Home
last modified time | relevance | path

Searched refs:buflen (Results 1 – 25 of 290) sorted by relevance

12345678910>>...12

/external/bison/lib/
Dstrerror_r.c37 extern int __xpg_strerror_r (int errnum, char *buf, size_t buflen);
96 local_snprintf (char *buf, size_t buflen, const char *format, ...) in gl_lock_define_initialized()
102 result = _vsnprintf (buf, buflen, format, args); in gl_lock_define_initialized()
104 if (buflen > 0 && (result < 0 || result >= buflen)) in gl_lock_define_initialized()
105 buf[buflen - 1] = '\0'; in gl_lock_define_initialized()
114 safe_copy (char *buf, size_t buflen, const char *msg) in safe_copy() argument
119 if (len < buflen) in safe_copy()
128 memcpy (buf, msg, buflen - 1); in safe_copy()
129 buf[buflen - 1] = '\0'; in safe_copy()
137 strerror_r (int errnum, char *buf, size_t buflen) in strerror_r() argument
[all …]
/external/wpa_supplicant_8/src/fst/
Dfst_ctrl_iface.c171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
183 return os_snprintf(buf, buflen, "FAIL\n"); in session_get()
191 return os_snprintf(buf, buflen, in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
222 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
226 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
241 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set()
249 static int session_add(const char *group_id, char *buf, size_t buflen) in session_add() argument
258 return os_snprintf(buf, buflen, "FAIL\n"); in session_add()
[all …]
Dfst_ctrl_iface.h17 int fst_ctrl_iface_mb_info(const u8 *addr, char *buf, size_t buflen);
19 int fst_ctrl_iface_receive(const char *txtaddr, char *buf, size_t buflen);
26 fst_ctrl_iface_mb_info(const u8 *addr, char *buf, size_t buflen) in fst_ctrl_iface_mb_info() argument
34 int fst_read_next_text_param(const char *params, char *buf, size_t buflen,
/external/wpa_supplicant_8/src/ap/
Dctrl_iface_ap.c30 char *buf, size_t buflen) in hostapd_get_sta_tx_rx() argument
38 ret = os_snprintf(buf, buflen, "rx_packets=%lu\ntx_packets=%lu\n" in hostapd_get_sta_tx_rx()
42 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_tx_rx()
49 char *buf, size_t buflen) in hostapd_get_sta_conn_time() argument
59 ret = os_snprintf(buf, buflen, "connected_time=%u\n", in hostapd_get_sta_conn_time()
61 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_conn_time()
88 char *buf, size_t buflen) in hostapd_ctrl_iface_sta_mib() argument
96 ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=", in hostapd_ctrl_iface_sta_mib()
98 if (os_snprintf_error(buflen - len, ret)) in hostapd_ctrl_iface_sta_mib()
102 ret = ap_sta_flags_txt(sta->flags, buf + len, buflen - len); in hostapd_ctrl_iface_sta_mib()
[all …]
Dctrl_iface_ap.h13 char *buf, size_t buflen);
15 char *buf, size_t buflen);
17 char *buf, size_t buflen);
23 size_t buflen);
/external/webrtc/webrtc/base/
Dstringencode.cc26 size_t escape(char * buffer, size_t buflen, in escape() argument
30 if (buflen <= 0) in escape()
34 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in escape()
37 if (bufpos + 2 >= buflen) in escape()
48 size_t unescape(char * buffer, size_t buflen, in unescape() argument
52 if (buflen <= 0) in unescape()
56 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in unescape()
67 size_t encode(char * buffer, size_t buflen, in encode() argument
71 if (buflen <= 0) in encode()
75 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in encode()
[all …]
Dstringencode.h28 size_t utf8_encode(char* buffer, size_t buflen, unsigned long value);
35 size_t escape(char * buffer, size_t buflen,
39 size_t unescape(char * buffer, size_t buflen,
47 size_t encode(char * buffer, size_t buflen,
51 size_t decode(char * buffer, size_t buflen,
61 size_t url_encode(char * buffer, size_t buflen,
64 size_t url_decode(char * buffer, size_t buflen,
68 size_t html_encode(char * buffer, size_t buflen,
71 size_t html_decode(char * buffer, size_t buflen,
75 size_t xml_encode(char * buffer, size_t buflen,
[all …]
Dstringutils.h169 size_t strlenn(const CTYPE* buffer, size_t buflen) { in strlenn() argument
171 while (buffer[bufpos] && (bufpos < buflen)) { in strlenn()
181 size_t strcpyn(CTYPE* buffer, size_t buflen,
183 if (buflen <= 0)
187 srclen = strlenn(source, buflen - 1);
188 } else if (srclen >= buflen) {
189 srclen = buflen - 1;
197 size_t strcatn(CTYPE* buffer, size_t buflen,
