/external/iproute2/lib/ |
H A D | ll_proto.c | 91 const char * ll_proto_n2a(unsigned short id, char *buf, int len) argument 101 snprintf(buf, len, "[%d]", id);
|
H A D | ll_types.c | 30 const char * ll_type_n2a(int type, char *buf, int len) argument 119 snprintf(buf, len, "[%d]", type);
|
/external/ipsec-tools/src/racoon/ |
H A D | evt.c | 65 size_t len; local 88 len = sizeof(*evtdump); 90 len += optdata->l; 92 if ((evtdump = racoon_malloc(len)) == NULL) { 109 evtdump->len = len; 146 if ((buf = vmalloc(evtdump->len)) == NULL) { 151 memcpy(buf->v, evtdump, evtdump->len);
|
H A D | throttle.c | 76 size_t len; local 78 len = sizeof(*te) 82 if ((te = racoon_malloc(len)) == NULL)
|
/external/libcap-ng/libcap-ng-0.7/bindings/python/test/ |
H A D | capng-test.py | 25 len = len(text) variable 26 if len < 80 and last > 30:
|
/external/libcap-ng/libcap-ng-0.7/src/test/ |
H A D | lib_test.c | 32 int rc, i, len, last = CAP_LAST_CAP; local 50 len = strlen(text); 52 if (len < 80 && last > 30) // The kernel & headers are mismatched
|
/external/libchrome/crypto/ |
H A D | openssl_util.cc | 25 // NULL-terminated string of length |len| containing diagnostic information 33 int OpenSSLErrorCallback(const char* str, size_t len, void* context) { argument 34 DVLOG(1) << "\t" << base::StringPiece(str, len);
|
/external/libconstrainedcrypto/include/constrainedcrypto/ |
H A D | rsa.h | 41 int len; /* Length of n[] in number of uint32_t */ member in struct:RSAPublicKey 50 const int len,
|
/external/libcxx/test/libcxx/utilities/function.objects/unord.hash/ |
H A D | murmur2_or_cityhash_ubsan_unsigned_overflow_ignored.pass.cpp | 23 void test(const void* key, int len) { argument 24 for (int i=1; i <= len; ++i) {
|
/external/libnetfilter_conntrack/src/expect/ |
H A D | snprintf.c | 13 unsigned int len, 23 size = __snprintf_expect_default(buf, len, exp, type, flags); 26 size = __snprintf_expect_xml(buf, len, exp, type, flags); 34 buf[size+1 > len ? len-1 : size] = '\0'; 12 __snprintf_expect(char *buf, unsigned int len, const struct nf_expect *exp, unsigned int type, unsigned int msg_output, unsigned int flags) argument
|
/external/libvpx/libvpx/ |
H A D | y4menc.c | 14 int y4m_write_file_header(char *buf, size_t len, int width, int height, argument 58 return snprintf(buf, len, "YUV4MPEG2 W%u H%u F%u:%u I%c %s", width, height, 62 int y4m_write_frame_header(char *buf, size_t len) { argument 63 return snprintf(buf, len, "FRAME\n");
|
/external/ltp/include/lapi/ |
H A D | splice.h | 29 loff_t *off_out, size_t len, unsigned int flags) 32 fd_out, off_out, len, flags); 28 splice(int fd_in, loff_t *off_in, int fd_out, loff_t *off_out, size_t len, unsigned int flags) argument
|
/external/ltp/testcases/kernel/syscalls/ipc/lib/ |
H A D | libmsgctl.h | 29 char len; member in struct:mbuffer::__anon13841
|
/external/ltp/testcases/network/nfs/nfslock01/ |
H A D | nfs_flock_func.c | 6 int lock_reg(int fd, int type, off_t offset, int whence, off_t len, int cmd) argument 13 lock.l_len = len; 18 int lock_test(int fd, int type, off_t offset, int whence, int len) argument 25 lock.l_len = len;
|
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/mmap/ |
H A D | 11-4.c | 10 * Thus, while the argument len 13 * operation, any partial page specified by the range [pa,pa+len). 21 * set len = 1/2 * page_size 51 size_t len; local 60 len = page_size / 2; 74 if (ftruncate(fd, len) == -1) { 79 pa = mmap(NULL, len, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); 86 for (i = len; i < page_size; i++) 94 pa[len + 1] = 'b'; 95 msync(pa, len, MS_SYN [all...] |
H A D | 24-1.c | 10 * [ENOMEM] MAP_FIXED was specified, and the range [addr,addr+len) 39 size_t len; local 63 len = shm_size; 67 pa = mmap(NULL, len, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
|
H A D | 24-2.c | 11 * and the range [addr,addr+len) exceeds that allowed 39 size_t len; local 71 len = shm_size; 72 pa = mmap(NULL, len, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); 78 len = rlim.rlim_cur; 80 printf("addr: %lx, len: %lx\n", (unsigned long)addr, 81 (unsigned long)len); 82 /* Make sure addr and len is aligned to page size */ 88 if (len % page_size) { 90 len [all...] |
H A D | 27-1.c | 39 size_t len = total_size; local 59 pa = mmap(NULL, len, PROT_READ | PROT_WRITE, MAP_PRIVATE, fd, 0); 70 munmap(pa, len); 74 pa = mmap(NULL, len, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); 80 pa = mmap(pa, len / 2, PROT_READ, MAP_SHARED | MAP_FIXED, fd, 0); 91 munmap(pa, len);
|
H A D | 31-1.c | 11 * plus len exceeds the offset maximum established in the open 44 size_t len; local 66 len = ~((size_t) 0) & (~(page_size - 1)); 71 * enough so that offset + PAGE_ALIGN(len) / page_size 77 printf("off: %llx, len: %llx\n", (unsigned long long)off, 78 (unsigned long long)len); 80 pa = mmap(NULL, len, PROT_READ | PROT_WRITE, MAP_SHARED, fd, off); 93 munmap(pa, len);
|
/external/ltp/utils/sctp/func_tests/ |
H A D | test_1_to_1_rtoinfo.c | 65 socklen_t len; local 71 len = sizeof(struct sctp_rtoinfo); 74 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_RTOINFO, &grtoinfo, &len); 96 ret = getsockopt(sd, IPPROTO_SCTP, SCTP_RTOINFO, &grtoinfo, &len);
|
/external/lzma/CPP/Windows/Control/ |
H A D | ComboBox.cpp | 21 LRESULT len = GetLBTextLen(index);
local 22 if (len == CB_ERR)
23 return len;
24 len = GetLBText(index, s.GetBuffer((int)len + 1));
26 return len;
42 LRESULT len = SendMessageW(CB_GETLBTEXTLEN, index, 0);
local 43 if (len == CB_ERR)
44 return len;
45 len 50 LRESULT len = GetLBText(index, sa); local [all...] |
/external/lzma/Java/Tukaani/src/org/tukaani/xz/check/ |
H A D | None.java | 18 public void update(byte[] buf, int off, int len) {} argument
|
/external/lzma/Java/Tukaani/src/org/tukaani/xz/delta/ |
H A D | DeltaDecoder.java | 17 public void decode(byte[] buf, int off, int len) { argument 18 int end = off + len;
|
/external/lzma/Java/Tukaani/src/org/tukaani/xz/lz/ |
H A D | Matches.java | 14 public final int[] len; field in class:Matches 19 len = new int[countMax];
|
/external/lzma/Java/Tukaani/src/org/tukaani/xz/simple/ |
H A D | SimpleFilter.java | 13 int code(byte[] buf, int off, int len); argument
|