/external/openssl/crypto/asn1/ |
D | asn_mime.c | 105 static int strip_eol(char *linebuf, int *plen); 541 char linebuf[MAX_SMLEN]; in SMIME_crlf_copy() local 552 while((len = BIO_read(in, linebuf, MAX_SMLEN)) > 0) in SMIME_crlf_copy() 553 BIO_write(out, linebuf, len); in SMIME_crlf_copy() 559 while ((len = BIO_gets(in, linebuf, MAX_SMLEN)) > 0) in SMIME_crlf_copy() 561 eol = strip_eol(linebuf, &len); in SMIME_crlf_copy() 563 BIO_write(out, linebuf, len); in SMIME_crlf_copy() 610 char linebuf[MAX_SMLEN]; in multi_split() local 623 while ((len = BIO_gets(bio, linebuf, MAX_SMLEN)) > 0) { in multi_split() 624 state = mime_bound_check(linebuf, len, bound, blen); in multi_split() [all …]
|
/external/checkpolicy/ |
D | policy_scan.l | 36 static char linebuf[2][255]; variable 59 \n.* { strncpy(linebuf[lno], yytext+1, 255); 60 linebuf[lno][254] = 0; 284 linebuf[0], linebuf[1]); 300 linebuf[0], linebuf[1]);
|
/external/dropbear/ |
D | common-session.c | 235 char linebuf[256]; in session_identification() local 248 len = ident_readln(ses.sock, linebuf, sizeof(linebuf)); in session_identification() 255 if (len >= 4 && memcmp(linebuf, "SSH-", 4) == 0) { in session_identification() 263 TRACE(("err: %s for '%s'\n", strerror(errno), linebuf)) in session_identification() 268 memcpy(ses.remoteident, linebuf, len); in session_identification()
|
/external/bluetooth/bluedroid/btif/src/ |
D | btif_storage.c | 1542 char linebuf[BTIF_STORAGE_MAX_LINE_SZ]; in btif_storage_load_autopair_device_list() local 1559 while (fgets(linebuf, BTIF_STORAGE_MAX_LINE_SZ, fp) != NULL) in btif_storage_load_autopair_device_list() 1562 while (linebuf[i] == BTIF_AUTO_PAIR_CONF_SPACE) in btif_storage_load_autopair_device_list() 1566 if (linebuf[i] == BTIF_AUTO_PAIR_CONF_COMMENT) in btif_storage_load_autopair_device_list() 1569 line = (char*)&(linebuf[i]); in btif_storage_load_autopair_device_list() 1673 char linebuf[BTIF_STORAGE_MAX_LINE_SZ+20]; in btif_storage_add_device_to_autopair_blacklist() local 1679 int line_size = sizeof(linebuf); in btif_storage_add_device_to_autopair_blacklist() 1681 BTIF_STORAGE_KEY_AUTOPAIR_DYNAMIC_BLACKLIST_ADDR, linebuf, &line_size)) in btif_storage_add_device_to_autopair_blacklist() 1684 strncat (linebuf, input_value, BTIF_STORAGE_MAX_LINE_SZ); in btif_storage_add_device_to_autopair_blacklist() 1688 strncpy( linebuf,input_value, BTIF_STORAGE_MAX_LINE_SZ); in btif_storage_add_device_to_autopair_blacklist() [all …]
|
/external/libpcap/ |
D | fad-gifc.c | 144 char linebuf[512]; in scan_proc_net_dev() local 157 fgets(linebuf, sizeof linebuf, proc_net_f) != NULL; linenum++) { in scan_proc_net_dev() 164 p = &linebuf[0]; in scan_proc_net_dev()
|
/external/openssl/crypto/x509v3/ |
D | v3_utl.c | 255 char *linebuf; in STACK_OF() local 258 linebuf = BUF_strdup(line); in STACK_OF() 262 for(p = linebuf, q = linebuf; (c = *p) && (c!='\r') && (c!='\n'); p++) { in STACK_OF() 331 OPENSSL_free(linebuf); in STACK_OF() 335 OPENSSL_free(linebuf); in STACK_OF()
|
/external/icu4c/common/ |
D | icuplug.c | 767 char linebuf[1024]; in uplug_init() 772 while(fgets(linebuf,1023,f)) { in uplug_init() 775 if(!*linebuf || *linebuf=='#') { in uplug_init() 778 p = linebuf; in uplug_init()
|
/external/valgrind/main/VEX/ |
D | test_main.c | 67 static HChar linebuf[N_LINEBUF]; variable 137 char* unused1 = fgets(linebuf, N_LINEBUF,f); in main() 138 if (linebuf[0] == 0) continue; in main() 139 if (linebuf[0] != '.') continue; in main() 145 assert(3 == sscanf(&linebuf[1], " %d %x %d\n", in main() 151 char* unused2 = fgets(linebuf, N_LINEBUF,f); in main() 152 assert(linebuf[0] == '.'); in main() 162 assert(1 == sscanf(&linebuf[2 + 3*i], "%x", &u)); in main()
|
/external/icu4c/extra/uconv/ |
D | uconv.cpp | 672 UChar linebuf[20], offsetbuf[20]; in convertFile() local 673 uprv_itou(linebuf, 20, parse.line, 10, 0); in convertFile() 676 u_wmsg_errorName(err), linebuf, offsetbuf); in convertFile()
|