Home
last modified time | relevance | path

Searched refs:buflen (Results 1 – 25 of 349) sorted by relevance

12345678910>>...14

/external/bison/lib/
Dstrerror_r.c37 extern int __xpg_strerror_r (int errnum, char *buf, size_t buflen);
96 local_snprintf (char *buf, size_t buflen, const char *format, ...) in gl_lock_define_initialized()
102 result = _vsnprintf (buf, buflen, format, args); in gl_lock_define_initialized()
104 if (buflen > 0 && (result < 0 || result >= buflen)) in gl_lock_define_initialized()
105 buf[buflen - 1] = '\0'; in gl_lock_define_initialized()
114 safe_copy (char *buf, size_t buflen, const char *msg) in safe_copy() argument
119 if (len < buflen) in safe_copy()
128 memcpy (buf, msg, buflen - 1); in safe_copy()
129 buf[buflen - 1] = '\0'; in safe_copy()
137 strerror_r (int errnum, char *buf, size_t buflen) in strerror_r() argument
[all …]
/external/wpa_supplicant_8/src/fst/
Dfst_ctrl_iface.c171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
183 return os_snprintf(buf, buflen, "FAIL\n"); in session_get()
191 return os_snprintf(buf, buflen, in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
222 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
226 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
241 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set()
249 static int session_add(const char *group_id, char *buf, size_t buflen) in session_add() argument
258 return os_snprintf(buf, buflen, "FAIL\n"); in session_add()
[all …]
/external/webrtc/webrtc/base/
Dstringencode.cc26 size_t escape(char * buffer, size_t buflen, in escape() argument
30 if (buflen <= 0) in escape()
34 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in escape()
37 if (bufpos + 2 >= buflen) in escape()
48 size_t unescape(char * buffer, size_t buflen, in unescape() argument
52 if (buflen <= 0) in unescape()
56 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in unescape()
67 size_t encode(char * buffer, size_t buflen, in encode() argument
71 if (buflen <= 0) in encode()
75 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in encode()
[all …]
Dstringencode.h28 size_t utf8_encode(char* buffer, size_t buflen, unsigned long value);
35 size_t escape(char * buffer, size_t buflen,
39 size_t unescape(char * buffer, size_t buflen,
47 size_t encode(char * buffer, size_t buflen,
51 size_t decode(char * buffer, size_t buflen,
61 size_t url_encode(char * buffer, size_t buflen,
64 size_t url_decode(char * buffer, size_t buflen,
68 size_t html_encode(char * buffer, size_t buflen,
71 size_t html_decode(char * buffer, size_t buflen,
75 size_t xml_encode(char * buffer, size_t buflen,
[all …]
Dstringutils.h169 size_t strlenn(const CTYPE* buffer, size_t buflen) { in strlenn() argument
171 while (buffer[bufpos] && (bufpos < buflen)) { in strlenn()
181 size_t strcpyn(CTYPE* buffer, size_t buflen,
183 if (buflen <= 0)
187 srclen = strlenn(source, buflen - 1);
188 } else if (srclen >= buflen) {
189 srclen = buflen - 1;
197 size_t strcatn(CTYPE* buffer, size_t buflen,
199 if (buflen <= 0)
202 size_t bufpos = strlenn(buffer, buflen - 1);
[all …]
/external/wpa_supplicant_8/src/ap/
Dctrl_iface_ap.c31 char *buf, size_t buflen) in hostapd_get_sta_tx_rx() argument
39 ret = os_snprintf(buf, buflen, "rx_packets=%lu\ntx_packets=%lu\n" in hostapd_get_sta_tx_rx()
43 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_tx_rx()
