Searched refs:buflen (Results 176 - 200 of 401) sorted by relevance

1234567891011>>

/external/conscrypt/src/compat/native/
H A DJNIHelp.h84 const char* jniStrError(int errnum, char* buf, size_t buflen);
/external/e2fsprogs/misc/
H A Duuidd.c142 int buflen, int *num, const char **err_context)
177 if ((*num)*16 > buflen-4)
178 *num = (buflen-4) / 16;
202 if (reply_len < 0 || reply_len > buflen) {
141 call_daemon(const char *socket_path, int op, char *buf, int buflen, int *num, const char **err_context) argument
/external/mdnsresponder/mDNSShared/
H A Ddnssd_ipc.h203 int get_string(const char **ptr, const char *const end, char *buffer, int buflen);
/external/openssh/
H A Dmisc.h115 size_t buflen; member in struct:bwlimit
H A Dmisc.c909 bandwidth_limit_init(struct bwlimit *bw, u_int64_t kbps, size_t buflen) argument
911 bw->buflen = buflen;
952 if (bw->thresh < bw->buflen / 4)
953 bw->thresh = bw->buflen / 4;
956 if (bw->thresh > bw->buflen * 8)
957 bw->thresh = bw->buflen * 8;
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.h130 int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen);
135 int wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen,
242 static inline int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen) argument
255 size_t buflen, int verbose)
254 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.h130 int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen);
135 int wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen,
242 static inline int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen) argument
255 size_t buflen, int verbose)
254 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dconfig_winreg.c122 DWORD val, buflen; local
125 buflen = sizeof(val);
126 ret = RegQueryValueEx(hk, name, NULL, NULL, (LPBYTE) &val, &buflen);
127 if (ret == ERROR_SUCCESS && buflen == sizeof(val)) {
139 DWORD buflen; local
143 buflen = 0;
144 ret = RegQueryValueEx(hk, name, NULL, NULL, NULL, &buflen);
147 val = os_malloc(buflen);
151 ret = RegQueryValueEx(hk, name, NULL, NULL, (LPBYTE) val, &buflen);
H A Dconfig.h1206 size_t buflen);
1208 char *buf, size_t buflen);
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.h130 int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen);
135 int wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen,
242 static inline int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen) argument
255 size_t buflen, int verbose)
254 wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen, int verbose) argument
/external/linux-tools-perf/src/tools/perf/util/
H A Dprobe-event.c1313 char **buf, size_t *buflen,
1319 buflen, depth + 1);
1324 ret = e_snprintf(*buf, *buflen, "%+ld(", ref->offset);
1329 *buflen -= ret;
1337 char *buf, size_t buflen)
1345 ret = e_snprintf(buf, buflen, " %s=", arg->name);
1347 ret = e_snprintf(buf, buflen, " ");
1351 buflen -= ret;
1360 &buflen, 1);
1367 ret = e_snprintf(buf, buflen, "
1312 __synthesize_probe_trace_arg_ref(struct probe_trace_arg_ref *ref, char **buf, size_t *buflen, int depth) argument
1336 synthesize_probe_trace_arg(struct probe_trace_arg *arg, char *buf, size_t buflen) argument
[all...]
/external/compiler-rt/lib/asan/
H A Dasan_malloc_mac.cc92 size_t buflen = 6 + (name ? internal_strlen(name) : 0); local
93 InternalScopedString new_name(buflen);
/external/fio/engines/
H A Dmmap.c91 if (io_u->buflen > mmap_map_size) {
142 io_u->offset + io_u->buflen < fmd->mmap_off + fmd->mmap_sz)
/external/libselinux/src/
H A Davc_internal.c99 static int avc_netlink_receive(char *buf, unsigned buflen, int blocking) argument
121 rc = recvfrom(fd, buf, buflen, 0, (struct sockaddr *)&nladdr,
