Searched refs:slen (Results 1 - 25 of 158) sorted by relevance

1234567

/external/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/lib/
H A Dlibrpc-tirpc.c32 socklen_t slen; local
39 slen = sizeof(*addr4);
46 slen = sizeof(*addr6);
63 if (bind(sock, (struct sockaddr *)&addr, slen) < 0) {
/external/syslinux/com32/lib/
H A Dstrreplace.c38 size_t slen, srlen, silen; local
44 slen = strlen(string);
48 out = malloc(slen - srlen + silen + 1);
55 slen - srlen - (token - string) + 1);
/external/ltp/lib/
H A Dtst_net.c33 socklen_t slen; local
44 slen = sizeof(*addr4);
51 slen = sizeof(*addr6);
63 if (bind(sock, addr, slen) < 0)
66 if (getsockname(sock, addr, &slen) == -1)
/external/openssh/openbsd-compat/
H A Dmktemp.c47 mktemp_internal(char *path, int slen, int mode) argument
57 if (len == 0 || slen < 0 || (size_t)slen >= len) {
61 ep = path + len - slen;
127 mkstemps(char *path, int slen) argument
129 return(mktemp_internal(path, slen, MKTEMP_FILE));
H A Drealpath.c60 int serrno, slen; local
152 slen = readlink(resolved, symlink, sizeof(symlink) - 1);
153 if (slen < 0)
155 symlink[slen] = '\0';
173 if (symlink[slen - 1] != '/') {
174 if (slen + 1 >=
179 symlink[slen] = '/';
180 symlink[slen + 1] = 0;
/external/guava/guava/src/com/google/common/escape/
H A DCharEscaper.java82 int slen = s.length();
92 for (; index < slen; index++) {
108 destSize = sizeNeeded + DEST_PAD_MULTIPLIER * (slen - index);
127 int charsLeft = slen - lastEscape;
135 s.getChars(lastEscape, slen, dest, destIndex);
H A DCharEscaperBuilder.java57 int slen = s.length();
58 for (int index = 0; index < slen; index++) {
/external/libcups/cups/
H A Dsnprintf.c46 int slen; /* Length of string */ local
276 slen = (int)strlen(s);
277 if (slen > width && prec != width)
278 width = slen;
287 if (slen > width)
288 slen = width;
292 memcpy(bufptr, s, (size_t)slen);
293 memset(bufptr + slen, ' ', (size_t)(width - slen));
297 memset(bufptr, ' ', (size_t)(width - slen));
[all...]
H A Dhttp-addr.c501 int slen) /* I - Length of string */
503 DEBUG_printf(("httpAddrString(addr=%p, s=%p, slen=%d)", (void *)addr, (void *)s, slen));
509 if (!addr || !s || slen <= 2)
511 if (s && slen >= 1)
521 strlcpy(s, addr->un.sun_path, (size_t)slen);
523 strlcpy(s, "localhost", (size_t)slen);
533 snprintf(s, (size_t)slen, "%d.%d.%d.%d", (temp >> 24) & 255,
636 snprintf(s, (size_t)slen, "[v1.%s]", temps);
640 strlcpy(s, "UNKNOWN", (size_t)slen);
499 httpAddrString(const http_addr_t *addr, char *s, int slen) argument
788 httpGetHostname(http_t *http, char *s, int slen) argument
[all...]
H A Dstring.c50 size_t slen; /* Length of string */ local
110 slen = strlen(s);
111 item = (_cups_sp_item_t *)calloc(1, sizeof(_cups_sp_item_t) + slen);
120 memcpy(item->str, s, slen + 1);
605 size_t slen; /* Length of string */ local
611 slen = strlen(s);
612 if ((t = malloc(slen + 1)) == NULL)
615 return (memcpy(t, s, slen + 1));
/external/jemalloc/src/
H A Dutil.c329 #define APPEND_S(s, slen) do { \
331 size_t cpylen = (slen <= size - i) ? slen : size - i; \
334 i += slen; \
336 #define APPEND_PADDED_S(s, slen, width, left_justify) do { \
338 size_t pad_len = (width == -1) ? 0 : ((slen < (size_t)width) ? \
339 (size_t)width - slen : 0); \
346 APPEND_S(s, slen); \
412 size_t slen; local
514 ' ' : '-')), buf, &slen);
[all...]
/external/openssh/
H A Dssh-rsa.c46 size_t slen; local
59 slen = RSA_size(key->rsa);
60 if (slen <= 0 || slen > SSHBUF_MAX_BIGNUM)
72 if ((sig = malloc(slen)) == NULL) {
81 if (len < slen) {
82 size_t diff = slen - len;
85 } else if (len > slen) {
95 (ret = sshbuf_put_string(b, sig, slen)) != 0)
111 explicit_bzero(sig, slen);
[all...]
H A Dssh-ed25519.c40 size_t slen = 0, len; local
55 smlen = slen = datalen + crypto_sign_ed25519_BYTES;
56 if ((sig = malloc(slen)) == NULL)
87 explicit_bzero(sig, slen);
/external/autotest/site_utils/
H A Dlog_socket_server.py42 slen = struct.unpack('>L', chunk)[0]
