/external/bison/lib/ |
D | strerror_r.c | 37 extern int __xpg_strerror_r (int errnum, char *buf, size_t buflen); 96 local_snprintf (char *buf, size_t buflen, const char *format, ...) in gl_lock_define_initialized() 102 result = _vsnprintf (buf, buflen, format, args); in gl_lock_define_initialized() 104 if (buflen > 0 && (result < 0 || result >= buflen)) in gl_lock_define_initialized() 105 buf[buflen - 1] = '\0'; in gl_lock_define_initialized() 114 safe_copy (char *buf, size_t buflen, const char *msg) in safe_copy() argument 119 if (len < buflen) in safe_copy() 128 memcpy (buf, msg, buflen - 1); in safe_copy() 129 buf[buflen - 1] = '\0'; in safe_copy() 137 strerror_r (int errnum, char *buf, size_t buflen) in strerror_r() argument [all …]
|
/external/wpa_supplicant_8/src/fst/ |
D | fst_ctrl_iface.c | 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 183 return os_snprintf(buf, buflen, "FAIL\n"); in session_get() 191 return os_snprintf(buf, buflen, in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 222 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 226 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 241 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set() 249 static int session_add(const char *group_id, char *buf, size_t buflen) in session_add() argument 258 return os_snprintf(buf, buflen, "FAIL\n"); in session_add() [all …]
|
/external/webrtc/webrtc/base/ |
D | stringencode.cc | 26 size_t escape(char * buffer, size_t buflen, in escape() argument 30 if (buflen <= 0) in escape() 34 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in escape() 37 if (bufpos + 2 >= buflen) in escape() 48 size_t unescape(char * buffer, size_t buflen, in unescape() argument 52 if (buflen <= 0) in unescape() 56 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in unescape() 67 size_t encode(char * buffer, size_t buflen, in encode() argument 71 if (buflen <= 0) in encode() 75 while ((srcpos < srclen) && (bufpos + 1 < buflen)) { in encode() [all …]
|
D | stringencode.h | 28 size_t utf8_encode(char* buffer, size_t buflen, unsigned long value); 35 size_t escape(char * buffer, size_t buflen, 39 size_t unescape(char * buffer, size_t buflen, 47 size_t encode(char * buffer, size_t buflen, 51 size_t decode(char * buffer, size_t buflen, 61 size_t url_encode(char * buffer, size_t buflen, 64 size_t url_decode(char * buffer, size_t buflen, 68 size_t html_encode(char * buffer, size_t buflen, 71 size_t html_decode(char * buffer, size_t buflen, 75 size_t xml_encode(char * buffer, size_t buflen, [all …]
|
D | stringutils.h | 169 size_t strlenn(const CTYPE* buffer, size_t buflen) { in strlenn() argument 171 while (buffer[bufpos] && (bufpos < buflen)) { in strlenn() 181 size_t strcpyn(CTYPE* buffer, size_t buflen, 183 if (buflen <= 0) 187 srclen = strlenn(source, buflen - 1); 188 } else if (srclen >= buflen) { 189 srclen = buflen - 1; 197 size_t strcatn(CTYPE* buffer, size_t buflen, 199 if (buflen <= 0) 202 size_t bufpos = strlenn(buffer, buflen - 1); [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | ctrl_iface_ap.c | 31 char *buf, size_t buflen) in hostapd_get_sta_tx_rx() argument 39 ret = os_snprintf(buf, buflen, "rx_packets=%lu\ntx_packets=%lu\n" in hostapd_get_sta_tx_rx() 43 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_tx_rx() 50 char *buf, size_t buflen) in hostapd_get_sta_conn_time() argument 60 ret = os_snprintf(buf, buflen, "connected_time=%u\n", in hostapd_get_sta_conn_time() 62 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_conn_time() 89 char *buf, size_t buflen) in hostapd_ctrl_iface_sta_mib() argument 97 ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=", in hostapd_ctrl_iface_sta_mib() 99 if (os_snprintf_error(buflen - len, ret)) in hostapd_ctrl_iface_sta_mib() 103 ret = ap_sta_flags_txt(sta->flags, buf + len, buflen - len); in hostapd_ctrl_iface_sta_mib() [all …]
