/external/bison/lib/ |
D | strerror_r.c | 37 extern int __xpg_strerror_r (int errnum, char *buf, size_t buflen); 96 local_snprintf (char *buf, size_t buflen, const char *format, ...) in gl_lock_define_initialized() 102 result = _vsnprintf (buf, buflen, format, args); in gl_lock_define_initialized() 104 if (buflen > 0 && (result < 0 || result >= buflen)) in gl_lock_define_initialized() 105 buf[buflen - 1] = '\0'; in gl_lock_define_initialized() 114 safe_copy (char *buf, size_t buflen, const char *msg) in safe_copy() argument 119 if (len < buflen) in safe_copy() 128 memcpy (buf, msg, buflen - 1); in safe_copy() 129 buf[buflen - 1] = '\0'; in safe_copy() 137 strerror_r (int errnum, char *buf, size_t buflen) in strerror_r() argument [all …]
|
/external/chromium/third_party/libjingle/source/talk/base/ |
D | stringencode.cc | 63 size_t escape(char * buffer, size_t buflen, in escape() argument 67 if (buflen <= 0) in escape() 71 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in escape() 74 if (bufpos + 2 >= buflen) in escape() 85 size_t unescape(char * buffer, size_t buflen, in unescape() argument 89 if (buflen <= 0) in unescape() 93 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in unescape() 104 size_t encode(char * buffer, size_t buflen, in encode() argument 108 if (buflen <= 0) in encode() 112 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in encode() [all …]
|
D | stringutils.h | 189 size_t strlenn(const CTYPE* buffer, size_t buflen) { in strlenn() argument 191 while (buffer[bufpos] && (bufpos < buflen)) { in strlenn() 201 size_t strcpyn(CTYPE* buffer, size_t buflen, 203 if (buflen <= 0) 207 srclen = strlenn(source, buflen - 1); 208 } else if (srclen >= buflen) { 209 srclen = buflen - 1; 217 size_t strcatn(CTYPE* buffer, size_t buflen, 219 if (buflen <= 0) 222 size_t bufpos = strlenn(buffer, buflen - 1); [all …]
|
D | stringencode.h | 48 size_t utf8_encode(char* buffer, size_t buflen, unsigned long value); 55 size_t escape(char * buffer, size_t buflen, 59 size_t unescape(char * buffer, size_t buflen, 67 size_t encode(char * buffer, size_t buflen, 71 size_t decode(char * buffer, size_t buflen, 81 size_t url_encode(char * buffer, size_t buflen, 84 size_t url_decode(char * buffer, size_t buflen, 88 size_t html_encode(char * buffer, size_t buflen, 91 size_t html_decode(char * buffer, size_t buflen, 95 size_t xml_encode(char * buffer, size_t buflen, [all …]
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
D | stringencode.cc | 43 size_t escape(char * buffer, size_t buflen, in escape() argument 47 if (buflen <= 0) in escape() 51 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in escape() 54 if (bufpos + 2 >= buflen) in escape() 65 size_t unescape(char * buffer, size_t buflen, in unescape() argument 69 if (buflen <= 0) in unescape() 73 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in unescape() 84 size_t encode(char * buffer, size_t buflen, in encode() argument 88 if (buflen <= 0) in encode() 92 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in encode() [all …]
|
D | stringencode.h | 45 size_t utf8_encode(char* buffer, size_t buflen, unsigned long value); 52 size_t escape(char * buffer, size_t buflen, 56 size_t unescape(char * buffer, size_t buflen, 64 size_t encode(char * buffer, size_t buflen, 68 size_t decode(char * buffer, size_t buflen, 78 size_t url_encode(char * buffer, size_t buflen, 81 size_t url_decode(char * buffer, size_t buflen, 85 size_t html_encode(char * buffer, size_t buflen, 88 size_t html_decode(char * buffer, size_t buflen, 92 size_t xml_encode(char * buffer, size_t buflen, [all …]
