| /src/external/bsd/wpa/dist/src/utils/ |
| uuid.h | 15 int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
|
| ip_addr.h | 19 u8 max_len[16]; member in union:hostapd_ip_addr::__anon8505
|
| uuid.c | 50 int uuid_bin2str(const u8 *bin, char *str, size_t max_len) 53 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 59 if (os_snprintf_error(max_len, len))
|
| /src/external/bsd/flex/dist/tests/ |
| yyextra.l | 39 int max_len; 73 buf->max_len = 4; 75 buf->data = malloc((size_t) buf->max_len); 101 if( buf->curr_len >= buf->max_len ) 104 new_buf->max_len = buf->max_len + buf->grow_len; 106 new_buf->data = malloc((size_t) new_buf->max_len);
|
| /src/crypto/external/apache2/openssl/dist/crypto/rand/ |
| prov_seed.c | 20 size_t min_len, size_t max_len) 26 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); 46 size_t min_len, size_t max_len) 51 return evp_rand_get_seed(rng, pout, entropy, min_len, max_len, 54 return ossl_rand_get_entropy(ctx, pout, entropy, min_len, max_len); 76 size_t min_len, ossl_unused size_t max_len, 82 pool = ossl_rand_pool_new(0, 0, min_len, max_len); 102 size_t min_len, size_t max_len, 109 return ossl_rand_get_nonce(ctx, pout, min_len, max_len, salt, salt_len);
|
| rand_pool.c | 23 size_t min_len, size_t max_len) 32 pool->max_len = (max_len > RAND_POOL_MAX_LENGTH) ? RAND_POOL_MAX_LENGTH : max_len; 34 if (pool->alloc_len > pool->max_len) 35 pool->alloc_len = pool->max_len; 78 pool->min_len = pool->max_len = pool->alloc_len = pool->len; 201 const size_t limit = pool->max_len / 2; 204 if (pool->attached || len > pool->max_len - pool->len) { 210 newlen = newlen < limit ? newlen * 2 : pool->max_len; [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| concat.c | 71 roken_vmconcat (char **s, size_t max_len, va_list args) 84 if(max_len && len + n > max_len){ 103 roken_mconcat (char **s, size_t max_len, ...) 108 va_start(args, max_len); 109 ret = roken_vmconcat (s, max_len, args);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/include/prov/ |
| seeding.h | 23 int entropy, size_t min_len, size_t max_len); 27 size_t min_len, size_t max_len,
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_rstream.c | 98 size_t max_len; local 100 data = ring_buf_get_ptr(&qrs->rbuf, range.start, &max_len); 103 if (max_len < l) { 104 memcpy(buf, data, max_len); 105 size -= max_len; 106 buf += max_len; 107 readbytes_ += max_len; 108 l -= max_len; 109 data = ring_buf_get_ptr(&qrs->rbuf, range.start + max_len, 110 &max_len); 196 size_t rec_len_, max_len; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/rand/ |
| prov_seed.c | 17 size_t min_len, size_t max_len) 23 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); 48 unsigned char **pout, size_t min_len, size_t max_len, 54 pool = ossl_rand_pool_new(0, 0, min_len, max_len);
|
| rand_pool.c | 23 size_t min_len, size_t max_len) 34 pool->max_len = (max_len > RAND_POOL_MAX_LENGTH) ? 35 RAND_POOL_MAX_LENGTH : max_len; 37 if (pool->alloc_len > pool->max_len) 38 pool->alloc_len = pool->max_len; 85 pool->min_len = pool->max_len = pool->alloc_len = pool->len; 209 const size_t limit = pool->max_len / 2; 212 if (pool->attached || len > pool->max_len - pool->len) { 218 newlen = newlen < limit ? newlen * 2 : pool->max_len; [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/common/ |
| provider_seeding.c | 48 int entropy, size_t min_len, size_t max_len) 53 pout, entropy, min_len, max_len); 64 size_t min_len, size_t max_len, 70 min_len, max_len, salt, salt_len);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/include/prov/ |
| seeding.h | 34 int entropy, size_t min_len, size_t max_len); 38 size_t min_len, size_t max_len,
|
| /src/external/gpl3/gcc/dist/gcc/ |
| file-find.h | 36 int max_len; /* Max length of a prefix in PLIST */ member in struct:path_prefix
