/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast_pac.c | 666 * @max_len: Maximum length of the list (>= 1) 670 size_t max_len) 681 if (count > max_len) 687 if (count <= max_len || prev == NULL) 669 eap_fast_pac_list_truncate(struct eap_fast_pac *pac_root, size_t max_len) argument
|
H A D | eap.c | 976 size_t max_len, size_t *imsi_len) 981 if (*imsi_len + 36 > max_len) { 1008 pos += os_snprintf(pos, imsi + max_len - pos, 975 eap_sm_append_3gpp_realm(struct eap_sm *sm, char *imsi, size_t max_len, size_t *imsi_len) argument
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
H A D | srtpfilter.cc | 210 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument 215 return send_session_->ProtectRtp(p, in_len, max_len, out_len); 218 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len, argument 225 return send_session_->ProtectRtp(p, in_len, max_len, out_len, index); 228 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { argument 234 return send_rtcp_session_->ProtectRtcp(p, in_len, max_len, out_len); 236 return send_session_->ProtectRtcp(p, in_len, max_len, out_len); 494 bool SrtpSession::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument 501 if (max_len < need_len) { 503 << max_len << " i 525 ProtectRtp(void* p, int in_len, int max_len, int* out_len, int64* index) argument 533 ProtectRtcp(void* p, int in_len, int max_len, int* out_len) argument 786 ProtectRtp(void* data, int in_len, int max_len, int* out_len) argument 791 ProtectRtcp(void* data, int in_len, int max_len, int* out_len) argument [all...] |
/external/chromium_org/ui/gfx/ |
H A D | text_elider.cc | 265 int max_len, 267 DCHECK_GE(max_len, 0); 268 if (static_cast<int>(input.length()) <= max_len) { 273 switch (max_len) { 292 int rstr_len = (max_len - 3) / 2; 293 int lstr_len = rstr_len + ((max_len - 3) % 2); 264 ElideString(const base::string16& input, int max_len, base::string16* output) argument
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_linux_libcdep.cc | 140 bool SanitizerGetThreadName(char *name, int max_len) { argument 145 internal_strncpy(name, buff, max_len); 146 name[max_len] = 0;
|
/external/e2fsprogs/lib/ext2fs/ |
H A D | extent.c | 1155 int max_len = EXT_INIT_MAX_LEN; local 1180 max_len = EXT_UNINIT_MAX_LEN; 1286 ((int) extent.e_len < max_len-1)) { 1292 ((int) extent.e_len < max_len - 1)) { 1301 ((int) next_extent.e_len < max_len - 1)) { 1347 ((int) next_extent.e_len < max_len - 1)) { 1389 ((int) prev_extent.e_len < max_len-1)) { 1559 info->max_len = (1UL << 15);
|
/external/libnfc-nci/src/nfc/nfc/ |
H A D | nfc_ncif.c | 1028 UINT8 max_len; local 1065 max_len = ulen; 1069 if (max_len > NFC_MAX_AID_LEN) 1070 max_len = NFC_MAX_AID_LEN; 1071 evt_data.act_data.param.app_init.len_aid = max_len; 1075 if (max_len > NFC_MAX_APP_DATA_LEN) 1076 max_len = NFC_MAX_APP_DATA_LEN; 1077 evt_data.act_data.param.app_init.len_data = max_len; 1083 STREAM_TO_ARRAY (p_data, p, max_len);
|
/external/openssl/ssl/ |
H A D | d1_both.c | 595 unsigned long max_len = DTLS1_HM_HEADER_LENGTH + SSL3_RT_MAX_ENCRYPTED_LENGTH; local 596 if (max_len < (unsigned long)s->max_cert_list) 598 return max_len;
|
/external/qemu/util/ |
H A D | cutils.c | 98 int qemu_strnlen(const char *s, int max_len) argument 102 for(i = 0; i < max_len; i++) {
|
/external/chromium_org/third_party/mesa/src/src/mesa/main/ |