|
D | stringutils.h | 186 size_t strlenn(const CTYPE* buffer, size_t buflen) { in strlenn() argument 188 while (buffer[bufpos] && (bufpos < buflen)) { in strlenn() 198 size_t strcpyn(CTYPE* buffer, size_t buflen, 200 if (buflen <= 0) 204 srclen = strlenn(source, buflen - 1); 205 } else if (srclen >= buflen) { 206 srclen = buflen - 1; 214 size_t strcatn(CTYPE* buffer, size_t buflen, 216 if (buflen <= 0) 219 size_t bufpos = strlenn(buffer, buflen - 1); [all …]
|
/external/ipsec-tools/src/racoon/ |
D | privsep.c | 290 size_t *buflen; in privsep_init() local 309 data += combuf->bufs.buflen[i]; in privsep_init() 310 totallen += combuf->bufs.buflen[i]; in privsep_init() 345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 361 reply->bufs.buflen[0] = privkey->l; in privsep_init() 392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 398 if (combuf->bufs.buflen[count] == 0) in privsep_init() 401 [combuf->bufs.buflen[count] - 1] = '\0'; in privsep_init() 433 if (combuf->bufs.buflen[count] != sizeof(name)) { in privsep_init() 440 for (i = 0; combuf->bufs.buflen[count]; count++) in privsep_init() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | main_winsvc.c | 67 DWORD buflen, val; in read_interface() local 81 buflen = sizeof(ctrl_interface); in read_interface() 83 (LPBYTE) ctrl_interface, &buflen); in read_interface() 88 (int) buflen, (char *) ctrl_interface); in read_interface() 92 buflen = sizeof(adapter); in read_interface() 94 (LPBYTE) adapter, &buflen); in read_interface() 99 (int) buflen, (char *) adapter); in read_interface() 103 buflen = sizeof(config); in read_interface() 105 (LPBYTE) config, &buflen); in read_interface() 110 (int) buflen, (char *) config); in read_interface() [all …]
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
D | gcm_add_aad.c | 41 if (gcm->buflen > 16 || gcm->buflen < 0) { in gcm_add_aad() 52 if (gcm->ivmode || gcm->buflen != 12) { in gcm_add_aad() 53 for (x = 0; x < (unsigned long)gcm->buflen; x++) { in gcm_add_aad() 56 if (gcm->buflen) { in gcm_add_aad() 57 gcm->totlen += gcm->buflen * CONST64(8); in gcm_add_aad() 81 gcm->buflen = 0; in gcm_add_aad() 86 if (gcm->mode != GCM_MODE_AAD || gcm->buflen >= 16) { in gcm_add_aad() 92 if (gcm->buflen == 0) { in gcm_add_aad() 107 gcm->X[gcm->buflen++] ^= *adata++; in gcm_add_aad() 109 if (gcm->buflen == 16) { in gcm_add_aad() [all …]
|
D | gcm_process.c | 44 if (gcm->buflen > 16 || gcm->buflen < 0) { in gcm_process() 55 if (gcm->buflen) { in gcm_process() 56 gcm->totlen += gcm->buflen * CONST64(8); in gcm_process() 69 gcm->buflen = 0; in gcm_process() 79 if (gcm->buflen == 0) { in gcm_process() 122 if (gcm->buflen == 16) { in gcm_process() 133 gcm->buflen = 0; in gcm_process() 137 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen]; in gcm_process() 140 pt[x] = ct[x] ^ gcm->buf[gcm->buflen]; in gcm_process() 142 gcm->X[gcm->buflen++] ^= b; in gcm_process()
|
D | gcm_add_iv.c | 43 if (gcm->buflen >= 16 || gcm->buflen < 0) { in gcm_add_iv() 53 if (IVlen + gcm->buflen > 12) { in gcm_add_iv() 59 if (gcm->buflen == 0) { in gcm_add_iv() 73 gcm->buf[gcm->buflen++] = *IV++; in gcm_add_iv() 75 if (gcm->buflen == 16) { in gcm_add_iv() 81 gcm->buflen = 0; in gcm_add_iv()
|
/external/wpa_supplicant_8/src/ap/ |
