/external/bison/lib/ |
D | strerror_r.c | 37 extern int __xpg_strerror_r (int errnum, char *buf, size_t buflen); 96 local_snprintf (char *buf, size_t buflen, const char *format, ...) in gl_lock_define_initialized() 102 result = _vsnprintf (buf, buflen, format, args); in gl_lock_define_initialized() 104 if (buflen > 0 && (result < 0 || result >= buflen)) in gl_lock_define_initialized() 105 buf[buflen - 1] = '\0'; in gl_lock_define_initialized() 114 safe_copy (char *buf, size_t buflen, const char *msg) in safe_copy() argument 119 if (len < buflen) in safe_copy() 128 memcpy (buf, msg, buflen - 1); in safe_copy() 129 buf[buflen - 1] = '\0'; in safe_copy() 137 strerror_r (int errnum, char *buf, size_t buflen) in strerror_r() argument [all …]
|
/external/wpa_supplicant_8/src/fst/ |
D | fst_ctrl_iface.c | 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 183 return os_snprintf(buf, buflen, "FAIL\n"); in session_get() 191 return os_snprintf(buf, buflen, in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 222 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 226 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 241 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set() 249 static int session_add(const char *group_id, char *buf, size_t buflen) in session_add() argument 258 return os_snprintf(buf, buflen, "FAIL\n"); in session_add() [all …]
|
D | fst_ctrl_iface.h | 17 int fst_ctrl_iface_mb_info(const u8 *addr, char *buf, size_t buflen); 19 int fst_ctrl_iface_receive(const char *txtaddr, char *buf, size_t buflen); 26 fst_ctrl_iface_mb_info(const u8 *addr, char *buf, size_t buflen) in fst_ctrl_iface_mb_info() argument 34 int fst_read_next_text_param(const char *params, char *buf, size_t buflen,
|
/external/wpa_supplicant_8/src/ap/ |
D | ctrl_iface_ap.c | 30 char *buf, size_t buflen) in hostapd_get_sta_tx_rx() argument 38 ret = os_snprintf(buf, buflen, "rx_packets=%lu\ntx_packets=%lu\n" in hostapd_get_sta_tx_rx() 42 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_tx_rx() 49 char *buf, size_t buflen) in hostapd_get_sta_conn_time() argument 59 ret = os_snprintf(buf, buflen, "connected_time=%u\n", in hostapd_get_sta_conn_time() 61 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_conn_time() 88 char *buf, size_t buflen) in hostapd_ctrl_iface_sta_mib() argument 96 ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=", in hostapd_ctrl_iface_sta_mib() 98 if (os_snprintf_error(buflen - len, ret)) in hostapd_ctrl_iface_sta_mib() 102 ret = ap_sta_flags_txt(sta->flags, buf + len, buflen - len); in hostapd_ctrl_iface_sta_mib() [all …]
|
D | ctrl_iface_ap.h | 13 char *buf, size_t buflen); 15 char *buf, size_t buflen); 17 char *buf, size_t buflen); 23 size_t buflen);
|
/external/webrtc/webrtc/base/ |
D | stringencode.cc | 26 size_t escape(char * buffer, size_t buflen, in escape() argument 30 if (buflen <= 0) in escape() 34 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in escape() 37 if (bufpos + 2 >= buflen) in escape() 48 size_t unescape(char * buffer, size_t buflen, in unescape() argument 52 if (buflen <= 0) in unescape() 56 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in unescape() 67 size_t encode(char * buffer, size_t buflen, in encode() argument 71 if (buflen <= 0) in encode() 75 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in encode() [all …]