|
D | ctrl_iface_ap.h | 13 char *buf, size_t buflen); 15 char *buf, size_t buflen); 17 char *buf, size_t buflen); 24 char *buf, size_t buflen); 28 size_t buflen);
|
/external/ipsec-tools/src/racoon/ |
D | privsep.c | 290 size_t *buflen; in privsep_init() local 309 data += combuf->bufs.buflen[i]; in privsep_init() 310 totallen += combuf->bufs.buflen[i]; in privsep_init() 345 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 361 reply->bufs.buflen[0] = privkey->l; in privsep_init() 392 bufs[0][combuf->bufs.buflen[0] - 1] = '\0'; in privsep_init() 398 if (combuf->bufs.buflen[count] == 0) in privsep_init() 401 [combuf->bufs.buflen[count] - 1] = '\0'; in privsep_init() 433 if (combuf->bufs.buflen[count] != sizeof(name)) { in privsep_init() 440 for (i = 0; combuf->bufs.buflen[count]; count++) in privsep_init() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | main_winsvc.c | 67 DWORD buflen, val; in read_interface() local 81 buflen = sizeof(ctrl_interface); in read_interface() 83 (LPBYTE) ctrl_interface, &buflen); in read_interface() 88 (int) buflen, (char *) ctrl_interface); in read_interface() 92 buflen = sizeof(adapter); in read_interface() 94 (LPBYTE) adapter, &buflen); in read_interface() 99 (int) buflen, (char *) adapter); in read_interface() 103 buflen = sizeof(config); in read_interface() 105 (LPBYTE) config, &buflen); in read_interface() 110 (int) buflen, (char *) config); in read_interface() [all …]
|
/external/dtc/tests/ |
D | get_path.c | 32 static void check_path_buf(void *fdt, const char *path, int pathlen, int buflen) in check_path_buf() argument 35 char buf[buflen+1]; in check_path_buf() 44 len = fdt_get_path(fdt, offset, buf, buflen); in check_path_buf() 47 if (buflen <= pathlen) { in check_path_buf() 50 "insufficient buffer space", buflen, len); in check_path_buf() 53 FAIL("fdt_get_path([%d bytes]): %s", buflen, in check_path_buf() 57 "instead of 0", buflen, len); in check_path_buf() 60 "instead of \"%s\"", buflen, buf, path); in check_path_buf() 63 if (buf[buflen] != POISON) in check_path_buf() 64 FAIL("fdt_get_path([%d bytes]) overran buffer", buflen); in check_path_buf()
|
/external/wpa_supplicant_8/src/utils/ |
D | wpa_debug.c | 128 ssize_t buflen; in wpa_debug_open_linux_tracing() local 137 buflen = read(mounts, buf, sizeof(buf) - 1); in wpa_debug_open_linux_tracing() 139 if (buflen < 0) { in wpa_debug_open_linux_tracing() 611 int buflen; in wpa_msg() local 616 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg() 619 buf = os_malloc(buflen); in wpa_msg() 636 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg() 641 bin_clear_free(buf, buflen); in wpa_msg() 649 int buflen; in wpa_msg_ctrl() local 656 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_ctrl() [all …]
|
/external/fio/lib/ |