43 chunk = self.connection.recv(slen)
44 while len(chunk) < slen:
45 chunk = chunk + self.connection.recv(slen - len(chunk))
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/
H A DNSEC3PARAM.py70 (algorithm, flags, iterations, slen) = struct.unpack('!BBHB',
74 salt = wire[current : current + slen]
75 current += slen
76 rdlen -= slen
/external/iputils/ninfod/
H A Dninfod_name.c209 static int compare_dnsname(const char *s, size_t slen, argument
214 if (slen < 1 || nlen < 1)
217 if (slen == nlen && memcmp(s, n, slen) == 0)
219 if (*(s0 + slen - 1) || *(n0 + nlen - 1))
221 while (s < s0 + slen && n < n0 + nlen) {
224 if (s + *s + 1 > s0 + slen || n + *n + 1 > n0 + nlen)
227 if (s == s0 + slen - 1)
229 else if (s + 1 == s0 + slen - 1)
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_sd.c335 u16 slen; local
365 slen = *pos++;
366 if (slen > end - pos || slen < 2) {
370 next = pos + slen;
383 slen = WPA_GET_LE16(pos);
385 if (slen > end - pos)
387 end = pos + slen;
398 slen = WPA_GET_LE16(pos);
400 if (slen > en
491 u16 slen; local
703 u16 slen; local
[all...]
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_sd.c335 u16 slen; local
365 slen = *pos++;
366 if (slen > end - pos || slen < 2) {
370 next = pos + slen;
383 slen = WPA_GET_LE16(pos);
385 if (slen > end - pos)
387 end = pos + slen;
398 slen = WPA_GET_LE16(pos);
400 if (slen > en
491 u16 slen; local
703 u16 slen; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_sd.c335 u16 slen; local
365 slen = *pos++;
366 if (slen > end - pos || slen < 2) {
370 next = pos + slen;
383 slen = WPA_GET_LE16(pos);
385 if (slen > end - pos)
387 end = pos + slen;
398 slen = WPA_GET_LE16(pos);
400 if (slen > en
491 u16 slen; local
703 u16 slen; local
[all...]
/external/toybox/toys/posix/
H A Dnl.c46 int w = TT.w, slen = strlen(TT.s); local
64 } else printf("%*c", (int)w+slen, ' ');
/external/wpa_supplicant_8/wpa_supplicant/
H A Dhs20_supplicant.c422 size_t slen, u8 dialog_token)
433 icon->image = os_malloc(slen);
436 os_memcpy(icon->image, pos, slen);
437 icon->image_len = slen;
454 if (slen < 4) {
464 slen--;
466 if ((size_t) 1 + pos[0] > slen) {
473 slen -= 1 + pos[0];
476 if (slen < 2) {
483 slen
420 hs20_process_icon_binary_file(struct wpa_supplicant *wpa_s, const u8 *sa, const u8 *pos, size_t slen, u8 dialog_token) argument
555 hs20_parse_rx_hs20_anqp_resp(struct wpa_supplicant *wpa_s, struct wpa_bss *bss, const u8 *sa, const u8 *data, size_t slen, u8 dialog_token) argument
[all...]
/external/kmod/libkmod/
H A Dlibkmod-elf.c346 uint64_t slen; local
347 const char *s = elf_get_strings_section(elf, &slen);
348 if (slen == 0 || s[slen - 1] != '\0') {
503 size_t off, offcrc, slen; local
534 slen = 0;
542 slen += strlen(symbol) + 1;
545 *array = a = malloc(sizeof(struct kmod_modversion) * count + slen);
708 size_t slen = i - last; local
716 memcpy(itr, strings + last, slen);
724 size_t slen = i - last; local
759 size_t slen, symlen; local
916 size_t slen, verlen, symlen, crclen; local
[all...]
/external/iptables/extensions/
H A Dlibxt_string.c94 int i=0, slen, sindex=0, schar; local
98 slen = strlen(s);
100 if (slen == 0) {
105 while (i < slen) {
120 if (i+1 >= slen)
127 if (i+1 >= slen) {
135 if (i+1 >= slen) {
139 if (i+2 >= slen) {
/external/selinux/libsemanage/src/
H A Dutilities.c236 size_t count = 0, slen, rlen, newsize; local
240 slen = strlen(search);
244 if (slen == 0)
248 for (p = strstr(src, search); p != NULL; p = strstr(p + slen, search)) {
257 newsize = strlen(src) + 1 + count * (rlen - slen);
277 psrc = p + slen;
/external/boringssl/src/crypto/asn1/
H A Da_d2i_fp.c188 c.inf = ASN1_get_object(&(c.p), &(c.slen), &(c.tag), &(c.xclass),
210 } else if (eos && (c.slen == 0) && (c.tag == V_ASN1_EOC)) {
218 /* suck in c.slen bytes of data */
219 want = c.slen;
259 if (off + c.slen < off) {
263 off += c.slen;

Completed in 472 milliseconds

1234567