/external/chromium_org/net/http/ |
H A D | http_chunked_decoder.cc | 69 int HttpChunkedDecoder::FilterBuf(char* buf, int buf_len) { argument 72 while (buf_len) { 74 int num = std::min(chunk_remaining_, buf_len); 76 buf_len -= num; 87 bytes_after_eof_ += buf_len; 91 int bytes_consumed = ScanForChunkRemaining(buf, buf_len); 95 buf_len -= bytes_consumed; 96 if (buf_len) 97 memmove(buf, buf + bytes_consumed, buf_len); 103 int HttpChunkedDecoder::ScanForChunkRemaining(const char* buf, int buf_len) { argument [all...] |
H A D | http_chunked_decoder.h | 97 int FilterBuf(char* buf, int buf_len); 103 int ScanForChunkRemaining(const char* buf, int buf_len);
|
/external/chromium_org/chrome/browser/media_galleries/fileapi/ |
H A D | mtp_device_async_delegate.cc | 10 uint32 file_id, net::IOBuffer* buf, int64 offset, int buf_len, 16 buf_len(buf_len), 9 ReadBytesRequest( uint32 file_id, net::IOBuffer* buf, int64 offset, int buf_len, const ReadBytesSuccessCallback& success_callback, const ErrorCallback& error_callback) argument
|
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
H A D | open_memstream.cc | 29 size_t buf_len; local 30 fprintf(stderr, " &buf %p, &buf_len %p\n", &buf, &buf_len); 31 FILE *fp = open_memstream(&buf, &buf_len); 35 check_mem_is_good(&buf_len, sizeof(buf_len)); 36 check_mem_is_good(buf, buf_len); 45 fprintf(stderr, " %p addr %p, len %zu\n", &buf, buf, buf_len); 47 check_mem_is_good(&buf_len, sizeof(buf_len)); [all...] |
/external/openssl/crypto/ec/ |
H A D | ec_print.c | 65 size_t buf_len=0; local 68 buf_len = EC_POINT_point2oct(group, point, form, 70 if (buf_len == 0) 73 if ((buf = OPENSSL_malloc(buf_len)) == NULL) 76 if (!EC_POINT_point2oct(group, point, form, buf, buf_len, ctx)) 82 ret = BN_bin2bn(buf, buf_len, ret); 94 size_t buf_len=0; local 98 if ((buf_len = BN_num_bytes(bn)) == 0) return NULL; 99 buf = OPENSSL_malloc(buf_len); 120 if (!EC_POINT_oct2point(group, ret, buf, buf_len, ct 141 size_t buf_len=0,i; local [all...] |
/external/libunwind/src/ptrace/ |
H A D | _UPT_get_proc_name.c | 31 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 36 return _Uelf64_get_proc_name (as, ui->pid, ip, buf, buf_len, offp); 38 return _Uelf32_get_proc_name (as, ui->pid, ip, buf, buf_len, offp); 30 _UPT_get_proc_name(unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp, void *arg) argument
|
/external/chromium_org/net/base/ |
H A D | zap.cc | 9 void ZapBuf(void* buf, size_t buf_len) { argument 10 memset(buf, 0x0, buf_len);
|
H A D | zap.h | 17 void ZapBuf(void* buf, size_t buf_len);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-eax.c | 33 size_t buf_len; local 39 buf_len = nonce_len; 41 buf_len = data_len; 42 if (hdr_len > buf_len) 43 buf_len = hdr_len; 44 buf_len += 16; 46 buf = os_malloc(buf_len); 97 size_t buf_len; local 103 buf_len = nonce_len; 105 buf_len [all...] |
H A D | sha1-tprf.c | 23 * @buf_len: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 51 output_len[0] = (buf_len >> 8) & 0xff; 52 output_len[1] = buf_len & 0xff; 54 while (pos < buf_len) { 56 plen = buf_len - pos; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-prf.c | 24 * @buf_len: Number of bytes of key to generate 30 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 44 * @buf_len: Number of bits of key to generate 47 * given key. If the requested buf_len is not divisible by eight, the least 61 size_t buf_len = (buf_len_bits + 7) / 8; local 74 while (pos < buf_len) { 75 plen = buf_len - pos; 29 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-eax.c | 33 size_t buf_len; local 39 buf_len = nonce_len; 41 buf_len = data_len; 42 if (hdr_len > buf_len) 43 buf_len = hdr_len; 44 buf_len += 16; 46 buf = os_malloc(buf_len); 97 size_t buf_len; local 103 buf_len = nonce_len; 105 buf_len [all...] |
