/external/google-breakpad/src/third_party/libdisasm/ |
H A D | ia32_invariant.h | 6 size_t ia32_disasm_invariant( unsigned char *buf, size_t buf_len, 9 size_t ia32_disasm_size( unsigned char *buf, size_t buf_len );
|
H A D | x86_imm.h | 13 unsigned int x86_imm_sized( unsigned char *buf, size_t buf_len, void *dest, 16 unsigned int x86_imm_signsized( unsigned char *buf, size_t buf_len, void *dest,
|
H A D | ia32_operand.h | 7 size_t ia32_decode_operand( unsigned char *buf, size_t buf_len,
|
H A D | x86_disasm.c | 16 unsigned int x86_disasm( unsigned char *buf, unsigned int buf_len, argument 22 if ( ! buf || ! insn || ! buf_len ) { 36 if ( offset >= buf_len ) { 42 len = buf_len - offset; 77 unsigned int buf_len, size, count = 0, bytes = 0; local 79 /* buf_len is implied by the arguments */ 80 buf_len = len + offset; 83 size = x86_disasm( buf, buf_len, buf_rva, offset + bytes, 127 unsigned int x86_disasm_forward( unsigned char *buf, unsigned int buf_len, argument 137 while ( cont && bytes < buf_len ) { 196 x86_invariant_disasm( unsigned char *buf, int buf_len, x86_invariant_t *inv ) argument [all...] |
H A D | ia32_modrm.h | 7 size_t ia32_modrm_decode( unsigned char *buf, unsigned int buf_len,
|
H A D | x86_imm.c | 6 unsigned int x86_imm_signsized( unsigned char * buf, size_t buf_len, argument 13 if ( size > buf_len ) { 38 unsigned int x86_imm_sized( unsigned char * buf, size_t buf_len, void *dest, argument 45 if ( size > buf_len ) {
|
/external/compiler-rt/test/sanitizer_common/TestCases/Linux/ |
H A D | open_memstream.cc | 30 size_t buf_len; local 31 fprintf(stderr, " &buf %p, &buf_len %p\n", &buf, &buf_len); 32 FILE *fp = open_memstream(&buf, &buf_len); 37 check_mem_is_good(&buf_len, sizeof(buf_len)); 38 check_mem_is_good(buf, buf_len); 50 fprintf(stderr, " %p addr %p, len %zu\n", &buf, buf, buf_len); 52 check_mem_is_good(&buf_len, sizeof(buf_len)); [all...] |
/external/libbrillo/brillo/ |
H A D | userdb_utils.cc | 20 ssize_t buf_len = sysconf(_SC_GETPW_R_SIZE_MAX); local 21 if (buf_len < 0) 22 buf_len = 16384; // 16K should be enough?... 25 std::vector<char> buf(buf_len); 26 if (getpwnam_r(user.c_str(), &pwd_buf, buf.data(), buf_len, &pwd) || !pwd) { 39 ssize_t buf_len = sysconf(_SC_GETGR_R_SIZE_MAX); local 40 if (buf_len < 0) 41 buf_len = 16384; // 16K should be enough?... 44 std::vector<char> buf(buf_len); 45 if (getgrnam_r(group.c_str(), &grp_buf, buf.data(), buf_len, [all...] |
/external/libunwind/src/ptrace/ |
H A D | _UPT_get_proc_name.c | 31 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 36 return _Uelf64_get_proc_name (as, ui->pid, ip, buf, buf_len, offp, arg); 38 return _Uelf32_get_proc_name (as, ui->pid, ip, buf, buf_len, offp, arg); 30 _UPT_get_proc_name(unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp, void *arg) argument
|
/external/google-breakpad/src/common/linux/ |
H A D | guid_creator.h | 46 bool GUIDToString(const GUID *guid, char *buf, int buf_len);
|
/external/google-breakpad/src/common/solaris/ |
H A D | guid_creator.h | 48 bool GUIDToString(const GUID *guid, char *buf, int buf_len);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-eax.c | 33 size_t buf_len; local 39 buf_len = nonce_len; 41 buf_len = data_len; 42 if (hdr_len > buf_len) 43 buf_len = hdr_len; 44 buf_len += 16; 46 buf = os_malloc(buf_len); 74 bin_clear_free(buf, buf_len); 97 size_t buf_len; local 103 buf_len [all...] |
H A D | sha1-tprf.c | 23 * @buf_len: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 51 output_len[0] = (buf_len >> 8) & 0xff; 52 output_len[1] = buf_len & 0xff; 54 while (pos < buf_len) { 56 plen = buf_len - pos; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-prf.c | 24 * @buf_len: Number of bytes of key to generate 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 34 buf_len * 8); 46 * @buf_len: Number of bits of key to generate 50 * given key. If the requested buf_len is not divisible by eight, the least 64 size_t buf_len = (buf_len_bits + 7) / 8; local 77 while (pos < buf_len) { 78 plen = buf_len - pos; 30 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
