter_with_aux_data() 207 if (X > buflen || pc->k > buflen - X || in bpf_filter_with_aux_data() 208 sizeof(int16_t) > buflen - k) { in bpf_filter_with_aux_data() 216 if (pc->k >= buflen || X >= buflen - pc->k) { in bpf_filter_with_aux_data() 224 if (k >= buflen) { in bpf_filter_with_aux_data() [all …]
|
/external/jemalloc/test/src/ |
D | timer.c | 30 timer_ratio(timedelta_t *a, timedelta_t *b, char *buf, size_t buflen) in timer_ratio() argument 39 n = malloc_snprintf(&buf[i], buflen-i, "%"FMTu64, t0 / t1); in timer_ratio() 41 if (i >= buflen) in timer_ratio() 48 n = malloc_snprintf(&buf[i], buflen-i, "."); in timer_ratio() 52 while (i < buflen-1) { in timer_ratio() 53 uint64_t round = (i+1 == buflen-1 && ((t0 * mult * 10 / t1) % 10 in timer_ratio() 55 n = malloc_snprintf(&buf[i], buflen-i, in timer_ratio()
|
/external/jemalloc_new/test/src/ |
D | timer.c | 25 timer_ratio(timedelta_t *a, timedelta_t *b, char *buf, size_t buflen) { in timer_ratio() argument 33 n = malloc_snprintf(&buf[i], buflen-i, "%"FMTu64, t0 / t1); in timer_ratio() 35 if (i >= buflen) { in timer_ratio() 44 n = malloc_snprintf(&buf[i], buflen-i, "."); in timer_ratio() 48 while (i < buflen-1) { in timer_ratio() 49 uint64_t round = (i+1 == buflen-1 && ((t0 * mult * 10 / t1) % 10 in timer_ratio() 51 n = malloc_snprintf(&buf[i], buflen-i, in timer_ratio()
|
/external/boringssl/src/crypto/fipsmodule/ecdh/ |
D | ecdh.c | 95 size_t buflen; in ECDH_compute_key_fips() local 97 !ec_point_get_affine_coordinate_bytes(group, buf, NULL, &buflen, in ECDH_compute_key_fips() 105 SHA224(buf, buflen, out); in ECDH_compute_key_fips() 108 SHA256(buf, buflen, out); in ECDH_compute_key_fips() 111 SHA384(buf, buflen, out); in ECDH_compute_key_fips() 114 SHA512(buf, buflen, out); in ECDH_compute_key_fips()
|
/external/pdfium/fpdfsdk/ |
D | fpdf_structtree.cpp | 27 unsigned long buflen) { in WideStringToBuffer() argument 33 if (buffer && len <= buflen) in WideStringToBuffer() 78 unsigned long buflen) { in FPDF_StructElement_GetAltText() argument 82 buffer, buflen) in FPDF_StructElement_GetAltText() 97 unsigned long buflen) { in FPDF_StructElement_GetType() argument 99 return elem ? WideStringToBuffer(elem->GetType().UTF8Decode(), buffer, buflen) in FPDF_StructElement_GetType() 106 unsigned long buflen) { in FPDF_StructElement_GetTitle() argument 109 ? WideStringToBuffer(elem->GetTitle().UTF8Decode(), buffer, buflen) in FPDF_StructElement_GetTitle()
|
/external/ppp/pppd/ |
D | utils.c | 129 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() argument 138 int buflen; in slprintf() local 142 buflen = va_arg(args, int); in slprintf() 145 n = vslprintf(buf, buflen, fmt, args); in slprintf() 153 #define OUTCHAR(c) (buflen > 0? (--buflen, *buf++ = (c)): 0) 156 vslprintf(buf, buflen, fmt, args) in vslprintf() argument 158 int buflen; 175 --buflen; 176 while (buflen > 0) { 181 if (len > buflen) [all …]
|
/external/ltp/testcases/kernel/syscalls/sendto/ |
D | sendto01.c | 59 int buflen; /* send's 3rd argument */ member 85 .buflen = sizeof(buf), 99 .buflen = sizeof(buf), 115 .buflen = sizeof(buf), 130 .buflen = sizeof(buf), 144 .buflen = sizeof(buf), 158 .buflen = sizeof(buf), 174 .buflen = sizeof(buf), 189 .buflen = sizeof(bigbuf), 203 .buflen = sizeof(buf), [all …]
|
/external/ltp/testcases/kernel/fs/doio/ |