|
D | stringencode.h | 28 size_t utf8_encode(char* buffer, size_t buflen, unsigned long value); 35 size_t escape(char * buffer, size_t buflen, 39 size_t unescape(char * buffer, size_t buflen, 47 size_t encode(char * buffer, size_t buflen, 51 size_t decode(char * buffer, size_t buflen, 61 size_t url_encode(char * buffer, size_t buflen, 64 size_t url_decode(char * buffer, size_t buflen, 68 size_t html_encode(char * buffer, size_t buflen, 71 size_t html_decode(char * buffer, size_t buflen, 75 size_t xml_encode(char * buffer, size_t buflen, [all …]
|
D | stringutils.h | 169 size_t strlenn(const CTYPE* buffer, size_t buflen) { in strlenn() argument 171 while (buffer[bufpos] && (bufpos < buflen)) { in strlenn() 181 size_t strcpyn(CTYPE* buffer, size_t buflen, 183 if (buflen <= 0) 187 srclen = strlenn(source, buflen - 1); 188 } else if (srclen >= buflen) { 189 srclen = buflen - 1; 197 size_t strcatn(CTYPE* buffer, size_t buflen, 199 if (buflen <= 0) 202 size_t bufpos = strlenn(buffer, buflen - 1); [all …]
|
D | stringutils.cc | 70 size_t asccpyn(wchar_t* buffer, size_t buflen, in asccpyn() argument 72 if (buflen <= 0) in asccpyn() 76 srclen = strlenn(source, buflen - 1); in asccpyn() 77 } else if (srclen >= buflen) { in asccpyn() 78 srclen = buflen - 1; in asccpyn()
|
/external/ipsec-tools/src/racoon/ |
D | privsep.c | 290 size_t *buflen; in privsep_init() local 309 data += combuf->bufs.buflen[i]; in privsep_init() 310 totallen += combuf->bufs.buflen[i]; in privsep_init() 345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 361 reply->bufs.buflen[0] = privkey->l; in privsep_init() 392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 398 if (combuf->bufs.buflen[count] == 0) in privsep_init() 401 [combuf->bufs.buflen[count] - 1] = '\0'; in privsep_init() 433 if (combuf->bufs.buflen[count] != sizeof(name)) { in privsep_init() 440 for (i = 0; combuf->bufs.buflen[count]; count++) in privsep_init() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | main_winsvc.c | 67 DWORD buflen, val; in read_interface() local 81 buflen = sizeof(ctrl_interface); in read_interface() 83 (LPBYTE) ctrl_interface, &buflen); in read_interface() 88 (int) buflen, (char *) ctrl_interface); in read_interface() 92 buflen = sizeof(adapter); in read_interface() 94 (LPBYTE) adapter, &buflen); in read_interface() 99 (int) buflen, (char *) adapter); in read_interface() 103 buflen = sizeof(config); in read_interface() 105 (LPBYTE) config, &buflen); in read_interface() 110 (int) buflen, (char *) config); in read_interface() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | wpa_debug.c | 128 ssize_t buflen; in wpa_debug_open_linux_tracing() local 137 buflen = read(mounts, buf, sizeof(buf) - 1); in wpa_debug_open_linux_tracing() 139 if (buflen < 0) { in wpa_debug_open_linux_tracing() 611 int buflen; in wpa_msg() local 616 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg() 619 buf = os_malloc(buflen); in wpa_msg() 636 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg() 641 bin_clear_free(buf, buflen); in wpa_msg() 649 int buflen; in wpa_msg_ctrl() local 656 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_ctrl() [all …]
|