199 if (buflen <= 0)
202 size_t bufpos = strlenn(buffer, buflen - 1);
[all …]
Dstringutils.cc70 size_t asccpyn(wchar_t* buffer, size_t buflen, in asccpyn() argument
72 if (buflen <= 0) in asccpyn()
76 srclen = strlenn(source, buflen - 1); in asccpyn()
77 } else if (srclen >= buflen) { in asccpyn()
78 srclen = buflen - 1; in asccpyn()
/external/ipsec-tools/src/racoon/
Dprivsep.c290 size_t *buflen; in privsep_init() local
309 data += combuf->bufs.buflen[i]; in privsep_init()
310 totallen += combuf->bufs.buflen[i]; in privsep_init()
345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init()
361 reply->bufs.buflen[0] = privkey->l; in privsep_init()
392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init()
398 if (combuf->bufs.buflen[count] == 0) in privsep_init()
401 [combuf->bufs.buflen[count] - 1] = '\0'; in privsep_init()
433 if (combuf->bufs.buflen[count] != sizeof(name)) { in privsep_init()
440 for (i = 0; combuf->bufs.buflen[count]; count++) in privsep_init()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dmain_winsvc.c67 DWORD buflen, val; in read_interface() local
81 buflen = sizeof(ctrl_interface); in read_interface()
83 (LPBYTE) ctrl_interface, &buflen); in read_interface()
88 (int) buflen, (char *) ctrl_interface); in read_interface()
92 buflen = sizeof(adapter); in read_interface()
94 (LPBYTE) adapter, &buflen); in read_interface()
99 (int) buflen, (char *) adapter); in read_interface()
103 buflen = sizeof(config); in read_interface()
105 (LPBYTE) config, &buflen); in read_interface()
110 (int) buflen, (char *) config); in read_interface()
[all …]
/external/wpa_supplicant_8/src/utils/
Dwpa_debug.c128 ssize_t buflen; in wpa_debug_open_linux_tracing() local
137 buflen = read(mounts, buf, sizeof(buf) - 1); in wpa_debug_open_linux_tracing()
139 if (buflen < 0) { in wpa_debug_open_linux_tracing()
611 int buflen; in wpa_msg() local
616 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg()
619 buf = os_malloc(buflen); in wpa_msg()
636 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg()
641 bin_clear_free(buf, buflen); in wpa_msg()
649 int buflen; in wpa_msg_ctrl() local
656 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_ctrl()
[all …]
Dip_addr.c15 size_t buflen) in hostapd_ip_txt() argument
17 if (buflen == 0 || addr == NULL) in hostapd_ip_txt()
21 os_strlcpy(buf, inet_ntoa(addr->u.v4), buflen); in hostapd_ip_txt()
27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL) in hostapd_ip_txt()
/external/curl/src/
Dtool_getpass.c64 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument
86 &iosb, 0, 0, buffer, buflen, 0, 0, in getpass_r()
105 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument
110 for(i = 0; i < buflen; i++) { in getpass_r()
127 if(i == buflen) in getpass_r()
128 buffer[buflen-1] = '\0'; in getpass_r()
138 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument
140 return getpassword(prompt, buffer, buflen); in getpass_r()
143 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument
165 } while((buffer[i-1] != 13) && (i < buflen)); in getpass_r()
[all …]
/external/jemalloc/test/src/
Dtimer.c30 timer_ratio(timedelta_t *a, timedelta_t *b, char *buf, size_t buflen) in timer_ratio() argument
40 n = malloc_snprintf(&buf[i], buflen-i, "%"FMTu64, t0 / t1); in timer_ratio()
42 if (i >= buflen) in timer_ratio()
49 n = malloc_snprintf(&buf[i], buflen-i, "."); in timer_ratio()
53 while (i < buflen-1) { in timer_ratio()
54 uint64_t round = (i+1 == buflen-1 && ((t0 * mult * 10 / t1) % 10 in timer_ratio()
56 n = malloc_snprintf(&buf[i], buflen-i, in timer_ratio()
/external/dhcpcd-6.8.2/compat/
Dgetline.c41 getline(char ** __restrict buf, size_t * __restrict buflen, in getline() argument
47 if (buf == NULL || buflen == NULL) { in getline()
52 *buflen = 0; in getline()
58 if (*buf == NULL || bytes != 0 || *buflen < BUFSIZ) { in getline()
59 newlen = *buflen + BUFSIZ; in getline()
64 *buflen = newlen; in getline()
/external/libpcap/bpf/net/
Dbpf_filter.c221 bpf_filter_with_aux_data(pc, p, wirelen, buflen, aux_data) in bpf_filter_with_aux_data() argument
225 register u_int buflen;
235 if (buflen == 0) {
238 buflen = MLEN(m);
269 if (k > buflen || sizeof(int32_t) > buflen - k) {
286 if (k > buflen || sizeof(int16_t) > buflen - k) {
317 if (k >= buflen) {
356 if (pc->k > buflen || X > buflen - pc->k ||
