/external/e2fsprogs/lib/e2p/ |
H A D | iod.c | 30 int max_len = -1, len, ret = 0; local 33 max_len = pathconf(dir_name, _PC_NAME_MAX); 35 if (max_len == -1) { 37 max_len = _POSIX_NAME_MAX; 40 max_len = NAME_MAX; 42 max_len = 256; 46 max_len += sizeof(struct dirent); 48 de = malloc(max_len+1); 51 memset(de, 0, max_len+1); 61 if (len > max_len) [all...] |
/external/bluetooth/glib/glib/ |
H A D | gunicodeprivate.h | 30 gssize max_len,
|
H A D | gutf8.c | 706 gssize max_len) 749 if (max_len >= 0 && len > max_len) 751 for (i = 1; i < max_len; i++) 784 * @max_len: the maximum number of bytes to read, or -1, for no maximum or 794 * character (or if @max_len is zero), returns (gunichar)-2; 800 gssize max_len) 804 if (max_len == 0) 807 result = g_utf8_get_char_extended (p, max_len); 1654 gssize max_len) 705 g_utf8_get_char_extended(const gchar *p, gssize max_len) argument 799 g_utf8_get_char_validated(const gchar *p, gssize max_len) argument 1653 fast_validate_len(const char *str, gssize max_len) argument 1754 g_utf8_validate(const char *str, gssize max_len, const gchar **end) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | uuid.h | 21 int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
|
H A D | uuid.c | 55 int uuid_bin2str(const u8 *bin, char *str, size_t max_len) argument 58 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 64 if (len < 0 || (size_t) len >= max_len)
|
H A D | ip_addr.h | 25 u8 max_len[16]; member in union:hostapd_ip_addr::__anon12905
|
/external/wpa_supplicant_8/src/utils/ |
H A D | uuid.h | 21 int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
|
H A D | uuid.c | 55 int uuid_bin2str(const u8 *bin, char *str, size_t max_len) argument 58 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 64 if (len < 0 || (size_t) len >= max_len)
|
H A D | ip_addr.h | 25 u8 max_len[16]; member in union:hostapd_ip_addr::__anon13124
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | uuid.h | 21 int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
|
H A D | uuid.c | 55 int uuid_bin2str(const u8 *bin, char *str, size_t max_len) argument 58 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 64 if (len < 0 || (size_t) len >= max_len)
|
H A D | ip_addr.h | 25 u8 max_len[16]; member in union:hostapd_ip_addr::__anon13344
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
H A D | uuid.h | 21 int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
|
H A D | uuid.c | 57 int uuid_bin2str(const u8 *bin, char *str, size_t max_len) argument 60 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 66 if (len < 0 || (size_t) len >= max_len)
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
H A D | srtpfilter.h | 72 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 73 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 120 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 121 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len);
|
H A D | srtpfilter.cc | 123 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument 128 return send_session_.ProtectRtp(p, in_len, max_len, out_len); 131 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { argument 136 return send_session_.ProtectRtcp(p, in_len, max_len, out_len); 271 bool SrtpSession::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument 278 if (max_len < need_len) { 280 << max_len << " is less than the needed " << need_len; 293 bool SrtpSession::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { argument 300 if (max_len < need_len) { 302 << max_len << " i 474 ProtectRtp(void* data, int in_len, int max_len, int* out_len) argument 479 ProtectRtcp(void* data, int in_len, int max_len, int* out_len) argument [all...] |
/external/qemu/android/ |
H A D | charmap.h | 48 * max_len - charmap_name buffer size. 52 int max_len);
|
/external/openssl/crypto/asn1/ |
H A D | evp_asn1.c | 74 /* int max_len: for returned value */ 76 int max_len) 88 if (ret < max_len) 91 num=max_len; 137 /* int max_len: for returned value */ 139 int max_len) 173 if (max_len > ret) 176 n=max_len; 75 ASN1_TYPE_get_octetstring(ASN1_TYPE *a, unsigned char *data, int max_len) argument 138 ASN1_TYPE_get_int_octetstring(ASN1_TYPE *a, long *num, unsigned char *data, int max_len) argument
|
/external/speex/include/speex/ |
H A D | speex_bits.h | 94 * @param max_len Maximum number of bytes to write (i.e. size of the "bytes" buffer) 97 int speex_bits_write(SpeexBits *bits, char *bytes, int max_len); 100 int speex_bits_write_whole_bytes(SpeexBits *bits, char *bytes, int max_len);
|
/external/bluetooth/glib/tests/ |
H A D | utf8-validate.c | 34 gint max_len; member in struct:__anon722 38 /* some tests to check max_len handling */ 280 gint max_len, 287 result = g_utf8_validate (text, max_len, &end); 302 str->str, max_len, 315 do_test (i, test[i].text, test[i].max_len, 278 do_test(gint index, const gchar *text, gint max_len, gint offset, gboolean valid) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast_pac.h | 50 size_t max_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast_pac.h | 50 size_t max_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast_pac.h | 50 size_t max_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast_pac.h | 50 size_t max_len);
|
/external/qemu/ |
H A D | os-posix.c | 101 size_t max_len; local 136 max_len = strlen(dir) + 138 res = qemu_mallocz(max_len); 139 snprintf(res, max_len, "%s%s", dir, SHARE_SUFFIX); 141 snprintf(res, max_len, "%s%s", dir, BUILD_SUFFIX);
|