D | output_buffer.c | 14 out->buflen = 0; in buf_output_init() 25 if (out->max_buflen - out->buflen < len) { in buf_output_add() 26 size_t need = len - (out->max_buflen - out->buflen); in buf_output_add() 33 old_max = max(old_max, out->buflen + len); in buf_output_add() 39 memcpy(&out->buf[out->buflen], buf, len); in buf_output_add() 40 out->buflen += len; in buf_output_add() 48 if (out->buflen) { in buf_output_flush() 49 ret = log_info_buf(out->buf, out->buflen); in buf_output_flush() 51 out->buflen = 0; in buf_output_flush()
|
/external/curl/src/ |
D | tool_getpass.c | 64 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 86 &iosb, 0, 0, buffer, buflen, 0, 0, in getpass_r() 105 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 110 for(i = 0; i < buflen; i++) { in getpass_r() 127 if(i == buflen) in getpass_r() 128 buffer[buflen-1] = '\0'; in getpass_r() 138 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 140 return getpassword(prompt, buffer, buflen); in getpass_r() 143 char *getpass_r(const char *prompt, char *buffer, size_t buflen) in getpass_r() argument 165 } while((buffer[i-1] != 13) && (i < buflen)); in getpass_r() [all …]
|
/external/ltp/utils/sctp/func_tests/ |
D | test_sctp_sendrecvmsg.c | 87 size_t buflen; in main() local 175 buflen = REALLY_BIG; in main() 176 big_buffer = test_malloc(buflen); in main() 179 error = test_sctp_recvmsg(sk2, big_buffer, buflen, in main() 199 buflen = REALLY_BIG; in main() 202 error = test_sctp_recvmsg(sk1, big_buffer, buflen, in main() 213 buflen = REALLY_BIG; in main() 216 error = test_sctp_recvmsg(sk2, big_buffer, buflen, in main() 275 buflen = REALLY_BIG; in main() 278 test_sctp_recvmsg(sk2, big_buffer, buflen, in main() [all …]
|
/external/syslinux/com32/libutil/ |
D | sha256crypt.c | 26 uint32_t buflen; member 172 ctx->buflen = 0; in sha256_init_ctx() 184 uint32_t bytes = ctx->buflen; in sha256_finish_ctx() 215 if (ctx->buflen != 0) { in sha256_process_bytes() 216 size_t left_over = ctx->buflen; in sha256_process_bytes() 220 ctx->buflen += add; in sha256_process_bytes() 222 if (ctx->buflen > 64) { in sha256_process_bytes() 223 sha256_process_block(ctx->buffer, ctx->buflen & ~63, ctx); in sha256_process_bytes() 225 ctx->buflen &= 63; in sha256_process_bytes() 228 ctx->buflen); in sha256_process_bytes() [all …]
|
D | sha512crypt.c | 26 uint64_t buflen; member 203 ctx->buflen = 0; in sha512_init_ctx() 215 uint64_t bytes = ctx->buflen; in sha512_finish_ctx() 246 if (ctx->buflen != 0) { in sha512_process_bytes() 247 size_t left_over = ctx->buflen; in sha512_process_bytes() 251 ctx->buflen += add; in sha512_process_bytes() 253 if (ctx->buflen > 128) { in sha512_process_bytes() 254 sha512_process_block(ctx->buffer, ctx->buflen & ~127, ctx); in sha512_process_bytes() 256 ctx->buflen &= 127; in sha512_process_bytes() 259 ctx->buflen); in sha512_process_bytes() [all …]
|
/external/jemalloc/test/src/ |
D | timer.c | 30 timer_ratio(timedelta_t *a, timedelta_t *b, char *buf, size_t buflen) in timer_ratio() argument 39 n = malloc_snprintf(&buf[i], buflen-i, "%"FMTu64, t0 / t1); in timer_ratio() 41 if (i >= buflen) in timer_ratio() 48 n = malloc_snprintf(&buf[i], buflen-i, "."); in timer_ratio() 52 while (i < buflen-1) { in timer_ratio() 53 uint64_t round = (i+1 == buflen-1 && ((t0 * mult * 10 / t1) % 10 in timer_ratio() 55 n = malloc_snprintf(&buf[i], buflen-i, in timer_ratio()
|
/external/dhcpcd-6.8.2/compat/ |
D | getline.c | 41 getline(char ** __restrict buf, size_t * __restrict buflen, in getline() argument 47 if (buf == NULL || buflen == NULL) { in getline() 52 *buflen = 0; in getline() 58 if (*buf == NULL || bytes != 0 || *buflen < BUFSIZ) { in getline() 59 newlen = *buflen + BUFSIZ; in getline() 64 *buflen = newlen; in getline()
