/external/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/lib/ |
H A D | librpc-tirpc.c | 32 socklen_t slen; local 39 slen = sizeof(*addr4); 46 slen = sizeof(*addr6); 63 if (bind(sock, (struct sockaddr *)&addr, slen) < 0) {
|
/external/syslinux/com32/lib/ |
H A D | strreplace.c | 38 size_t slen, srlen, silen; local 44 slen = strlen(string); 48 out = malloc(slen - srlen + silen + 1); 55 slen - srlen - (token - string) + 1);
|
/external/ltp/lib/ |
H A D | tst_net.c | 33 socklen_t slen; local 44 slen = sizeof(*addr4); 51 slen = sizeof(*addr6); 63 if (bind(sock, addr, slen) < 0) 66 if (getsockname(sock, addr, &slen) == -1)
|
/external/openssh/openbsd-compat/ |
H A D | mktemp.c | 47 mktemp_internal(char *path, int slen, int mode) argument 57 if (len == 0 || slen < 0 || (size_t)slen >= len) { 61 ep = path + len - slen; 127 mkstemps(char *path, int slen) argument 129 return(mktemp_internal(path, slen, MKTEMP_FILE));
|
H A D | realpath.c | 60 int serrno, slen; local 152 slen = readlink(resolved, symlink, sizeof(symlink) - 1); 153 if (slen < 0) 155 symlink[slen] = '\0'; 173 if (symlink[slen - 1] != '/') { 174 if (slen + 1 >= 179 symlink[slen] = '/'; 180 symlink[slen + 1] = 0;
|
/external/guava/guava/src/com/google/common/escape/ |
H A D | CharEscaper.java | 82 int slen = s.length(); 92 for (; index < slen; index++) { 108 destSize = sizeNeeded + DEST_PAD_MULTIPLIER * (slen - index); 127 int charsLeft = slen - lastEscape; 135 s.getChars(lastEscape, slen, dest, destIndex);
|
H A D | CharEscaperBuilder.java | 57 int slen = s.length(); 58 for (int index = 0; index < slen; index++) {
|
/external/libcups/cups/ |
H A D | snprintf.c | 46 int slen; /* Length of string */ local 276 slen = (int)strlen(s); 277 if (slen > width && prec != width) 278 width = slen; 287 if (slen > width) 288 slen = width; 292 memcpy(bufptr, s, (size_t)slen); 293 memset(bufptr + slen, ' ', (size_t)(width - slen)); 297 memset(bufptr, ' ', (size_t)(width - slen)); [all...] |
H A D | http-addr.c | 501 int slen) /* I - Length of string */ 503 DEBUG_printf(("httpAddrString(addr=%p, s=%p, slen=%d)", (void *)addr, (void *)s, slen)); 509 if (!addr || !s || slen <= 2) 511 if (s && slen >= 1) 521 strlcpy(s, addr->un.sun_path, (size_t)slen); 523 strlcpy(s, "localhost", (size_t)slen); 533 snprintf(s, (size_t)slen, "%d.%d.%d.%d", (temp >> 24) & 255, 636 snprintf(s, (size_t)slen, "[v1.%s]", temps); 640 strlcpy(s, "UNKNOWN", (size_t)slen); 499 httpAddrString(const http_addr_t *addr, char *s, int slen) argument 788 httpGetHostname(http_t *http, char *s, int slen) argument [all...] |
H A D | string.c | 50 size_t slen; /* Length of string */ local 110 slen = strlen(s); 111 item = (_cups_sp_item_t *)calloc(1, sizeof(_cups_sp_item_t) + slen); 120 memcpy(item->str, s, slen + 1); 605 size_t slen; /* Length of string */ local 611 slen = strlen(s); 612 if ((t = malloc(slen + 1)) == NULL) 615 return (memcpy(t, s, slen + 1));
|
/external/jemalloc/src/ |
H A D | util.c | 329 #define APPEND_S(s, slen) do { \ 331 size_t cpylen = (slen <= size - i) ? slen : size - i; \ 334 i += slen; \ 336 #define APPEND_PADDED_S(s, slen, width, left_justify) do { \ 338 size_t pad_len = (width == -1) ? 0 : ((slen < (size_t)width) ? \ 339 (size_t)width - slen : 0); \ 346 APPEND_S(s, slen); \ 412 size_t slen; local 514 ' ' : '-')), buf, &slen); [all...] |
/external/openssh/ |
H A D | ssh-rsa.c | 46 size_t slen; local 59 slen = RSA_size(key->rsa); 60 if (slen <= 0 || slen > SSHBUF_MAX_BIGNUM) 72 if ((sig = malloc(slen)) == NULL) { 81 if (len < slen) { 82 size_t diff = slen - len; 85 } else if (len > slen) { 95 (ret = sshbuf_put_string(b, sig, slen)) != 0) 111 explicit_bzero(sig, slen); [all...] |
H A D | ssh-ed25519.c | 40 size_t slen = 0, len; local 55 smlen = slen = datalen + crypto_sign_ed25519_BYTES; 56 if ((sig = malloc(slen)) == NULL) 87 explicit_bzero(sig, slen);
|
/external/autotest/site_utils/ |