D | ctrl_iface_ap.c | 25 char *buf, size_t buflen) in hostapd_get_sta_conn_time() argument 36 ret = os_snprintf(buf + len, buflen - len, "connected_time=%u\n", in hostapd_get_sta_conn_time() 38 if (ret < 0 || (size_t) ret >= buflen - len) in hostapd_get_sta_conn_time() 48 char *buf, size_t buflen) in hostapd_ctrl_iface_sta_mib() argument 53 ret = os_snprintf(buf, buflen, "FAIL\n"); in hostapd_ctrl_iface_sta_mib() 54 if (ret < 0 || (size_t) ret >= buflen) in hostapd_ctrl_iface_sta_mib() 60 ret = os_snprintf(buf + len, buflen - len, MACSTR "\n", in hostapd_ctrl_iface_sta_mib() 62 if (ret < 0 || (size_t) ret >= buflen - len) in hostapd_ctrl_iface_sta_mib() 66 res = ieee802_11_get_mib_sta(hapd, sta, buf + len, buflen - len); in hostapd_ctrl_iface_sta_mib() 69 res = wpa_get_mib_sta(sta->wpa_sm, buf + len, buflen - len); in hostapd_ctrl_iface_sta_mib() [all …]
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
D | pelican.c | 50 pelmac->buflen = 0; in pelican_init() 107 if (pelmac->buflen < 0 || pelmac->buflen > 15) { in pelican_process() 112 if (pelmac->buflen == 0) { in pelican_process() 126 pelmac->state[pelmac->buflen++] ^= *in++; in pelican_process() 127 if (pelmac->buflen == 16) { in pelican_process() 129 pelmac->buflen = 0; in pelican_process() 147 if (pelmac->buflen < 0 || pelmac->buflen > 16) { in pelican_done() 151 if (pelmac->buflen == 16) { in pelican_done() 153 pelmac->buflen = 0; in pelican_done() 155 pelmac->state[pelmac->buflen++] ^= 0x80; in pelican_done()
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
D | omac_process.c | 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_process() 40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_process() 45 if (omac->buflen == 0 && inlen > 16) { in omac_process() 62 if (omac->buflen == omac->blklen) { in omac_process() 69 omac->buflen = 0; in omac_process() 73 n = MIN(inlen, (unsigned long)(omac->blklen - omac->buflen)); in omac_process() 74 XMEMCPY(omac->block + omac->buflen, in, n); in omac_process() 75 omac->buflen += n; in omac_process()
|
D | omac_done.c | 39 if ((omac->buflen > (int)sizeof(omac->block)) || (omac->buflen < 0) || in omac_done() 40 (omac->blklen > (int)sizeof(omac->block)) || (omac->buflen > omac->blklen)) { in omac_done() 45 if (omac->buflen != omac->blklen) { in omac_done() 47 omac->block[omac->buflen++] = 0x80; in omac_done() 50 while (omac->buflen < omac->blklen) { in omac_done() 51 omac->block[omac->buflen++] = 0x00; in omac_done()
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
D | pmac_process.c | 40 if ((pmac->buflen > (int)sizeof(pmac->block)) || (pmac->buflen < 0) || in pmac_process() 41 (pmac->block_len > (int)sizeof(pmac->block)) || (pmac->buflen > pmac->block_len)) { in pmac_process() 46 if (pmac->buflen == 0 && inlen > 16) { in pmac_process() 67 if (pmac->buflen == pmac->block_len) { in pmac_process() 78 pmac->buflen = 0; in pmac_process() 82 n = MIN(inlen, (unsigned long)(pmac->block_len - pmac->buflen)); in pmac_process() 83 XMEMCPY(pmac->block + pmac->buflen, in, n); in pmac_process() 84 pmac->buflen += n; in pmac_process()
|
/external/openssl/crypto/ecdh/ |
D | ech_ossl.c | 118 size_t buflen, len; in ecdh_compute_key() local 171 buflen = (EC_GROUP_get_degree(group) + 7)/8; in ecdh_compute_key() 173 if (len > buflen) in ecdh_compute_key() 178 if ((buf = OPENSSL_malloc(buflen)) == NULL) in ecdh_compute_key() 184 memset(buf, 0, buflen - len); in ecdh_compute_key() 185 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) in ecdh_compute_key() 193 if (KDF(buf, buflen, out, &outlen) == NULL) in ecdh_compute_key() 203 if (outlen > buflen) in ecdh_compute_key() 204 outlen = buflen; in ecdh_compute_key()