H A D | sha1-tprf.c | 23 * @buf_len: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 51 output_len[0] = (buf_len >> 8) & 0xff; 52 output_len[1] = buf_len & 0xff; 54 while (pos < buf_len) { 56 plen = buf_len - pos; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-prf.c | 24 * @buf_len: Number of bytes of key to generate 30 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 44 * @buf_len: Number of bits of key to generate 47 * given key. If the requested buf_len is not divisible by eight, the least 61 size_t buf_len = (buf_len_bits + 7) / 8; local 74 while (pos < buf_len) { 75 plen = buf_len - pos; 29 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-eax.c | 33 size_t buf_len; local 39 buf_len = nonce_len; 41 buf_len = data_len; 42 if (hdr_len > buf_len) 43 buf_len = hdr_len; 44 buf_len += 16; 46 buf = os_malloc(buf_len); 97 size_t buf_len; local 103 buf_len = nonce_len; 105 buf_len [all...] |
H A D | sha1-tprf.c | 23 * @buf_len: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 51 output_len[0] = (buf_len >> 8) & 0xff; 52 output_len[1] = buf_len & 0xff; 54 while (pos < buf_len) { 56 plen = buf_len - pos; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-prf.c | 24 * @buf_len: Number of bytes of key to generate 30 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 44 * @buf_len: Number of bits of key to generate 47 * given key. If the requested buf_len is not divisible by eight, the least 61 size_t buf_len = (buf_len_bits + 7) / 8; local 74 while (pos < buf_len) { 75 plen = buf_len - pos; 29 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
/external/libunwind/src/coredump/ |
H A D | _UCD_get_proc_name.c | 34 char *buf, size_t buf_len, unw_word_t *offp) 52 ret = elf_w (get_proc_name_in_image) (as, &ui->edi.ei, segbase, mapoff, ip, buf, buf_len, offp); 59 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 64 return _Uelf64_CD_get_proc_name (ui, as, ip, buf, buf_len, offp); 66 return _Uelf32_CD_get_proc_name (ui, as, ip, buf, buf_len, offp); 33 CD_get_proc_name(struct UCD_info *ui, unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp) argument 58 _UCD_get_proc_name(unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp, void *arg) argument
|
/external/libunwind/src/mi/ |
H A D | Gget_proc_name.c | 31 unw_word_t addr, char *buf, size_t buf_len, void *arg) 36 for (i = 0; i < buf_len; ++i) 44 buf[buf_len - 1] = '\0'; /* ensure string is NUL terminated */ 50 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 69 ret = intern_string (as, a, di->u.pi.name_ptr, buf, buf_len, arg); 93 return (*a->get_proc_name) (as, ip, buf, buf_len, offp, arg); 99 unw_get_proc_name (unw_cursor_t *cursor, char *buf, size_t buf_len, argument 104 return get_proc_name (tdep_get_as (c), tdep_get_ip (c), buf, buf_len, offp, 111 size_t buf_len, unw_word_t *offp, void *as_arg) 113 return get_proc_name (as, ip, buf, buf_len, off 30 intern_string(unw_addr_space_t as, unw_accessors_t *a, unw_word_t addr, char *buf, size_t buf_len, void *arg) argument 49 get_proc_name(unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp, void *arg) argument 110 unw_get_proc_name_by_ip(unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp, void *as_arg) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.h | 14 u8 *buf, size_t buf_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_peap_common.h | 14 u8 *buf, size_t buf_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_peap_common.h | 14 u8 *buf, size_t buf_len);
|
/external/chromium_org/net/socket/ |
H A D | socket.h | 20 // Reads data, up to |buf_len| bytes, from the socket. The number of bytes 31 virtual int Read(IOBuffer* buf, int buf_len, 34 // Writes data, up to |buf_len| bytes, to the socket. Note: data may be 46 virtual int Write(IOBuffer* buf, int buf_len,
|
/external/openssl/crypto/evp/ |
H A D | bio_b64.c | 82 int buf_len; member in struct:b64_struct 119 ctx->buf_len=0; 160 ctx->buf_len=0; 167 if (ctx->buf_len > 0) 169 OPENSSL_assert(ctx->buf_len >= ctx->buf_off); 170 i=ctx->buf_len-ctx->buf_off; 178 if (ctx->buf_len == ctx->buf_off) 180 ctx->buf_len=0; 331 ctx->buf_len=0; 334 ctx->buf_len [all...] |
H A D | bio_ok.c | 147 size_t buf_len; member in struct:ok_struct 184 ctx->buf_len=0; 229 i=ctx->buf_len-ctx->buf_off; 238 if (ctx->buf_len == ctx->buf_off) 245 ctx->buf_len= ctx->buf_len_save- ctx->buf_off_save; 247 ctx->buf_len); 251 ctx->buf_len=0; 261 n=IOBS- ctx->buf_len; 262 i=BIO_read(b->next_bio,&(ctx->buf[ctx->buf_len]),n); 266 ctx->buf_len [all...] |