50 char *buf, size_t buflen) in hostapd_get_sta_conn_time() argument
60 ret = os_snprintf(buf, buflen, "connected_time=%u\n", in hostapd_get_sta_conn_time()
62 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_conn_time()
89 char *buf, size_t buflen) in hostapd_ctrl_iface_sta_mib() argument
97 ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=", in hostapd_ctrl_iface_sta_mib()
99 if (os_snprintf_error(buflen - len, ret)) in hostapd_ctrl_iface_sta_mib()
103 ret = ap_sta_flags_txt(sta->flags, buf + len, buflen - len); in hostapd_ctrl_iface_sta_mib()
[all …]
Dctrl_iface_ap.h13 char *buf, size_t buflen);
15 char *buf, size_t buflen);
17 char *buf, size_t buflen);
24 char *buf, size_t buflen);
28 size_t buflen);
/external/ipsec-tools/src/racoon/
Dprivsep.c290 size_t *buflen; in privsep_init() local
309 data += combuf->bufs.buflen[i]; in privsep_init()
310 totallen += combuf->bufs.buflen[i]; in privsep_init()
345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init()
361 reply->bufs.buflen[0] = privkey->l; in privsep_init()
392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init()
398 if (combuf->bufs.buflen[count] == 0) in privsep_init()
401 [combuf->bufs.buflen[count] - 1] = '\0'; in privsep_init()
433 if (combuf->bufs.buflen[count] != sizeof(name)) { in privsep_init()
440 for (i = 0; combuf->bufs.buflen[count]; count++) in privsep_init()
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Dmain_winsvc.c67 DWORD buflen, val; in read_interface() local
81 buflen = sizeof(ctrl_interface); in read_interface()
83 (LPBYTE) ctrl_interface, &buflen); in read_interface()
88 (int) buflen, (char *) ctrl_interface); in read_interface()
92 buflen = sizeof(adapter); in read_interface()
94 (LPBYTE) adapter, &buflen); in read_interface()
99 (int) buflen, (char *) adapter); in read_interface()
103 buflen = sizeof(config); in read_interface()
105 (LPBYTE) config, &buflen); in read_interface()
110 (int) buflen, (char *) config); in read_interface()
[all …]
/external/dtc/tests/
Dget_path.c32 static void check_path_buf(void *fdt, const char *path, int pathlen, int buflen) in check_path_buf() argument
35 char buf[buflen+1]; in check_path_buf()
44 len = fdt_get_path(fdt, offset, buf, buflen); in check_path_buf()
47 if (buflen <= pathlen) { in check_path_buf()
50 "insufficient buffer space", buflen, len); in check_path_buf()
53 FAIL("fdt_get_path([%d bytes]): %s", buflen, in check_path_buf()
57 "instead of 0", buflen, len); in check_path_buf()
60 "instead of \"%s\"", buflen, buf, path); in check_path_buf()
63 if (buf[buflen] != POISON) in check_path_buf()
64 FAIL("fdt_get_path([%d bytes]) overran buffer", buflen); in check_path_buf()
/external/wpa_supplicant_8/src/utils/
Dwpa_debug.c128 ssize_t buflen; in wpa_debug_open_linux_tracing() local
137 buflen = read(mounts, buf, sizeof(buf) - 1); in wpa_debug_open_linux_tracing()
139 if (buflen < 0) { in wpa_debug_open_linux_tracing()
611 int buflen; in wpa_msg() local
616 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg()
619 buf = os_malloc(buflen); in wpa_msg()
636 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg()
641 bin_clear_free(buf, buflen); in wpa_msg()
649 int buflen; in wpa_msg_ctrl() local
656 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_ctrl()
[all …]
/external/fio/lib/
Doutput_buffer.c14 out->buflen = 0; in buf_output_init()
25 if (out->max_buflen - out->buflen < len) { in buf_output_add()