H A D | log_socket_server.py | 42 slen = struct.unpack('>L', chunk)[0] 43 chunk = self.connection.recv(slen) 44 while len(chunk) < slen: 45 chunk = chunk + self.connection.recv(slen - len(chunk))
|
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/ |
H A D | NSEC3PARAM.py | 70 (algorithm, flags, iterations, slen) = struct.unpack('!BBHB', 74 salt = wire[current : current + slen] 75 current += slen 76 rdlen -= slen
|
/external/iputils/ninfod/ |
H A D | ninfod_name.c | 209 static int compare_dnsname(const char *s, size_t slen, argument 214 if (slen < 1 || nlen < 1) 217 if (slen == nlen && memcmp(s, n, slen) == 0) 219 if (*(s0 + slen - 1) || *(n0 + nlen - 1)) 221 while (s < s0 + slen && n < n0 + nlen) { 224 if (s + *s + 1 > s0 + slen || n + *n + 1 > n0 + nlen) 227 if (s == s0 + slen - 1) 229 else if (s + 1 == s0 + slen - 1)
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_sd.c | 335 u16 slen; local 365 slen = *pos++; 366 if (slen > end - pos || slen < 2) { 370 next = pos + slen; 383 slen = WPA_GET_LE16(pos); 385 if (slen > end - pos) 387 end = pos + slen; 398 slen = WPA_GET_LE16(pos); 400 if (slen > en 491 u16 slen; local 703 u16 slen; local [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_sd.c | 335 u16 slen; local 365 slen = *pos++; 366 if (slen > end - pos || slen < 2) { 370 next = pos + slen; 383 slen = WPA_GET_LE16(pos); 385 if (slen > end - pos) 387 end = pos + slen; 398 slen = WPA_GET_LE16(pos); 400 if (slen > en 491 u16 slen; local 703 u16 slen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_sd.c | 335 u16 slen; local 365 slen = *pos++; 366 if (slen > end - pos || slen < 2) { 370 next = pos + slen; 383 slen = WPA_GET_LE16(pos); 385 if (slen > end - pos) 387 end = pos + slen; 398 slen = WPA_GET_LE16(pos); 400 if (slen > en 491 u16 slen; local 703 u16 slen; local [all...] |
/external/toybox/toys/posix/ |
H A D | nl.c | 46 int w = TT.w, slen = strlen(TT.s); local 64 } else printf("%*c", (int)w+slen, ' ');
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | hs20_supplicant.c | 422 size_t slen, u8 dialog_token) 433 icon->image = os_malloc(slen); 436 os_memcpy(icon->image, pos, slen); 437 icon->image_len = slen; 454 if (slen < 4) { 464 slen--; 466 if ((size_t) 1 + pos[0] > slen) { 473 slen -= 1 + pos[0]; 476 if (slen < 2) { 483 slen 420 hs20_process_icon_binary_file(struct wpa_supplicant *wpa_s, const u8 *sa, const u8 *pos, size_t slen, u8 dialog_token) argument 555 hs20_parse_rx_hs20_anqp_resp(struct wpa_supplicant *wpa_s, struct wpa_bss *bss, const u8 *sa, const u8 *data, size_t slen, u8 dialog_token) argument [all...] |
/external/kmod/libkmod/ |
H A D | libkmod-elf.c | 346 uint64_t slen; local 347 const char *s = elf_get_strings_section(elf, &slen); 348 if (slen == 0 || s[slen - 1] != '\0') { 503 size_t off, offcrc, slen; local 534 slen = 0; 542 slen += strlen(symbol) + 1; 545 *array = a = malloc(sizeof(struct kmod_modversion) * count + slen); 708 size_t slen = i - last; local 716 memcpy(itr, strings + last, slen); 724 size_t slen = i - last; local 759 size_t slen, symlen; local 916 size_t slen, verlen, symlen, crclen; local [all...] |
/external/iptables/extensions/ |
H A D | libxt_string.c | 94 int i=0, slen, sindex=0, schar; local 98 slen = strlen(s); 100 if (slen == 0) { 105 while (i < slen) { 120 if (i+1 >= slen) 127 if (i+1 >= slen) { 135 if (i+1 >= slen) { 139 if (i+2 >= slen) {
|
/external/selinux/libsemanage/src/ |
H A D | utilities.c | 236 size_t count = 0, slen, rlen, newsize; local 240 slen = strlen(search); 244 if (slen == 0) 248 for (p = strstr(src, search); p != NULL; p = strstr(p + slen, search)) { 257 newsize = strlen(src) + 1 + count * (rlen - slen); 277 psrc = p + slen;
|
/external/boringssl/src/crypto/asn1/ |
H A D | a_d2i_fp.c | 188 c.inf = ASN1_get_object(&(c.p), &(c.slen), &(c.tag), &(c.xclass), 210 } else if (eos && (c.slen == 0) && (c.tag == V_ASN1_EOC)) { 218 /* suck in c.slen bytes of data */ 219 want = c.slen; 259 if (off + c.slen < off) { 263 off += c.slen;
|