H A D | sha384-prf.c | 24 * @buf_len: Number of bytes of key to generate 30 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 32 sha384_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 44 * @buf_len: Number of bits of key to generate 47 * given key. If the requested buf_len is not divisible by eight, the least 61 size_t buf_len = (buf_len_bits + 7) / 8; local 74 while (pos < buf_len) { 75 plen = buf_len - pos; 29 sha384_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-eax.c | 33 size_t buf_len; local 39 buf_len = nonce_len; 41 buf_len = data_len; 42 if (hdr_len > buf_len) 43 buf_len = hdr_len; 44 buf_len += 16; 46 buf = os_malloc(buf_len); 74 bin_clear_free(buf, buf_len); 97 size_t buf_len; local 103 buf_len [all...] |
H A D | sha1-tprf.c | 23 * @buf_len: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 51 output_len[0] = (buf_len >> 8) & 0xff; 52 output_len[1] = buf_len & 0xff; 54 while (pos < buf_len) { 56 plen = buf_len - pos; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-prf.c | 24 * @buf_len: Number of bytes of key to generate 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 34 buf_len * 8); 46 * @buf_len: Number of bits of key to generate 50 * given key. If the requested buf_len is not divisible by eight, the least 64 size_t buf_len = (buf_len_bits + 7) / 8; local 77 while (pos < buf_len) { 78 plen = buf_len - pos; 30 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-eax.c | 33 size_t buf_len; local 39 buf_len = nonce_len; 41 buf_len = data_len; 42 if (hdr_len > buf_len) 43 buf_len = hdr_len; 44 buf_len += 16; 46 buf = os_malloc(buf_len); 74 bin_clear_free(buf, buf_len); 97 size_t buf_len; local 103 buf_len [all...] |
/external/libunwind/src/coredump/ |
H A D | _UCD_get_proc_name.c | 34 char *buf, size_t buf_len, unw_word_t *offp) 52 ret = elf_w (get_proc_name_in_image) (as, &ui->edi.ei, segbase, mapoff, ip, buf, buf_len, offp); 59 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 64 return _Uelf64_CD_get_proc_name (ui, as, ip, buf, buf_len, offp); 66 return _Uelf32_CD_get_proc_name (ui, as, ip, buf, buf_len, offp); 33 CD_get_proc_name(struct UCD_info *ui, unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp) argument 58 _UCD_get_proc_name(unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp, void *arg) argument
|
/external/libunwind/src/mi/ |
H A D | Gget_proc_name.c | 31 unw_word_t addr, char *buf, size_t buf_len, void *arg) 36 for (i = 0; i < buf_len; ++i) 44 buf[buf_len - 1] = '\0'; /* ensure string is NUL terminated */ 50 char *buf, size_t buf_len, unw_word_t *offp, void *arg) 69 ret = intern_string (as, a, di->u.pi.name_ptr, buf, buf_len, arg); 93 return (*a->get_proc_name) (as, ip, buf, buf_len, offp, arg); 99 unw_get_proc_name (unw_cursor_t *cursor, char *buf, size_t buf_len, argument 104 return get_proc_name (tdep_get_as (c), tdep_get_ip (c), buf, buf_len, offp, 111 size_t buf_len, unw_word_t *offp, void *as_arg) 113 return get_proc_name (as, ip, buf, buf_len, off 30 intern_string(unw_addr_space_t as, unw_accessors_t *a, unw_word_t addr, char *buf, size_t buf_len, void *arg) argument 49 get_proc_name(unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp, void *arg) argument 110 unw_get_proc_name_by_ip(unw_addr_space_t as, unw_word_t ip, char *buf, size_t buf_len, unw_word_t *offp, void *as_arg) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.h | 14 u8 *buf, size_t buf_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_peap_common.h | 14 u8 *buf, size_t buf_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_peap_common.h | 14 u8 *buf, size_t buf_len);
|
/external/boringssl/src/decrepit/bio/ |
H A D | base64_bio.c | 77 int buf_len; member in struct:b64_struct 136 ctx->buf_len = 0; 143 if (ctx->buf_len > 0) { 144 assert(ctx->buf_len >= ctx->buf_off); 145 i = ctx->buf_len - ctx->buf_off; 155 if (ctx->buf_len == ctx->buf_off) { 156 ctx->buf_len = 0; 280 ctx->buf_len = 0; 282 ctx->buf_len = z; 287 &ctx->buf_len, (uint8_ [all...] |