D | ip_addr.c | 15 size_t buflen) in hostapd_ip_txt() argument 17 if (buflen == 0 || addr == NULL) in hostapd_ip_txt() 21 os_strlcpy(buf, inet_ntoa(addr->u.v4), buflen); in hostapd_ip_txt() 27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL) in hostapd_ip_txt()
|
/external/curl/src/ |
D | tool_getpass.c | 64 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 86 &iosb, 0, 0, buffer, buflen, 0, 0, in getpass_r() 105 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 110 for(i = 0; i < buflen; i++) { in getpass_r() 127 if(i == buflen) in getpass_r() 128 buffer[buflen-1] = '\0'; in getpass_r() 138 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 140 return getpassword(prompt, buffer, buflen); in getpass_r() 143 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 165 } while((buffer[i-1] != 13) && (i < buflen)); in getpass_r() [all …]
|
/external/jemalloc/test/src/ |
D | timer.c | 30 timer_ratio(timedelta_t *a, timedelta_t *b, char *buf, size_t buflen) in timer_ratio() argument 40 n = malloc_snprintf(&buf[i], buflen-i, "%"FMTu64, t0 / t1); in timer_ratio() 42 if (i >= buflen) in timer_ratio() 49 n = malloc_snprintf(&buf[i], buflen-i, "."); in timer_ratio() 53 while (i < buflen-1) { in timer_ratio() 54 uint64_t round = (i+1 == buflen-1 && ((t0 * mult * 10 / t1) % 10 in timer_ratio() 56 n = malloc_snprintf(&buf[i], buflen-i, in timer_ratio()
|
/external/dhcpcd-6.8.2/compat/ |
D | getline.c | 41 getline(char ** __restrict buf, size_t * __restrict buflen, in getline() argument 47 if (buf == NULL || buflen == NULL) { in getline() 52 *buflen = 0; in getline() 58 if (*buf == NULL || bytes != 0 || *buflen < BUFSIZ) { in getline() 59 newlen = *buflen + BUFSIZ; in getline() 64 *buflen = newlen; in getline()
|
/external/libpcap/bpf/net/ |
D | bpf_filter.c | 221 bpf_filter_with_aux_data(pc, p, wirelen, buflen, aux_data) in bpf_filter_with_aux_data() argument 225 register u_int buflen; 235 if (buflen == 0) { 238 buflen = MLEN(m); 269 if (k > buflen || sizeof(int32_t) > buflen - k) { 286 if (k > buflen || sizeof(int16_t) > buflen - k) { 317 if (k >= buflen) { 356 if (pc->k > buflen || X > buflen - pc->k || 357 sizeof(int32_t) > buflen - k) { 374 if (X > buflen || pc->k > buflen - X || [all …]
|
/external/boringssl/src/crypto/ecdh/ |
D | ecdh.c | 94 size_t buflen = 0; in ECDH_compute_key() local 120 buflen = (EC_GROUP_get_degree(group) + 7) / 8; in ECDH_compute_key() 121 buf = OPENSSL_malloc(buflen); in ECDH_compute_key() 127 if (!BN_bn2bin_padded(buf, buflen, x)) { in ECDH_compute_key() 133 if (kdf(buf, buflen, out, &outlen) == NULL) { in ECDH_compute_key() 139 if (buflen < outlen) { in ECDH_compute_key() 140 outlen = buflen; in ECDH_compute_key()
|
/external/ppp/pppd/ |
D | utils.c | 129 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() argument 138 int buflen; in slprintf() local 142 buflen = va_arg(args, int); in slprintf() 145 n = vslprintf(buf, buflen, fmt, args); in slprintf() 153 #define OUTCHAR(c) (buflen > 0? (--buflen, *buf++ = (c)): 0) 156 vslprintf(buf, buflen, fmt, args) in vslprintf() argument 158 int buflen; 175 --buflen; 176 while (buflen > 0) { 181 if (len > buflen) [all …]
|
/external/fio/engines/ |