|
/external/chromium_org/third_party/openssl/openssl/crypto/ecdh/ |
D | ech_ossl.c | 118 size_t buflen, len; in ecdh_compute_key() local 171 buflen = (EC_GROUP_get_degree(group) + 7)/8; in ecdh_compute_key() 173 if (len > buflen) in ecdh_compute_key() 178 if ((buf = OPENSSL_malloc(buflen)) == NULL) in ecdh_compute_key() 184 memset(buf, 0, buflen - len); in ecdh_compute_key() 185 if (len != (size_t)BN_bn2bin(x, buf + buflen - len)) in ecdh_compute_key() 193 if (KDF(buf, buflen, out, &outlen) == NULL) in ecdh_compute_key() 203 if (outlen > buflen) in ecdh_compute_key() 204 outlen = buflen; in ecdh_compute_key()
|
/external/grub/stage2/ |
D | md5.c | 154 int buflen = length & 63; in md5_update() local 156 if (buflen + inputlen < 64) in md5_update() 158 memcpy (buffer + buflen, input, inputlen); in md5_update() 159 buflen += inputlen; in md5_update() 163 memcpy (buffer + buflen, input, 64 - buflen); in md5_update() 165 input += 64 - buflen; in md5_update() 166 inputlen -= 64 - buflen; in md5_update() 174 buflen = inputlen; in md5_update() 180 int i, buflen = length & 63; in md5_final() local 182 buffer[buflen++] = 0x80; in md5_final() [all …]
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
D | xcbc_process.c | 42 (xcbc->buflen > xcbc->blocksize) || (xcbc->buflen < 0)) { in xcbc_process() 47 if (xcbc->buflen == 0) { in xcbc_process() 60 if (xcbc->buflen == xcbc->blocksize) { in xcbc_process() 62 xcbc->buflen = 0; in xcbc_process() 64 xcbc->IV[xcbc->buflen++] ^= *in++; in xcbc_process()
|
/external/ppp/pppd/ |
D | utils.c | 135 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() argument 144 int buflen; in slprintf() local 148 buflen = va_arg(args, int); in slprintf() 151 n = vslprintf(buf, buflen, fmt, args); in slprintf() 159 #define OUTCHAR(c) (buflen > 0? (--buflen, *buf++ = (c)): 0) 162 vslprintf(buf, buflen, fmt, args) in vslprintf() argument 164 int buflen; 181 --buflen; 182 while (buflen > 0) { 187 if (len > buflen) [all …]
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
D | f9_process.c | 39 (f9->buflen > f9->blocksize) || (f9->buflen < 0)) { in f9_process() 44 if (f9->buflen == 0) { in f9_process() 60 if (f9->buflen == f9->blocksize) { in f9_process() 65 f9->buflen = 0; in f9_process() 67 f9->IV[f9->buflen++] ^= *in++; in f9_process()
|
/external/dhcpcd/compat/ |
D | getline.c | 41 getline(char ** __restrict buf, size_t * __restrict buflen, in getline() argument 47 if (buf == NULL || buflen == NULL) { in getline() 52 *buflen = 0; in getline() 59 newlen = *buflen + BUFSIZ; in getline() 64 *buflen = newlen; in getline()
|
/external/wpa_supplicant_8/src/utils/ |
D | wpa_debug.c | 128 ssize_t buflen; in wpa_debug_open_linux_tracing() local 137 buflen = read(mounts, buf, sizeof(buf) - 1); in wpa_debug_open_linux_tracing() 139 if (buflen < 0) { in wpa_debug_open_linux_tracing() 598 const int buflen = 2048; in wpa_msg() local 602 buf = os_malloc(buflen); in wpa_msg() 619 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg() 632 const int buflen = 2048; in wpa_msg_ctrl() local 638 buf = os_malloc(buflen); in wpa_msg_ctrl() 645 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg_ctrl() 656 const int buflen = 2048; in wpa_msg_global() local [all …]
|