|
/external/libpcap/ |
D | bpf_filter.c | 223 bpf_filter_with_aux_data(pc, p, wirelen, buflen, aux_data) in bpf_filter_with_aux_data() argument 227 register u_int buflen; 237 if (buflen == 0) { 240 buflen = MLEN(m); 271 if (k > buflen || sizeof(int32_t) > buflen - k) { 288 if (k > buflen || sizeof(int16_t) > buflen - k) { 319 if (k >= buflen) { 358 if (pc->k > buflen || X > buflen - pc->k || 359 sizeof(int32_t) > buflen - k) { 376 if (X > buflen || pc->k > buflen - X || [all …]
|
/external/libpcap/bpf/net/ |
D | bpf_filter.c | 223 bpf_filter_with_aux_data(pc, p, wirelen, buflen, aux_data) in bpf_filter_with_aux_data() argument 227 register u_int buflen; 237 if (buflen == 0) { 240 buflen = MLEN(m); 271 if (k > buflen || sizeof(int32_t) > buflen - k) { 288 if (k > buflen || sizeof(int16_t) > buflen - k) { 319 if (k >= buflen) { 358 if (pc->k > buflen || X > buflen - pc->k || 359 sizeof(int32_t) > buflen - k) { 376 if (X > buflen || pc->k > buflen - X || [all …]
|
/external/boringssl/src/crypto/ecdh/ |
D | ecdh.c | 97 size_t buflen = 0; in ECDH_compute_key() local 123 buflen = (EC_GROUP_get_degree(group) + 7) / 8; in ECDH_compute_key() 124 buf = OPENSSL_malloc(buflen); in ECDH_compute_key() 130 if (!BN_bn2bin_padded(buf, buflen, x)) { in ECDH_compute_key() 136 if (kdf(buf, buflen, out, &outlen) == NULL) { in ECDH_compute_key() 142 if (buflen < outlen) { in ECDH_compute_key() 143 outlen = buflen; in ECDH_compute_key()
|
/external/fio/engines/ |
D | splice.c | 33 int ret, ret2, buflen; in fio_splice_read_old() local 38 buflen = io_u->xfer_buflen; in fio_splice_read_old() 40 while (buflen) { in fio_splice_read_old() 41 int this_len = buflen; in fio_splice_read_old() 54 buflen -= ret; in fio_splice_read_old() 78 int ret , buflen, mmap_len; in fio_splice_read() local 84 mmap_len = buflen = io_u->xfer_buflen; in fio_splice_read() 87 map = mmap(io_u->xfer_buf, buflen, PROT_READ, MAP_PRIVATE|OS_MAP_ANON, 0, 0); in fio_splice_read() 99 while (buflen) { in fio_splice_read() 100 int this_len = buflen; in fio_splice_read() [all …]
|
/external/ppp/pppd/ |
D | utils.c | 129 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() argument 138 int buflen; in slprintf() local 142 buflen = va_arg(args, int); in slprintf() 145 n = vslprintf(buf, buflen, fmt, args); in slprintf() 153 #define OUTCHAR(c) (buflen > 0? (--buflen, *buf++ = (c)): 0) 156 vslprintf(buf, buflen, fmt, args) in vslprintf() argument 158 int buflen; 175 --buflen; 176 while (buflen > 0) { 181 if (len > buflen) [all …]
|
/external/ltp/testcases/kernel/fs/doio/ |
D | pattern.c | 40 int pattern_check(char *buf, int buflen, char *pat, int patlen, int patshift) in pattern_check() argument 49 nleft = buflen; in pattern_check() 88 while (ncmp < buflen) { in pattern_check() 101 int pattern_fill(char *buf, int buflen, char *pat, int patlen, int patshift) in pattern_fill() argument 110 nleft = buflen; in pattern_fill() 147 while (ncopied < buflen) { in pattern_fill()
|
/external/ltp/testcases/kernel/syscalls/sendto/ |
D | sendto01.c | 58 int buflen; /* send's 3rd argument */ member 84 .buflen = sizeof(buf), 98 .buflen = sizeof(buf), 114 .buflen = sizeof(buf), 129 .buflen = sizeof(buf), 143 .buflen = sizeof(buf), 157 .buflen = sizeof(buf), 173 .buflen = sizeof(buf), 188 .buflen = sizeof(bigbuf), 202 .buflen = sizeof(buf), [all …]
|