357 sizeof(int32_t) > buflen - k) {
374 if (X > buflen || pc->k > buflen - X ||
[all …]
/external/boringssl/src/crypto/ecdh/
Decdh.c94 size_t buflen = 0; in ECDH_compute_key() local
120 buflen = (EC_GROUP_get_degree(group) + 7) / 8; in ECDH_compute_key()
121 buf = OPENSSL_malloc(buflen); in ECDH_compute_key()
127 if (!BN_bn2bin_padded(buf, buflen, x)) { in ECDH_compute_key()
133 if (kdf(buf, buflen, out, &outlen) == NULL) { in ECDH_compute_key()
139 if (buflen < outlen) { in ECDH_compute_key()
140 outlen = buflen; in ECDH_compute_key()
/external/ppp/pppd/
Dutils.c129 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() argument
138 int buflen; in slprintf() local
142 buflen = va_arg(args, int); in slprintf()
145 n = vslprintf(buf, buflen, fmt, args); in slprintf()
153 #define OUTCHAR(c) (buflen > 0? (--buflen, *buf++ = (c)): 0)
156 vslprintf(buf, buflen, fmt, args) in vslprintf() argument
158 int buflen;
175 --buflen;
176 while (buflen > 0) {
181 if (len > buflen)
[all …]
/external/fio/engines/
Dsplice.c33 int ret, ret2, buflen; in fio_splice_read_old() local
38 buflen = io_u->xfer_buflen; in fio_splice_read_old()
40 while (buflen) { in fio_splice_read_old()
41 int this_len = buflen; in fio_splice_read_old()
54 buflen -= ret; in fio_splice_read_old()
78 int ret , buflen, mmap_len; in fio_splice_read() local
84 mmap_len = buflen = io_u->xfer_buflen; in fio_splice_read()
87 map = mmap(io_u->xfer_buf, buflen, PROT_READ, MAP_PRIVATE|OS_MAP_ANON, 0, 0); in fio_splice_read()
99 while (buflen) { in fio_splice_read()
100 int this_len = buflen; in fio_splice_read()
[all …]
/external/ipsec-tools/src/libipsec/
Dipsec_dump_policy.c99 size_t off, buflen; local
187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir])
197 if ((buf = malloc(buflen)) == NULL) {
204 snprintf(buf, buflen, "%s %s %c %u %s",
210 snprintf(buf, buflen, "%s %s %s",
216 snprintf(buf, buflen, "%s %s",
221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir],
256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1;
257 newbuf = (char *)realloc(buf, buflen);
264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf);
/external/tcpdump/
Dprint-bgp.c485 const u_char *pptr, u_int itemlen, char *buf, u_int buflen) in decode_prefix4() argument
506 snprintf(buf, buflen, "%s/%d", getname(ndo, (u_char *)&addr), plen); in decode_prefix4()
518 const u_char *pptr, u_int itemlen, char *buf, u_int buflen) in decode_labeled_prefix4() argument
555 snprintf(buf, buflen, "%s/%d, label:%u %s", in decode_labeled_prefix4()
626 const u_char *pptr, char *buf, u_int buflen) in bgp_vpn_sg_print() argument
642 snprintf(buf + offset, buflen - offset, ", Source %s", in bgp_vpn_sg_print()
656 snprintf(buf + offset, buflen - offset, ", Group %s", in bgp_vpn_sg_print()
712 const u_char *pptr, char *buf, u_int buflen) in decode_rt_routing_info() argument
721 snprintf(buf, buflen, "default route target"); in decode_rt_routing_info()
740 snprintf(buf, buflen, "origin AS: %s, route target %s", in decode_rt_routing_info()
[all …]
/external/iproute2/lib/
Dmpls_ntop.c9 static const char *mpls_ntop1(const struct mpls_label *addr, char *buf, size_t buflen) in mpls_ntop1() argument
11 size_t destlen = buflen; in mpls_ntop1()
37 const char *mpls_ntop(int af, const void *addr, char *buf, size_t buflen) in mpls_ntop() argument
42 return mpls_ntop1((struct mpls_label *)addr, buf, buflen); in mpls_ntop()
/external/srtp/crypto/test/
Dcipher_driver.c262 unsigned len, buflen = 1024; in cipher_driver_test_buffering() local
263 uint8_t buffer0[buflen], buffer1[buflen], *current, *end; in cipher_driver_test_buffering()
276 for (j=0; j < buflen; j++) in cipher_driver_test_buffering()
285 status = cipher_encrypt(c, buffer0, &buflen); in cipher_driver_test_buffering()
296 end = buffer1 + buflen; in cipher_driver_test_buffering()
319 for (j=0; j < buflen; j++) in cipher_driver_test_buffering()
323 printf("computed: %s\n", octet_string_hex_string(buffer1, buflen)); in cipher_driver_test_buffering()
324 printf("expected: %s\n", octet_string_hex_string(buffer0, buflen)); in cipher_driver_test_buffering()
/external/c-ares/
Dares_mkquery.c89 int rd, unsigned char **buf, int *buflen) in ares_mkquery() argument
96 *buflen = 0; in ares_mkquery()
132 *buflen = len + HFIXEDSZ + QFIXEDSZ; in ares_mkquery()
133 *buf = malloc(*buflen); in ares_mkquery()

12345678910>>...12