/external/libusb-compat/libusb/
H A Dusb.h290 size_t buflen);
292 size_t buflen);
/external/selinux/libselinux/src/
H A Davc_internal.c99 static int avc_netlink_receive(char *buf, unsigned buflen, int blocking) argument
121 rc = recvfrom(fd, buf, buflen, 0, (struct sockaddr *)&nladdr,
/external/toybox/lib/
H A Dpassword.c50 int read_password(char *buf, int buflen, char *mesg) argument
66 for (i=0; i < buflen-1; i++) {
/external/vboot_reference/cgpt/
H A Dcgpt_common.c407 void GuidToStr(const Guid *guid, char *str, unsigned int buflen) { argument
408 require(buflen >= GUID_STRLEN);
409 require(snprintf(str, buflen,
1012 void PMBRToStr(struct pmbr *pmbr, char *str, unsigned int buflen) { argument
1015 require(snprintf(str, buflen, "PMBR") < buflen);
1018 require(snprintf(str, buflen, "PMBR (Boot GUID: %s)", buf) < buflen);
/external/wpa_supplicant_8/hostapd/src/eapol_auth/
H A Deapol_auth_dump.c122 size_t buflen)
128 end = pos + buflen;
121 eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, size_t buflen) argument
/external/wpa_supplicant_8/src/eapol_auth/
H A Deapol_auth_dump.c122 size_t buflen)
128 end = pos + buflen;
121 eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, size_t buflen) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_dump.c122 size_t buflen)
128 end = pos + buflen;
121 eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, size_t buflen) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_ttls.c1565 size_t buflen, int verbose)
1570 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose);
1571 ret = os_snprintf(buf + len, buflen - len,
1574 if (os_snprintf_error(buflen - len, ret))
1579 ret = os_snprintf(buf + len, buflen - len, "EAP-%s\n",
1584 ret = os_snprintf(buf + len, buflen - len, "MSCHAPV2\n");
1587 ret = os_snprintf(buf + len, buflen - len, "MSCHAP\n");
1590 ret = os_snprintf(buf + len, buflen - len, "PAP\n");
1593 ret = os_snprintf(buf + len, buflen - len, "CHAP\n");
1599 if (os_snprintf_error(buflen
1564 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_ttls.c1565 size_t buflen, int verbose)
1570 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose);
1571 ret = os_snprintf(buf + len, buflen - len,
1574 if (os_snprintf_error(buflen - len, ret))
1579 ret = os_snprintf(buf + len, buflen - len, "EAP-%s\n",
1584 ret = os_snprintf(buf + len, buflen - len, "MSCHAPV2\n");
1587 ret = os_snprintf(buf + len, buflen - len, "MSCHAP\n");
1590 ret = os_snprintf(buf + len, buflen - len, "PAP\n");
1593 ret = os_snprintf(buf + len, buflen - len, "CHAP\n");
1599 if (os_snprintf_error(buflen
1564 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_ttls.c1565 size_t buflen, int verbose)
1570 len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose);
1571 ret = os_snprintf(buf + len, buflen - len,
1574 if (os_snprintf_error(buflen - len, ret))
1579 ret = os_snprintf(buf + len, buflen - len, "EAP-%s\n",
1584 ret = os_snprintf(buf + len, buflen - len, "MSCHAPV2\n");
1587 ret = os_snprintf(buf + len, buflen - len, "MSCHAP\n");
1590 ret = os_snprintf(buf + len, buflen - len, "PAP\n");
1593 ret = os_snprintf(buf + len, buflen - len, "CHAP\n");
1599 if (os_snprintf_error(buflen
1564 eap_ttls_get_status(struct eap_sm *sm, void *priv, char *buf, size_t buflen, int verbose) argument
[all...]
/external/valgrind/coregrind/
H A Dvgdb.c951 int buflen; local
1008 buflen = getpkt(buf, from_pid, to_pid);
1009 if (buflen < 0) {
1011 if (buflen == -2)
1045 char buf_print[buflen/2 + 1];
1046 for (i = 1; i < buflen; i = i + 2)
1049 buf_print[buflen/2] = 0;

Completed in 555 milliseconds

1234567891011>>