D | splice.c | 33 int ret, ret2, buflen; in fio_splice_read_old() local 38 buflen = io_u->xfer_buflen; in fio_splice_read_old() 40 while (buflen) { in fio_splice_read_old() 41 int this_len = buflen; in fio_splice_read_old() 54 buflen -= ret; in fio_splice_read_old() 78 int ret , buflen, mmap_len; in fio_splice_read() local 84 mmap_len = buflen = io_u->xfer_buflen; in fio_splice_read() 87 map = mmap(io_u->xfer_buf, buflen, PROT_READ, MAP_PRIVATE|OS_MAP_ANON, 0, 0); in fio_splice_read() 99 while (buflen) { in fio_splice_read() 100 int this_len = buflen; in fio_splice_read() [all …]
|
/external/ipsec-tools/src/libipsec/ |
D | ipsec_dump_policy.c | 99 size_t off, buflen; local 187 buflen = strlen(ipsp_dir_strs[xpl->sadb_x_policy_dir]) 197 if ((buf = malloc(buflen)) == NULL) { 204 snprintf(buf, buflen, "%s %s %c %u %s", 210 snprintf(buf, buflen, "%s %s %s", 216 snprintf(buf, buflen, "%s %s", 221 snprintf(buf, buflen, "%s %s", ipsp_dir_strs[xpl->sadb_x_policy_dir], 256 buflen = offset + strlen(delimiter) + strlen(isrbuf) + 1; 257 newbuf = (char *)realloc(buf, buflen); 264 snprintf(buf+offset, buflen-offset, "%s%s", delimiter, isrbuf);
|
/external/tcpdump/ |
D | print-bgp.c | 485 const u_char *pptr, u_int itemlen, char *buf, u_int buflen) in decode_prefix4() argument 506 snprintf(buf, buflen, "%s/%d", getname(ndo, (u_char *)&addr), plen); in decode_prefix4() 518 const u_char *pptr, u_int itemlen, char *buf, u_int buflen) in decode_labeled_prefix4() argument 555 snprintf(buf, buflen, "%s/%d, label:%u %s", in decode_labeled_prefix4() 626 const u_char *pptr, char *buf, u_int buflen) in bgp_vpn_sg_print() argument 642 snprintf(buf + offset, buflen - offset, ", Source %s", in bgp_vpn_sg_print() 656 snprintf(buf + offset, buflen - offset, ", Group %s", in bgp_vpn_sg_print() 712 const u_char *pptr, char *buf, u_int buflen) in decode_rt_routing_info() argument 721 snprintf(buf, buflen, "default route target"); in decode_rt_routing_info() 740 snprintf(buf, buflen, "origin AS: %s, route target %s", in decode_rt_routing_info() [all …]
|
/external/iproute2/lib/ |
D | mpls_ntop.c | 9 static const char *mpls_ntop1(const struct mpls_label *addr, char *buf, size_t buflen) in mpls_ntop1() argument 11 size_t destlen = buflen; in mpls_ntop1() 37 const char *mpls_ntop(int af, const void *addr, char *buf, size_t buflen) in mpls_ntop() argument 42 return mpls_ntop1((struct mpls_label *)addr, buf, buflen); in mpls_ntop()
|
/external/srtp/crypto/test/ |
D | cipher_driver.c | 262 unsigned len, buflen = 1024; in cipher_driver_test_buffering() local 263 uint8_t buffer0[buflen], buffer1[buflen], *current, *end; in cipher_driver_test_buffering() 276 for (j=0; j < buflen; j++) in cipher_driver_test_buffering() 285 status = cipher_encrypt(c, buffer0, &buflen); in cipher_driver_test_buffering() 296 end = buffer1 + buflen; in cipher_driver_test_buffering() 319 for (j=0; j < buflen; j++) in cipher_driver_test_buffering() 323 printf("computed: %s\n", octet_string_hex_string(buffer1, buflen)); in cipher_driver_test_buffering() 324 printf("expected: %s\n", octet_string_hex_string(buffer0, buflen)); in cipher_driver_test_buffering()
|
/external/c-ares/ |
D | ares_mkquery.c | 89 int rd, unsigned char **buf, int *buflen) in ares_mkquery() argument 96 *buflen = 0; in ares_mkquery() 132 *buflen = len + HFIXEDSZ + QFIXEDSZ; in ares_mkquery() 133 *buf = malloc(*buflen); in ares_mkquery()
|