/external/qemu/hw/ |
H A D | scsi-disk.c | 516 int max_len = 255 - 8; local 518 if (id_len > max_len) 519 id_len = max_len;
|
/external/srec/srec/Vocabulary/src/ |
H A D | VocabularyImpl.c | 327 int append_to_each_with_joiner( LCHAR* phrase_prons, const LCHAR* word_prons, const LCHAR joiner, size_t max_len, size_t* len) argument 335 max_dst = phrase_prons+max_len-3;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | beacon.c | 115 int max_len) 118 u8 *end = eid + max_len; 124 if (!hapd->iconf->ieee80211d || max_len < 6 || 114 hostapd_eid_country(struct hostapd_data *hapd, u8 *eid, int max_len) argument
|
H A D | wpa_auth_ft.c | 618 size_t max_len, int auth_alg, 639 end = pos + max_len; 617 wpa_sm_write_assoc_resp_ies(struct wpa_state_machine *sm, u8 *pos, size_t max_len, int auth_alg, const u8 *req_ies, size_t req_ies_len) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 113 size_t len, max_len; local 115 max_len = sizeof(buf); 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast_pac.c | 664 * @max_len: Maximum length of the list (>= 1) 668 size_t max_len) 679 if (count > max_len) 685 if (count <= max_len || prev == NULL) 667 eap_fast_pac_list_truncate(struct eap_fast_pac *pac_root, size_t max_len) argument
|
H A D | eap.c | 947 size_t max_len, size_t *imsi_len) 952 if (*imsi_len + 36 > max_len) { 979 pos += os_snprintf(pos, imsi + max_len - pos, 946 eap_sm_append_3gpp_realm(struct eap_sm *sm, char *imsi, size_t max_len, size_t *imsi_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | beacon.c | 115 int max_len) 118 u8 *end = eid + max_len; 124 if (!hapd->iconf->ieee80211d || max_len < 6 || 114 hostapd_eid_country(struct hostapd_data *hapd, u8 *eid, int max_len) argument
|
H A D | wpa_auth_ft.c | 618 size_t max_len, int auth_alg, 639 end = pos + max_len; 617 wpa_sm_write_assoc_resp_ies(struct wpa_state_machine *sm, u8 *pos, size_t max_len, int auth_alg, const u8 *req_ies, size_t req_ies_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 113 size_t len, max_len; local 115 max_len = sizeof(buf); 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast_pac.c | 664 * @max_len: Maximum length of the list (>= 1) 668 size_t max_len) 679 if (count > max_len) 685 if (count <= max_len || prev == NULL) 667 eap_fast_pac_list_truncate(struct eap_fast_pac *pac_root, size_t max_len) argument
|
H A D | eap.c | 947 size_t max_len, size_t *imsi_len) 952 if (*imsi_len + 36 > max_len) { 979 pos += os_snprintf(pos, imsi + max_len - pos, 946 eap_sm_append_3gpp_realm(struct eap_sm *sm, char *imsi, size_t max_len, size_t *imsi_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | beacon.c | 115 int max_len) 118 u8 *end = eid + max_len; 124 if (!hapd->iconf->ieee80211d || max_len < 6 || 114 hostapd_eid_country(struct hostapd_data *hapd, u8 *eid, int max_len) argument
|
H A D | wpa_auth_ft.c | 618 size_t max_len, int auth_alg, 639 end = pos + max_len; 617 wpa_sm_write_assoc_resp_ies(struct wpa_state_machine *sm, u8 *pos, size_t max_len, int auth_alg, const u8 *req_ies, size_t req_ies_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 113 size_t len, max_len; local 115 max_len = sizeof(buf); 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast_pac.c | 664 * @max_len: Maximum length of the list (>= 1) 668 size_t max_len) 679 if (count > max_len) 685 if (count <= max_len || prev == NULL) 667 eap_fast_pac_list_truncate(struct eap_fast_pac *pac_root, size_t max_len) argument
|
H A D | eap.c | 947 size_t max_len, size_t *imsi_len) 952 if (*imsi_len + 36 > max_len) { 979 pos += os_snprintf(pos, imsi + max_len - pos, 946 eap_sm_append_3gpp_realm(struct eap_sm *sm, char *imsi, size_t max_len, size_t *imsi_len) argument
|
/external/chromium/net/spdy/ |
