Searched refs:len (Results 126 - 150 of 736) sorted by relevance

1234567891011>>

/system/bt/bta/include/
H A Dbta_pan_co.h139 uint16_t len, bool ext, bool forward);
185 tBTA_PAN_STATUS result, uint16_t len,
198 tBTA_PAN_STATUS result, uint16_t len,
/system/bt/osi/src/
H A Dallocator.cc41 char* osi_strndup(const char* str, size_t len) { argument
43 if (len < size) size = len;
/system/bt/packet/avrcp/
H A Dset_addressed_player.cc31 size_t len = VendorPacket::kMinSize(); local
32 len += 1; // Status
33 return len;
H A Dchange_path.cc32 size_t len = BrowsePacket::kMinSize(); local
33 len += 1; // Status
34 if (status_ != Status::NO_ERROR) return len;
36 len += 4; // Number of items in folder
37 return len;
/system/bt/stack/avrc/
H A Davrc_api.cc236 const int pkt_len = MAX(rsp_pkt_len, p_pkt->len);
244 memcpy(p_data_copy, p_data, p_pkt->len);
275 p_pkt_new->len -=
287 /* 4=pdu, pkt_type & len */
289 p_data, (p_pkt_new->len - AVRC_VENDOR_HDR_SIZE - AVRC_MIN_META_HDR_SIZE));
311 AVRC_TRACE_DEBUG("%s handle = %u label = %u len = %d", __func__, handle,
312 label, p_pkt->len);
313 if (p_pkt->len > AVRC_MAX_CTRL_DATA_LEN) {
317 p_pkt->len = AVRC_MAX_CTRL_DATA_LEN;
328 /* 4=pdu, pkt_type & len */
1080 uint16_t len; local
[all...]
H A Davrc_pars_tg.cc55 uint16_t len; local
56 BE_STREAM_TO_UINT16(len, p);
57 if ((len + 4) != (p_msg->vendor_len)) {
65 if (len != 1)
101 uint16_t len; local
123 BE_STREAM_TO_UINT16(len, p);
124 if ((len + 4) != (p_msg->vendor_len)) {
125 AVRC_TRACE_ERROR("%s incorrect length :%d, %d", __func__, len,
137 else if (len != 1)
143 if (len !
[all...]
/system/chre/apps/chqts/src/shared/
H A Dnano_string.cc56 char *strncpy(char *dest, const char *src, size_t len) { argument
58 for (i = 0; (i < len) && (src[i] != '\0'); i++) {
61 for (; i < len; i++) {
/system/core/libappfuse/
H A DFuseBuffer.cc42 if (header.len >= sizeof(header) && header.len <= max_size) {
45 LOG(ERROR) << "Invalid header length is found in " << name << ": " << header.len;
78 if (static_cast<uint32_t>(result) != header.len) {
79 LOG(ERROR) << "Read bytes " << result << " are different from header.len " << header.len;
100 result = TEMP_FAILURE_RETRY(send(fd, buf, header.len, sockflag));
103 {const_cast<void*>(data), header.len - sizeof(header)}};
106 result = TEMP_FAILURE_RETRY(write(fd, buf, header.len));
126 if (static_cast<unsigned int>(result) != header.len) {
[all...]
/system/core/libsparse/
H A Dimg2simg.c53 off64_t len; local
89 len = lseek64(in, 0, SEEK_END);
92 s = sparse_file_new(block_size, len);
/system/tools/hidl/c2hal/test/
H A Dbuild_all.py37 ratio = len(success) / (len(success) + len(failure))
/system/netd/server/
H A DXfrmController.cpp147 void logHex(const char* desc16, const char* buf, size_t len) { argument
148 char* printBuf = new char[len * 2 + 1 + 26]; // len->ascii, +newline, +prefix strlen
154 sprintf(printBuf + offset, "[%4.4u]: ", (len > 9999) ? 9999 : (unsigned)len);
157 for (uint32_t j = 0; j < (uint32_t)len; j++) {
231 static netdutils::Status validateResponse(NetlinkResponse response, size_t len) { argument
232 if (len < sizeof(nlmsghdr)) {
245 if (len < sizeof(NetlinkResponse::_err_)) {
330 void fillXfrmNlaHdr(nlattr* hdr, uint16_t type, uint16_t len) { argument
867 int len; local
897 int len = NLA_HDRLEN + sizeof(xfrm_algo); local
912 int len = NLA_HDRLEN + sizeof(xfrm_algo_auth); local
932 int len = NLA_HDRLEN + sizeof(xfrm_algo_aead); local
953 int len = NLA_HDRLEN + sizeof(xfrm_encap_tmpl); local
1011 int len; local
1034 int len; local
1097 int len; local
1132 int len = iov[USERPOLICYID].iov_len = fillUserPolicyId(record, direction, &policyid); local
1178 int len = NLA_HDRLEN + sizeof(xfrm_user_tmpl); local
1186 int len = NLA_HDRLEN + sizeof(xfrm_mark); local
1199 int len = NLA_HDRLEN + sizeof(__u32); local
[all...]