|
| /src/external/gpl3/gcc.old/dist/gcc/ |
| file-find.h | 36 int max_len; /* Max length of a prefix in PLIST */ member in struct:path_prefix
|
| /src/external/bsd/jemalloc/dist/test/unit/ |
| prof_hook.c | 11 mock_bt_hook(void **vec, unsigned *len, unsigned max_len) { 12 *len = max_len; 13 for (unsigned i = 0; i < max_len; ++i) { 20 mock_bt_augmenting_hook(void **vec, unsigned *len, unsigned max_len) { 21 default_hook(vec, len, max_len); 23 expect_u_lt(*len, max_len, 32 if (*len == max_len) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/asn1/ |
| evp_asn1.c | 30 /* int max_len: for returned value 34 int ASN1_TYPE_get_octetstring(const ASN1_TYPE *a, unsigned char *data, int max_len) 45 if (ret < max_len) 48 num = max_len; 65 * If the length of 'data' > 'max_len', copies only the first 'max_len' 70 long *num, unsigned char *data, int max_len) 77 if (max_len > ret) 80 n = max_len; 118 * If the length of 'data' > 'max_len', copies only the first 'max_len [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/asn1/ |
| evp_asn1.c | 30 /* int max_len: for returned value 34 int ASN1_TYPE_get_octetstring(const ASN1_TYPE *a, unsigned char *data, int max_len) 45 if (ret < max_len) 48 num = max_len; 64 long *num, unsigned char *data, int max_len) 71 if (max_len > ret) 74 n = max_len; 110 unsigned char *data, int max_len) 124 ret = asn1_type_get_int_oct(atmp->oct, atmp->num, num, data, max_len); 166 unsigned char *data, int max_len) [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/common/ |
| provider_seeding.c | 88 int entropy, size_t min_len, size_t max_len) 93 return c_get_user_entropy(handle, pout, entropy, min_len, max_len); 95 return c_get_entropy(handle, pout, entropy, min_len, max_len); 111 size_t min_len, size_t max_len, 117 return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len); 119 return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/asn1/ |
| evp_asn1.c | 29 /* int max_len: for returned value */ 30 int ASN1_TYPE_get_octetstring(const ASN1_TYPE *a, unsigned char *data, int max_len) 41 if (ret < max_len) 44 num = max_len; 82 /* int max_len: for returned value */ 84 unsigned char *data, int max_len) 102 if (max_len > ret) 105 n = max_len;
|
| /src/external/bsd/tre/dist/tests/ |
| bench.c | 144 int max_len = 1024*1024*10; local 161 max_len = atoi(optarg); 188 while (len <= max_len) { 197 len = len + (max_len/steps); 208 while (len <= max_len) { 217 len = len + (max_len/steps); 227 while (len <= max_len) { 236 len = len + (max_len/steps); 246 while (len <= max_len) { 256 len = len + (max_len/steps) [all...] |
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| rand.h | 112 size_t min_len, size_t max_len); 115 size_t min_len, size_t max_len); 121 unsigned char **pout, size_t min_len, size_t max_len, 124 size_t min_len, size_t max_len,
|
| /src/external/gpl3/gdb/dist/sim/ppc/ |
| options.c | 200 int max_len = 0; local 205 if (len > max_len) 206 max_len = len; 209 cols = 78 / (max_len + 2); 220 : max_len + 4 - (int)strlen (defines[i])),
|
| /src/external/gpl3/gdb.old/dist/sim/ppc/ |
| options.c | 200 int max_len = 0; local 205 if (len > max_len) 206 max_len = len; 209 cols = 78 / (max_len + 2); 220 : max_len + 4 - (int)strlen (defines[i])),
|
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
| sanitizer_file.cc | 97 uptr *read_len, uptr max_len, error_t *errno_p) { 101 if (!max_len) 104 uptr kMinFileLen = Min(PageSize, max_len); 107 for (uptr size = kMinFileLen;; size = Min(size * 2, max_len)) { 128 if (just_read == 0 || *read_len == max_len) { 141 InternalMmapVectorNoCtor<char> *buff, uptr max_len, 144 if (!max_len) 151 while (read_len < max_len) { 153 buff->resize(Min(Max(PageSize, read_len * 2), max_len)); 155 CHECK_LE(buff->size(), max_len); [all...] |