H A D | spdy_framer_test.cc | 55 const int max_len = actual_len > expected_len ? actual_len : expected_len; local 56 scoped_array<bool> marks(new bool[max_len]); 66 for (int i = min_len; i < max_len; ++i) { 74 << HexDumpWithMarks(expected, expected_len, marks.get(), max_len) 76 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
|
/external/libnfc-nci/src/nfc/nfc/ |
H A D | nfc_ncif.c | 1025 UINT8 max_len; local 1062 max_len = ulen; 1066 if (max_len > NFC_MAX_AID_LEN) 1067 max_len = NFC_MAX_AID_LEN; 1068 evt_data.act_data.param.app_init.len_aid = max_len; 1072 if (max_len > NFC_MAX_APP_DATA_LEN) 1073 max_len = NFC_MAX_APP_DATA_LEN; 1074 evt_data.act_data.param.app_init.len_data = max_len; 1080 STREAM_TO_ARRAY (p_data, p, max_len);
|
/external/openssl/ssl/ |
H A D | d1_both.c | 591 unsigned long frag_len = msg_hdr->frag_len, max_len; local 600 max_len = s->max_cert_list; 602 max_len = DTLS1_HM_HEADER_LENGTH + SSL3_RT_MAX_ENCRYPTED_LENGTH; 604 if ((msg_hdr->frag_off+frag_len) > max_len)
|
/external/wpa_supplicant_8/hostapd/ |
H A D | ctrl_iface.c | 283 size_t max_len) 300 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 312 char *reply, size_t max_len, 322 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 335 size_t max_len) 339 max_len, 0); 343 max_len, 1); 359 size_t max_len) 385 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 281 hostapd_ctrl_iface_wps_nfc_config_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 311 hostapd_ctrl_iface_wps_nfc_token_gen(struct hostapd_data *hapd, char *reply, size_t max_len, int ndef) argument 333 hostapd_ctrl_iface_wps_nfc_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 357 hostapd_ctrl_iface_nfc_get_handover_sel(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument
|
/external/e2fsprogs/lib/ext2fs/ |
H A D | extent.c | 1152 int max_len = EXT_INIT_MAX_LEN; local 1177 max_len = EXT_UNINIT_MAX_LEN; 1283 ((int) extent.e_len < max_len-1)) { 1289 ((int) extent.e_len < max_len - 1)) { 1298 ((int) next_extent.e_len < max_len - 1)) { 1344 ((int) next_extent.e_len < max_len - 1)) { 1383 ((int) prev_extent.e_len < max_len-1)) { 1547 info->max_len = (1UL << 15); 1973 printf("\tmax_len: %u, max_uninit_len: %u\n", info.max_len,
|
/external/libnfc-nci/src/nfa/ee/ |
H A D | nfa_ee_act.c | 1572 tNFA_STATUS nfa_ee_route_add_one_ecb(tNFA_EE_ECB *p_cb, int max_len, BOOLEAN more, UINT8 *ps, int *p_cur_offset) argument 1581 UINT8 max_tlv = (UINT8)((max_len > NFA_EE_ROUT_MAX_TLV_SIZE)?NFA_EE_ROUT_MAX_TLV_SIZE:max_len); 1586 NFA_TRACE_DEBUG5 ("nfa_ee_route_add_one_ecb max_len:%d, max_tlv:%d, cur_offset:%d, more:%d, num_tlv:%d", 1587 max_len, max_tlv, *p_cur_offset, more, num_tlv); 1840 int max_len, len; local 1873 max_len = NFC_GetLmrtSize(); 1877 status = nfa_ee_route_add_one_ecb(&nfa_ee_cb.ecb[NFA_EE_CB_4_DH], max_len, more, p, &cur_offset); 1892 status = nfa_ee_route_add_one_ecb(p_cb, max_len, more, p, &cur_offset);
|
/external/srec/srec/Semproc/src/ |
H A D | SemanticGraphImpl.c | 968 ESR_ReturnCode make_union_of_scripts(LCHAR* union_script, const size_t max_len, const LCHAR* a, const LCHAR* b) argument 981 if (LSTRLEN(a) > max_len) return ESR_BUFFER_OVERFLOW; 995 if ((LSTRLEN(a) + LSTRLEN(b) - 2) > max_len) 997 PLogError("Temp buffer (size %d) to hold union of multiple meanings (size %d) is too small", max_len, (LSTRLEN(a) + LSTRLEN(b) - 2));
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_sec.c | 1778 ** max_len - p_data size. 1788 UINT16 BTM_BuildOobData(UINT8 *p_data, UINT16 max_len, BT_OCTET16 c, argument 1799 if (p_data && max_len >= BTM_OOB_MANDATORY_SIZE) 1806 max_len -= len; 1812 if (max_len >= delta) 1818 max_len -= delta; 1823 if (max_len >= delta) 1829 max_len -= delta; 1834 if (max_len >= delta) 1840 max_len 1884 UINT16 max_len; local [all...] |