/external/conscrypt/src/compat/native/ |
H A D | JNIHelp.h | 84 const char* jniStrError(int errnum, char* buf, size_t buflen);
|
/external/e2fsprogs/misc/ |
H A D | uuidd.c | 142 int buflen, int *num, const char **err_context) 177 if ((*num)*16 > buflen-4) 178 *num = (buflen-4) / 16; 202 if (reply_len < 0 || reply_len > buflen) { 141 call_daemon(const char *socket_path, int op, char *buf, int buflen, int *num, const char **err_context) argument
|
/external/mdnsresponder/mDNSShared/ |
H A D | dnssd_ipc.h | 203 int get_string(const char **ptr, const char *const end, char *buffer, int buflen);
|
/external/openssh/ |
H A D | misc.h | 115 size_t buflen; member in struct:bwlimit
|
H A D | misc.c | 909 bandwidth_limit_init(struct bwlimit *bw, u_int64_t kbps, size_t buflen) argument 911 bw->buflen = buflen; 952 if (bw->thresh < bw->buflen / 4) 953 bw->thresh = bw->buflen / 4; 956 if (bw->thresh > bw->buflen * 8) 957 bw->thresh = bw->buflen * 8;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.h | 130 int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen); 135 int wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, 242 static inline int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen) argument 255 size_t buflen, int verbose) 254 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.h | 130 int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen); 135 int wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, 242 static inline int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen) argument 255 size_t buflen, int verbose) 254 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | config_winreg.c | 122 DWORD val, buflen; local 125 buflen = sizeof(val); 126 ret = RegQueryValueEx(hk, name, NULL, NULL, (LPBYTE) &val, &buflen); 127 if (ret == ERROR_SUCCESS && buflen == sizeof(val)) { 139 DWORD buflen; local 143 buflen = 0; 144 ret = RegQueryValueEx(hk, name, NULL, NULL, NULL, &buflen); 147 val = os_malloc(buflen); 151 ret = RegQueryValueEx(hk, name, NULL, NULL, (LPBYTE) val, &buflen);
|
H A D | config.h | 1206 size_t buflen); 1208 char *buf, size_t buflen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 130 int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen); 135 int wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, 242 static inline int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen) argument 255 size_t buflen, int verbose) 254 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
|
/external/linux-tools-perf/src/tools/perf/util/ |
H A D | probe-event.c | 1313 char **buf, size_t *buflen, 1319 buflen, depth + 1); 1324 ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset); 1329 *buflen -= ret; 1337 char *buf, size_t buflen) 1345 ret = e_snprintf(buf, buflen, " %s=", arg->name); 1347 ret = e_snprintf(buf, buflen, " "); 1351 buflen -= ret; 1360 &buflen, 1); 1367 ret = e_snprintf(buf, buflen, " 1312 __synthesize_probe_trace_arg_ref(struct probe_trace_arg_ref *ref, char **buf, size_t *buflen, int depth) argument 1336 synthesize_probe_trace_arg(struct probe_trace_arg *arg, char *buf, size_t buflen) argument [all...] |
/external/compiler-rt/lib/asan/ |
H A D | asan_malloc_mac.cc | 92 size_t buflen = 6 + (name ? internal_strlen(name) : 0); local 93 InternalScopedString new_name(buflen);
|
/external/fio/engines/ |
H A D | mmap.c | 91 if (io_u->buflen > mmap_map_size) { 142 io_u->offset + io_u->buflen < fmd->mmap_off + fmd->mmap_sz)
|
/external/libselinux/src/ |
H A D | avc_internal.c | 99 static int avc_netlink_receive(char *buf, unsigned buflen, int blocking) argument 121 rc = recvfrom(fd, buf, buflen, 0, (struct sockaddr *)&nladdr,
|
/external/libusb-compat/libusb/ |
H A D | usb.h | 290 size_t buflen); 292 size_t buflen);
|
/external/selinux/libselinux/src/ |
H A D | avc_internal.c | 99 static int avc_netlink_receive(char *buf, unsigned buflen, int blocking) argument 121 rc = recvfrom(fd, buf, buflen, 0, (struct sockaddr *)&nladdr,
|
/external/toybox/lib/ |
H A D | password.c | 50 int read_password(char *buf, int buflen, char *mesg) argument 66 for (i=0; i < buflen-1; i++) {
|
/external/vboot_reference/cgpt/ |
H A D | cgpt_common.c | 407 void GuidToStr(const Guid *guid, char *str, unsigned int buflen) { argument 408 require(buflen >= GUID_STRLEN); 409 require(snprintf(str, buflen, 1012 void PMBRToStr(struct pmbr *pmbr, char *str, unsigned int buflen) { argument 1015 require(snprintf(str, buflen, "PMBR") < buflen); 1018 require(snprintf(str, buflen, "PMBR (Boot GUID: %s)", buf) < buflen);
|
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_dump.c | 122 size_t buflen) 128 end = pos + buflen; 121 eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, size_t buflen) argument
|
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_dump.c | 122 size_t buflen) 128 end = pos + buflen; 121 eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, size_t buflen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_dump.c | 122 size_t buflen) 128 end = pos + buflen; 121 eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, size_t buflen) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ttls.c | 1565 size_t buflen, int verbose) 1570 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1571 ret = os_snprintf(buf + len, buflen - len, 1574 if (os_snprintf_error(buflen - len, ret)) 1579 ret = os_snprintf(buf + len, buflen - len, "EAP-%s\n", 1584 ret = os_snprintf(buf + len, buflen - len, "MSCHAPV2\n"); 1587 ret = os_snprintf(buf + len, buflen - len, "MSCHAP\n"); 1590 ret = os_snprintf(buf + len, buflen - len, "PAP\n"); 1593 ret = os_snprintf(buf + len, buflen - len, "CHAP\n"); 1599 if (os_snprintf_error(buflen 1564 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ttls.c | 1565 size_t buflen, int verbose) 1570 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1571 ret = os_snprintf(buf + len, buflen - len, 1574 if (os_snprintf_error(buflen - len, ret)) 1579 ret = os_snprintf(buf + len, buflen - len, "EAP-%s\n", 1584 ret = os_snprintf(buf + len, buflen - len, "MSCHAPV2\n"); 1587 ret = os_snprintf(buf + len, buflen - len, "MSCHAP\n"); 1590 ret = os_snprintf(buf + len, buflen - len, "PAP\n"); 1593 ret = os_snprintf(buf + len, buflen - len, "CHAP\n"); 1599 if (os_snprintf_error(buflen 1564 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 1565 size_t buflen, int verbose) 1570 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose); 1571 ret = os_snprintf(buf + len, buflen - len, 1574 if (os_snprintf_error(buflen - len, ret)) 1579 ret = os_snprintf(buf + len, buflen - len, "EAP-%s\n", 1584 ret = os_snprintf(buf + len, buflen - len, "MSCHAPV2\n"); 1587 ret = os_snprintf(buf + len, buflen - len, "MSCHAP\n"); 1590 ret = os_snprintf(buf + len, buflen - len, "PAP\n"); 1593 ret = os_snprintf(buf + len, buflen - len, "CHAP\n"); 1599 if (os_snprintf_error(buflen 1564 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument [all...] |
/external/valgrind/coregrind/ |
H A D | vgdb.c | 951 int buflen; local 1008 buflen = getpkt(buf, from_pid, to_pid); 1009 if (buflen < 0) { 1011 if (buflen == -2) 1045 char buf_print[buflen/2 + 1]; 1046 for (i = 1; i < buflen; i = i + 2) 1049 buf_print[buflen/2] = 0;
|