H A D | shaderapi.c | 513 GLint max_len = 0; local 520 if (len > max_len) 521 max_len = len; 524 *params = max_len; 535 GLint max_len = 0; local 544 if (len > max_len) 545 max_len = len; 548 *params = max_len; 576 GLint max_len = 0; local 586 if (len > max_len) [all...] |
/external/libnfc-nci/src/nfa/ee/ |
H A D | nfa_ee_act.c | 1920 NFA_TRACE_DEBUG5 ("nfa_ee_route_add_one_ecb max_len:%d, max_tlv:%d, cur_offset:%d, more:%d, num_tlv:%d", 2205 int max_len, len; local 2239 max_len = NFC_GetLmrtSize(); 2240 max_tlv = (UINT8)((max_len > NFA_EE_ROUT_MAX_TLV_SIZE)?NFA_EE_ROUT_MAX_TLV_SIZE:max_len); 2244 status = nfa_ee_route_add_one_ecb(&nfa_ee_cb.ecb[NFA_EE_CB_4_DH], &max_len, more, p, &cur_offset); 2259 status = nfa_ee_route_add_one_ecb(p_cb, &max_len, more, p, &cur_offset);
|
/external/mesa3d/src/mesa/main/ |
H A D | shaderapi.c | 513 GLint max_len = 0; local 520 if (len > max_len) 521 max_len = len; 524 *params = max_len; 535 GLint max_len = 0; local 544 if (len > max_len) 545 max_len = len; 548 *params = max_len; 576 GLint max_len = 0; local 586 if (len > max_len) [all...] |
/external/srec/srec/Semproc/src/ |
H A D | SemanticGraphImpl.c | 968 ESR_ReturnCode make_union_of_scripts(LCHAR* union_script, const size_t max_len, const LCHAR* a, const LCHAR* b) argument 981 if (LSTRLEN(a) > max_len) return ESR_BUFFER_OVERFLOW; 995 if ((LSTRLEN(a) + LSTRLEN(b) - 2) > max_len) 997 PLogError("Temp buffer (size %d) to hold union of multiple meanings (size %d) is too small", max_len, (LSTRLEN(a) + LSTRLEN(b) - 2));
|
/external/wpa_supplicant_8/hostapd/ |
H A D | ctrl_iface.c | 287 size_t max_len) 304 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 316 char *reply, size_t max_len, 326 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 339 size_t max_len) 343 max_len, 0); 347 max_len, 1); 363 size_t max_len) 389 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 285 hostapd_ctrl_iface_wps_nfc_config_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 315 hostapd_ctrl_iface_wps_nfc_token_gen(struct hostapd_data *hapd, char *reply, size_t max_len, int ndef) argument 337 hostapd_ctrl_iface_wps_nfc_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 361 hostapd_ctrl_iface_nfc_get_handover_sel(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 638 size_t max_len, int auth_alg, 658 end = pos + max_len; 637 wpa_sm_write_assoc_resp_ies(struct wpa_state_machine *sm, u8 *pos, size_t max_len, int auth_alg, const u8 *req_ies, size_t req_ies_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 976 size_t max_len, size_t *imsi_len) 981 if (*imsi_len + 36 > max_len) { 1008 pos += os_snprintf(pos, imsi + max_len - pos, 975 eap_sm_append_3gpp_realm(struct eap_sm *sm, char *imsi, size_t max_len, size_t *imsi_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 638 size_t max_len, int auth_alg, 658 end = pos + max_len; 637 wpa_sm_write_assoc_resp_ies(struct wpa_state_machine *sm, u8 *pos, size_t max_len, int auth_alg, const u8 *req_ies, size_t req_ies_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 976 size_t max_len, size_t *imsi_len) 981 if (*imsi_len + 36 > max_len) { 1008 pos += os_snprintf(pos, imsi + max_len - pos, 975 eap_sm_append_3gpp_realm(struct eap_sm *sm, char *imsi, size_t max_len, size_t *imsi_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 638 size_t max_len, int auth_alg, 658 end = pos + max_len; 637 wpa_sm_write_assoc_resp_ies(struct wpa_state_machine *sm, u8 *pos, size_t max_len, int auth_alg, const u8 *req_ies, size_t req_ies_len) argument