D | pattern.c | 40 int pattern_check(char *buf, int buflen, char *pat, int patlen, int patshift) in pattern_check() argument 49 nleft = buflen; in pattern_check() 88 while (ncmp < buflen) { in pattern_check() 101 int pattern_fill(char *buf, int buflen, char *pat, int patlen, int patshift) in pattern_fill() argument 110 nleft = buflen; in pattern_fill() 147 while (ncopied < buflen) { in pattern_fill()
|
/external/tcpdump/ |
D | print-bgp.c | 531 const u_char *pptr, u_int itemlen, char *buf, u_int buflen) in decode_prefix4() argument 552 snprintf(buf, buflen, "%s/%d", ipaddr_string(ndo, &addr), plen); in decode_prefix4() 564 const u_char *pptr, u_int itemlen, char *buf, u_int buflen) in decode_labeled_prefix4() argument 601 snprintf(buf, buflen, "%s/%d, label:%u %s", in decode_labeled_prefix4() 670 const u_char *pptr, char *buf, u_int buflen) in bgp_vpn_sg_print() argument 686 snprintf(buf + offset, buflen - offset, ", Source %s", in bgp_vpn_sg_print() 700 snprintf(buf + offset, buflen - offset, ", Group %s", in bgp_vpn_sg_print() 755 const u_char *pptr, char *buf, u_int buflen) in decode_rt_routing_info() argument 771 snprintf(buf, buflen, "default route target"); in decode_rt_routing_info() 799 snprintf(buf, buflen, "origin AS: %s, route target %s", in decode_rt_routing_info() [all …]
|
/external/nos/host/android/manual_tests/ |
D | test_citadel.c | 239 uint32_t command, buflen; in do_tpm() local 255 buflen = option.more + argcount; in do_tpm() 256 if (buflen > MAX_DEVICE_TRANSFER) { in do_tpm() 272 debug(1, "Command 0x%08x, buflen 0x%x\n", command, buflen); in do_tpm() 275 rv = dev.ops.read(dev.ctx, command, buf, buflen); in do_tpm() 277 rv = dev.ops.write(dev.ctx, command, buf, buflen); in do_tpm() 282 debug_buf(0, buf, buflen); in do_tpm() 289 uint32_t i, buflen, replycount, retval; in do_app() local 292 buflen = argc - optind; in do_app() 293 for (i = 0; i < buflen; i++) { in do_app() [all …]
|
/external/ltp/testcases/kernel/syscalls/sendmsg/ |
D | sendmsg01.c | 92 int buflen; /* send buffer length */ member 111 .buflen = sizeof(buf), 128 .buflen = sizeof(buf), 145 .buflen = sizeof(buf), 162 .buflen = sizeof(buf), 179 .buflen = sizeof(buf), 196 .buflen = sizeof(buf), 212 .buflen = sizeof(buf), 228 .buflen = sizeof(bigbuf), 245 .buflen = sizeof(buf), [all …]
|
/external/curl/lib/ |
D | x509asn1.c | 366 static size_t encodeUint(char *buf, size_t buflen, unsigned int x) in encodeUint() argument 372 i = encodeUint(buf, buflen, y); in encodeUint() 375 if(i < buflen) in encodeUint() 378 if(i < buflen) in encodeUint() 388 static size_t encodeOID(char *buf, size_t buflen, in encodeOID() argument 399 i = encodeUint(buf, buflen, x); in encodeOID() 400 if(i < buflen) in encodeOID() 403 if(i >= buflen) in encodeOID() 406 i += encodeUint(buf + i, buflen - i, y); in encodeOID() 410 if(i < buflen) in encodeOID() [all …]
|
/external/ipsec-tools/src/libipsec/ |
D | ipsec_dump_policy.c | 99 size_t off, buflen; local 187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir]) 197 if ((buf = malloc(buflen)) == NULL) { 204 snprintf(buf, buflen, "%s %s %c %u %s", 210 snprintf(buf, buflen, "%s %s %s", 216 snprintf(buf, buflen, "%s %s", 221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir], 256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1; 257 newbuf = (char *)realloc(buf, buflen); 264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf);
|