/system/core/fastboot/
H A Dprotocol.cpp205 size_t len = std::min(remaining, MAX_MAP_SIZE); local
207 if (!filemap.create(NULL, fd, offset, len, true)) {
211 if (_command_write_data(transport, filemap.getDataPtr(), len) < 0) {
215 remaining -= len;
216 offset += len;
274 static int fb_download_data_sparse_write(void *priv, const void *data, int len) argument
282 to_write = std::min(TRANSPORT_BUF_SIZE - transport_buf_len, len);
287 len -= to_write;
298 if (len > TRANSPORT_BUF_SIZE) {
303 to_write = round_down(len, TRANSPORT_BUF_SIZ
[all...]
/system/core/libmemtrack/
H A Dmemtrack_test.c28 static int getprocname(pid_t pid, char *buf, int len) { argument
34 if (len <= 0) {
49 if (fgets(buf, len, f) == NULL) {
65 if (strlcpy(buf, unknown_cmdline, (size_t)len) >= (size_t)len) {
/system/core/logd/
H A Dlibaudit.c192 ssize_t len; local
212 len = TEMP_FAILURE_RETRY(recvfrom(fd, rep, sizeof(*rep), flags,
218 if (len < 0) {
237 if (!NLMSG_OK(&rep->nlh, (size_t)len)) {
238 rc = (len == sizeof(*rep)) ? -EFBIG : -EBADE;
/system/sepolicy/tests/
H A DFcSort.py30 while i < len(path):
55 if (len(line) == 0) or (line[0] == '#'):
62 if len(split) == 3:
66 strLen = len(path.replace("\\", ""))
122 if len(sys.argv) < 2:
/system/bt/stack/smp/
H A Dsmp_cmac.cc36 uint16_t len; member in struct:__anon1339
184 ((cmac_cb.len % BT_OCTET16_LEN) == 0 && cmac_cb.len != 0) ? true : false;
192 padding(&cmac_cb.text[0], (uint8_t)(cmac_cb.len % 16));
281 uint16_t len, diff; local
289 len = n * BT_OCTET16_LEN;
291 SMP_TRACE_WARNING("AES128_CMAC started, allocate buffer size = %d", len);
293 cmac_cb.text = (uint8_t*)osi_calloc(len);
295 diff = len - length;
299 cmac_cb.len
[all...]
/system/core/libappfuse/tests/
H A DFuseBufferTest.cc46 packet->header.len = headerSize;
59 packet->header.len = size;
70 request.header.len = sizeof(FuseRequest);
85 EXPECT_EQ(sizeof(FuseRequest), request.header.len);
121 EXPECT_EQ(sizeof(fuse_out_header), response.header.len);
128 EXPECT_EQ(sizeof(fuse_out_header) + 5, response.header.len);
145 EXPECT_EQ(sizeof(fuse_out_header), response.header.len);
152 EXPECT_EQ(sizeof(fuse_out_header) + 5, response.header.len);
170 buffer.response.header.len);
186 ASSERT_EQ(sizeof(fuse_out_header), buffer.response.header.len);
[all...]
/system/core/libcutils/
H A Dtrace-container.cpp131 int len = snprintf( \
135 if (len >= (int) sizeof(buf)) { \
136 int name_len = strlen(name) - (len - sizeof(buf)) - 1; \
140 len = snprintf( \
147 len = 0; \
150 if (len > 0) { \
151 write(atrace_container_sock_fd, buf, len); \
/system/extras/simpleperf/
H A Dthread_tree.h39 uint64_t len; member in struct:simpleperf::MapEntry
45 MapEntry(uint64_t start_addr, uint64_t len, uint64_t pgoff, uint64_t time, argument
48 len(len),
55 uint64_t get_end_addr() const { return start_addr + len; }
95 void AddKernelMap(uint64_t start_addr, uint64_t len, uint64_t pgoff,
97 void AddThreadMap(int pid, int tid, uint64_t start_addr, uint64_t len,
/system/bt/hci/src/
H A Dhci_layer_linux.cc76 uint16_t len; member in struct:mgmt_pkt
114 ssize_t len = read(fd, buf, buf_size); local
116 while (len > 0) {
117 if (len == buf_size)
128 packet->len = len - 1;
129 memcpy(packet->data, buf + 1, len - 1);
165 len = read(fd, buf, buf_size);
272 size_t ret = write(bt_vendor_fd, addr, packet->len + 1);
276 if (ret != packet->len
384 ssize_t len; local
[all...]