26 size_t need = len - (out->max_buflen - out->buflen); in buf_output_add()
33 old_max = max(old_max, out->buflen + len); in buf_output_add()
39 memcpy(&out->buf[out->buflen], buf, len); in buf_output_add()
40 out->buflen += len; in buf_output_add()
48 if (out->buflen) { in buf_output_flush()
49 ret = log_info_buf(out->buf, out->buflen); in buf_output_flush()
51 out->buflen = 0; in buf_output_flush()
/external/curl/src/
Dtool_getpass.c64 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument
86 &iosb, 0, 0, buffer, buflen, 0, 0, in getpass_r()
105 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument
110 for(i = 0; i < buflen; i++) { in getpass_r()
127 if(i == buflen) in getpass_r()
128 buffer[buflen-1] = '\0'; in getpass_r()
138 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument
140 return getpassword(prompt, buffer, buflen); in getpass_r()
143 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument
165 } while((buffer[i-1] != 13) && (i < buflen)); in getpass_r()
[all …]
/external/ltp/utils/sctp/func_tests/
Dtest_sctp_sendrecvmsg.c87 size_t buflen; in main() local
175 buflen = REALLY_BIG; in main()
176 big_buffer = test_malloc(buflen); in main()
179 error = test_sctp_recvmsg(sk2, big_buffer, buflen, in main()
199 buflen = REALLY_BIG; in main()
202 error = test_sctp_recvmsg(sk1, big_buffer, buflen, in main()
213 buflen = REALLY_BIG; in main()
216 error = test_sctp_recvmsg(sk2, big_buffer, buflen, in main()
275 buflen = REALLY_BIG; in main()
278 test_sctp_recvmsg(sk2, big_buffer, buflen, in main()
[all …]
/external/syslinux/com32/libutil/
Dsha256crypt.c26 uint32_t buflen; member
172 ctx->buflen = 0; in sha256_init_ctx()
184 uint32_t bytes = ctx->buflen; in sha256_finish_ctx()
215 if (ctx->buflen != 0) { in sha256_process_bytes()
216 size_t left_over = ctx->buflen; in sha256_process_bytes()
220 ctx->buflen += add; in sha256_process_bytes()
222 if (ctx->buflen > 64) { in sha256_process_bytes()
223 sha256_process_block(ctx->buffer, ctx->buflen & ~63, ctx); in sha256_process_bytes()
225 ctx->buflen &= 63; in sha256_process_bytes()
228 ctx->buflen); in sha256_process_bytes()
[all …]
Dsha512crypt.c26 uint64_t buflen; member
203 ctx->buflen = 0; in sha512_init_ctx()
215 uint64_t bytes = ctx->buflen; in sha512_finish_ctx()
246 if (ctx->buflen != 0) { in sha512_process_bytes()
247 size_t left_over = ctx->buflen; in sha512_process_bytes()
251 ctx->buflen += add; in sha512_process_bytes()
253 if (ctx->buflen > 128) { in sha512_process_bytes()
254 sha512_process_block(ctx->buffer, ctx->buflen & ~127, ctx); in sha512_process_bytes()
256 ctx->buflen &= 127; in sha512_process_bytes()
259 ctx->buflen); in sha512_process_bytes()
[all …]
/external/jemalloc/test/src/
Dtimer.c30 timer_ratio(timedelta_t *a, timedelta_t *b, char *buf, size_t buflen) in timer_ratio() argument
39 n = malloc_snprintf(&buf[i], buflen-i, "%"FMTu64, t0 / t1); in timer_ratio()
41 if (i >= buflen) in timer_ratio()
48 n = malloc_snprintf(&buf[i], buflen-i, "."); in timer_ratio()
52 while (i < buflen-1) { in timer_ratio()
53 uint64_t round = (i+1 == buflen-1 && ((t0 * mult * 10 / t1) % 10 in timer_ratio()
55 n = malloc_snprintf(&buf[i], buflen-i, in timer_ratio()
/external/dhcpcd-6.8.2/compat/
Dgetline.c41 getline(char ** __restrict buf, size_t * __restrict buflen, in getline() argument
47 if (buf == NULL || buflen == NULL) { in getline()
52 *buflen = 0; in getline()