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_sec.c | 1915 ** max_len - p_data size. 1925 UINT16 BTM_BuildOobData(UINT8 *p_data, UINT16 max_len, BT_OCTET16 c, argument 1936 if (p_data && max_len >= BTM_OOB_MANDATORY_SIZE) 1943 max_len -= len; 1949 if (max_len >= delta) 1955 max_len -= delta; 1960 if (max_len >= delta) 1966 max_len -= delta; 1971 if (max_len >= delta) 1977 max_len 2021 UINT16 max_len; local [all...] |
/external/chromium_org/gpu/command_buffer/service/ |
H A D | program_manager.cc | 260 GLint max_len = 0; local 261 glGetProgramiv(service_id_, GL_INFO_LOG_LENGTH, &max_len); 262 if (max_len == 0) { 266 scoped_ptr<char[]> temp(new char[max_len]); 268 glGetProgramInfoLog(service_id_, max_len, &len, temp.get()); 269 DCHECK(max_len == 0 || len < max_len); 377 GLint max_len = 0; local 380 glGetProgramiv(service_id_, GL_ACTIVE_ATTRIBUTE_MAX_LENGTH, &max_len); 382 scoped_ptr<char[]> name_buffer(new char[max_len]); [all...] |
/external/chromium_org/net/quic/test_tools/ |
H A D | quic_test_utils.cc | 499 const int max_len = max(actual_len, expected_len); local 500 scoped_ptr<bool[]> marks(new bool[max_len]); 510 for (int i = min_len; i < max_len; ++i) { 518 << HexDumpWithMarks(expected, expected_len, marks.get(), max_len) 520 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
|
/external/chromium_org/third_party/libwebp/enc/ |
H A D | backward_references.c | 246 const uint32_t* const argb, int max_len, 259 if (max_len > MAX_LENGTH) { 260 max_len = MAX_LENGTH; 282 curr_length = FindMatchLength(argb + pos, argb_start, max_len); 303 if (curr_length >= (uint32_t)max_len) { 378 int max_len = pix_count - i; local 379 HashChainFindCopy(hash_chain, i, xsize, argb, max_len, 391 int max_len = pix_count - (i + 1); local 392 HashChainFindCopy(hash_chain, i + 1, xsize, argb, max_len, 610 int max_len local 244 HashChainFindCopy(const VP8LHashChain* const p, int base_position, int xsize_signed, const uint32_t* const argb, int max_len, int window_size, int iter_pos, int iter_limit, int* const distance_ptr, int* const length_ptr) argument 732 int max_len = chosen_path[ix]; local [all...] |
/external/webp/src/enc/ |
H A D | backward_references.c | 246 const uint32_t* const argb, int max_len, 259 if (max_len > MAX_LENGTH) { 260 max_len = MAX_LENGTH; 282 curr_length = FindMatchLength(argb + pos, argb_start, max_len); 303 if (curr_length >= (uint32_t)max_len) { 378 int max_len = pix_count - i; local 379 HashChainFindCopy(hash_chain, i, xsize, argb, max_len, 391 int max_len = pix_count - (i + 1); local 392 HashChainFindCopy(hash_chain, i + 1, xsize, argb, max_len, 610 int max_len local 244 HashChainFindCopy(const VP8LHashChain* const p, int base_position, int xsize_signed, const uint32_t* const argb, int max_len, int window_size, int iter_pos, int iter_limit, int* const distance_ptr, int* const length_ptr) argument 732 int max_len = chosen_path[ix]; local [all...] |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_dm.c | 3157 int max_len = sizeof(btif_default_local_name) - 1; local 3160 strncpy(btif_default_local_name, BTM_DEF_LOCAL_NAME, max_len); 3166 strncpy(btif_default_local_name, prop_model, max_len); 3168 btif_default_local_name[max_len] = '\0';
|