/system/iot/attestation/atap/libatap/
H A Datap_util.c23 size_t len = atap_strlen(str); local
25 if (len >= 2) {
26 for (n = len - 2; n >= 0; n--) {
273 uint32_t cert_chain_len = 0, len = 0; local
286 copy_uint32_from_buf(&buf_ptr, &len);
287 if (len != buf_size - ATAP_HEADER_LEN) {
294 copy_uint32_from_buf(&buf_ptr, &len);
297 i != ATAP_INNER_CA_RESPONSE_FIELDS - 1 && len != 0) {
300 if (len > ATAP_KEY_LEN_MAX) {
303 buf_ptr += len;
[all...]
/system/bt/btif/co/
H A Dbta_hh_co.cc239 int bta_hh_co_write(int fd, uint8_t* rpt, uint16_t len) { argument
240 APPL_TRACE_VERBOSE("%s: UHID write %d", __func__, len);
245 ev.u.input.size = len;
246 if (len > sizeof(ev.u.input.data)) {
250 memcpy(ev.u.input.data, rpt, len);
396 * len - length of report data
403 void bta_hh_co_data(uint8_t dev_handle, uint8_t* p_rpt, uint16_t len, argument
433 bta_hh_co_write(p_dev->fd, p_rpt, len);
435 APPL_TRACE_WARNING("%s: Error: fd = %d, ready %d, len = %d", __func__,
436 p_dev->fd, p_dev->ready_for_data, len);
527 size_t len = btif_config_get_bin_length(bdstr, "HidReport"); local
564 size_t len = btif_config_get_bin_length(bdstr, "HidReport"); local
[all...]
/system/extras/boottime_tools/bootanalyze/
H A Dbugreport_anayze.py82 if len(self.native_crash) > 0:
87 if len(self.java_crash) > 0:
94 if len(self.shutdown_events) == 0:
113 if len(self.events) > 0:
116 if len(self.timings) > 0:
119 nums_to_dump = min(20, len(timings_sorted))
124 if len(self.shutdown_events) > 0:
127 if len(self.native_crash) > 0:
128 print "\n***Native crash founds:", len(self.native_crash)
131 if len(sel
[all...]
/system/core/liblog/
H A Dpmsg_reader.c187 if ((buf.p.magic != LOGGER_MAGIC) || (buf.p.len <= sizeof(buf)) ||
188 (buf.p.len > (sizeof(buf) + LOGGER_ENTRY_MAX_PAYLOAD)) ||
217 read(fd, msg + sizeof(buf.prio), buf.p.len - sizeof(buf)));
221 if (ret != (ssize_t)(buf.p.len - sizeof(buf))) {
225 log_msg->entry_v4.len = buf.p.len - sizeof(buf) + sizeof(buf.prio);
254 lseek(fd, (off_t)(buf.p.len - sizeof(buf)), SEEK_CUR));
258 if ((next - current) != (ssize_t)(buf.p.len - sizeof(buf))) {
297 size_t len, prefix_len; local
360 len
[all...]
/system/extras/boottime_tools/io_analysis/
H A Dcheck_file_read.py37 # init-1 [003] ...1 2.703991: ext4_ext_map_blocks_enter: dev 253,0 ino 2719 lblk 154 len 30 flags
38 RE_EXT4_MA_BLOCKS_ENTER = r"""\s+(\S+)-([0-9]+).+\s+([0-9]+\.[0-9]+):\s+ext4_ext_map_blocks_enter:\s+dev\s+(\S+)\s+ino\s+([0-9]+)\s+lblk\s+([0-9]+)\s+len\s+([0-9]+)"""
39 # init-1 [002] ...1 2.687205: ext4_ext_map_blocks_exit: dev 253,0 ino 8 flags lblk 0 pblk 196608 len 1 mflags M ret 1
83 for i in range(len(offsets)):
87 for j in range(len(lens)):
89 total_lens = len(total_read_offsets)
101 if len(self.ext4_access_size_histogram) > 1:
104 if len(self.ext4_single_block_accesses) > 0 and self.total_access > 1:
107 if len(self.block_access_size_histogram) > 1:
110 if len(sel
[all...]

Completed in 660 milliseconds

1234567891011>>