58 if (*buf == NULL || bytes != 0 || *buflen < BUFSIZ) { in getline()
59 newlen = *buflen + BUFSIZ; in getline()
64 *buflen = newlen; in getline()
/external/libpcap/
Dbpf_filter.c223 bpf_filter_with_aux_data(pc, p, wirelen, buflen, aux_data) in bpf_filter_with_aux_data() argument
227 register u_int buflen;
237 if (buflen == 0) {
240 buflen = MLEN(m);
271 if (k > buflen || sizeof(int32_t) > buflen - k) {
288 if (k > buflen || sizeof(int16_t) > buflen - k) {
319 if (k >= buflen) {
358 if (pc->k > buflen || X > buflen - pc->k ||
359 sizeof(int32_t) > buflen - k) {
376 if (X > buflen || pc->k > buflen - X ||
[all …]
/external/libpcap/bpf/net/
Dbpf_filter.c223 bpf_filter_with_aux_data(pc, p, wirelen, buflen, aux_data) in bpf_filter_with_aux_data() argument
227 register u_int buflen;
237 if (buflen == 0) {
240 buflen = MLEN(m);
271 if (k > buflen || sizeof(int32_t) > buflen - k) {
288 if (k > buflen || sizeof(int16_t) > buflen - k) {
319 if (k >= buflen) {
358 if (pc->k > buflen || X > buflen - pc->k ||
359 sizeof(int32_t) > buflen - k) {
376 if (X > buflen || pc->k > buflen - X ||
[all …]
/external/boringssl/src/crypto/ecdh/
Decdh.c97 size_t buflen = 0; in ECDH_compute_key() local
123 buflen = (EC_GROUP_get_degree(group) + 7) / 8; in ECDH_compute_key()
124 buf = OPENSSL_malloc(buflen); in ECDH_compute_key()
130 if (!BN_bn2bin_padded(buf, buflen, x)) { in ECDH_compute_key()
136 if (kdf(buf, buflen, out, &outlen) == NULL) { in ECDH_compute_key()
142 if (buflen < outlen) { in ECDH_compute_key()
143 outlen = buflen; in ECDH_compute_key()
/external/fio/engines/
Dsplice.c33 int ret, ret2, buflen; in fio_splice_read_old() local
38 buflen = io_u->xfer_buflen; in fio_splice_read_old()
40 while (buflen) { in fio_splice_read_old()
41 int this_len = buflen; in fio_splice_read_old()
54 buflen -= ret; in fio_splice_read_old()
78 int ret , buflen, mmap_len; in fio_splice_read() local
84 mmap_len = buflen = io_u->xfer_buflen; in fio_splice_read()
87 map = mmap(io_u->xfer_buf, buflen, PROT_READ, MAP_PRIVATE|OS_MAP_ANON, 0, 0); in fio_splice_read()
99 while (buflen) { in fio_splice_read()
100 int this_len = buflen; in fio_splice_read()
[all …]
/external/ppp/pppd/
Dutils.c129 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() argument
138 int buflen; in slprintf() local
142 buflen = va_arg(args, int); in slprintf()
145 n = vslprintf(buf, buflen, fmt, args); in slprintf()
153 #define OUTCHAR(c) (buflen > 0? (--buflen, *buf++ = (c)): 0)
156 vslprintf(buf, buflen, fmt, args) in vslprintf() argument
158 int buflen;
175 --buflen;
176 while (buflen > 0) {
181 if (len > buflen)
[all …]
/external/ltp/testcases/kernel/fs/doio/
Dpattern.c40 int pattern_check(char *buf, int buflen, char *pat, int patlen, int patshift) in pattern_check() argument
49 nleft = buflen; in pattern_check()
88 while (ncmp < buflen) { in pattern_check()
101 int pattern_fill(char *buf, int buflen, char *pat, int patlen, int patshift) in pattern_fill() argument
110 nleft = buflen; in pattern_fill()
147 while (ncopied < buflen) { in pattern_fill()
/external/ltp/testcases/kernel/syscalls/sendto/
Dsendto01.c58 int buflen; /* send's 3rd argument */ member
84 .buflen = sizeof(buf),
98 .buflen = sizeof(buf),
114 .buflen = sizeof(buf),
129 .buflen = sizeof(buf),
143 .buflen = sizeof(buf),
157 .buflen = sizeof(buf),
173 .buflen = sizeof(buf),
188 .buflen = sizeof(bigbuf),
202 .buflen = sizeof(buf),
[all …]

12345678910>>...14