/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/ |
H A D | p2p_sd.c | 428 size_t max_len; in p2p_sd_response() local 435 max_len = (freq > 56160) ? 928 : 1400; in p2p_sd_response() 438 if (wpabuf_len(resp_tlvs) > max_len) { in p2p_sd_response() 626 size_t frag_len, max_len; in p2p_rx_gas_comeback_req() local 655 max_len = (rx_freq > 56160) ? 928 : 1400; in p2p_rx_gas_comeback_req() 657 if (frag_len > max_len) { in p2p_rx_gas_comeback_req() 658 frag_len = max_len; in p2p_rx_gas_comeback_req()
|
H A D | p2p_utils.c | 478 unsigned int max_len) in p2p_channels_to_freqs() 482 if (!channels || max_len == 0) in p2p_channels_to_freqs() 489 if (idx + 1 == max_len) in p2p_channels_to_freqs() 495 if (idx + 1 == max_len) in p2p_channels_to_freqs() 477 p2p_channels_to_freqs(const struct p2p_channels *channels, int *freq_list, unsigned int max_len) p2p_channels_to_freqs() argument
|
/third_party/backends/backend/ |
H A D | kvs1025.c | 377 SANE_Int max_len, SANE_Int * len) in sane_read() 382 int size = max_len; in sane_read() 417 max_len, size, dev->img_size[side] == 0 ? "True" : "False", side); in sane_read() 376 sane_read(SANE_Handle handle, SANE_Byte * buf, SANE_Int max_len, SANE_Int * len) sane_read() argument
|
H A D | kodak.h | 226 SANE_Status sane_read (SANE_Handle handle, SANE_Byte * buf, SANE_Int max_len, 266 static SANE_Status read_from_buffer(struct scanner *s, SANE_Byte * buf, SANE_Int max_len, SANE_Int * len);
|
H A D | pieusb.c | 1312 * @param max_len 1317 sane_read (SANE_Handle handle, SANE_Byte * buf, SANE_Int max_len, SANE_Int * len) in sane_read() argument 1323 DBG(DBG_info_sane, "sane_read(): requested %d bytes\n", max_len); in sane_read() 1341 DBG(DBG_info_sane, " max_len %d\n", max_len); in sane_read() 1354 } else if (scanner->buffer.bytes_unread >= max_len) { in sane_read() 1356 DBG(DBG_info_sane, "sane_read(): buffer suffices (contains %d, requested %d)\n", scanner->buffer.bytes_unread, max_len); in sane_read() 1357 return_size = max_len; in sane_read() 1360 DBG(DBG_info_sane, "sane_read(): buffer suffices (contains %d, requested %d, last batch though)\n", scanner->buffer.bytes_unread, max_len); in sane_read() 1374 sanei_pieusb_buffer_get(&scanner->buffer, buf, max_len, le in sane_read() [all...] |
H A D | kvs40xx.c | 659 SANE_Int max_len, SANE_Int * len) in sane_read() 675 max_len < in sane_read() 676 (SANE_Int) s->read ? max_len : (SANE_Int) s->read; in sane_read() 689 *len = max_len < inbuf ? max_len : inbuf; in sane_read() 658 sane_read(SANE_Handle handle, SANE_Byte * buf, SANE_Int max_len, SANE_Int * len) sane_read() argument
|
H A D | pieusb_buffer.c | 480 * @param max_len Maximum number of bytes returned 484 sanei_pieusb_buffer_get(struct Pieusb_Read_Buffer* buffer, SANE_Byte* data, SANE_Int max_len, SANE_Int* len) in sanei_pieusb_buffer_get() argument 498 while (n < max_len && buffer->bytes_read < buffer->image_size_bytes) { in sanei_pieusb_buffer_get() 509 while (n < max_len && buffer->bytes_read < buffer->image_size_bytes) { in sanei_pieusb_buffer_get() 532 while (n < max_len && buffer->bytes_read < buffer->image_size_bytes) { in sanei_pieusb_buffer_get()
|
H A D | abaton.c | 1272 sane_read (SANE_Handle handle, SANE_Byte * buf, SANE_Int max_len, in sane_read() argument 1340 if ((data_av * 2) + offset > max_len) in sane_read() 1341 rread = (max_len - offset) / 2; in sane_read() 1345 else if (data_av + offset > max_len) in sane_read() 1347 rread = max_len - offset; in sane_read() 1384 offset, max_len, (double) (offset * 100. / max_len)); in sane_read() 1387 while (offset < max_len && data_length != 0 && !s->AbortedByUser); in sane_read()
|
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | asn1_lib.c | 431 /* |max_len| excludes NUL terminator and may be 0 to indicate no restriction */ 433 const char *sep, size_t max_len) in STACK_OF() 450 if (max_len != 0 && length > max_len) in STACK_OF()
|
/third_party/node/deps/openssl/openssl/providers/implementations/rands/ |
H A D | test_rng.c | 231 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() 239 return t->entropy_len > max_len ? max_len : t->entropy_len; in test_rng_get_seed() 230 test_rng_get_seed(void *vtest, unsigned char **pout, int entropy, size_t min_len, size_t max_len, ossl_unused int prediction_resistance, ossl_unused const unsigned char *adin, ossl_unused size_t adin_len) test_rng_get_seed() argument
|
H A D | crngt.c | 104 int entropy, size_t min_len, size_t max_len, in ossl_crngt_get_entropy() 145 if (bytes_needed > max_len) in ossl_crngt_get_entropy() 102 ossl_crngt_get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance) ossl_crngt_get_entropy() argument
|
/third_party/openssl/crypto/asn1/ |
H A D | asn1_lib.c | 431 /* |max_len| excludes NUL terminator and may be 0 to indicate no restriction */ 433 const char *sep, size_t max_len) in STACK_OF() 450 if (max_len != 0 && length > max_len) in STACK_OF()
|
/third_party/openssl/providers/implementations/rands/ |
H A D | test_rng.c | 231 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() 239 return t->entropy_len > max_len ? max_len : t->entropy_len; in test_rng_get_seed() 230 test_rng_get_seed(void *vtest, unsigned char **pout, int entropy, size_t min_len, size_t max_len, ossl_unused int prediction_resistance, ossl_unused const unsigned char *adin, ossl_unused size_t adin_len) test_rng_get_seed() argument
|
H A D | crngt.c | 104 int entropy, size_t min_len, size_t max_len, in ossl_crngt_get_entropy() 145 if (bytes_needed > max_len) in ossl_crngt_get_entropy() 102 ossl_crngt_get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance) ossl_crngt_get_entropy() argument
|
/third_party/node/deps/openssl/openssl/crypto/ |
H A D | params.c | 1098 size_t *max_len, size_t *used_len, in get_string_internal() 1128 *max_len = alloc_sz; in get_string_internal() 1131 if (*max_len < sz) in get_string_internal() 1137 int OSSL_PARAM_get_utf8_string(const OSSL_PARAM *p, char **val, size_t max_len) in OSSL_PARAM_get_utf8_string() argument 1139 int ret = get_string_internal(p, (void **)val, &max_len, NULL, in OSSL_PARAM_get_utf8_string() 1148 * to be out of bounds according to |max_len|, so in that case, we in OSSL_PARAM_get_utf8_string() 1157 if (data_length >= max_len) in OSSL_PARAM_get_utf8_string() 1159 if (data_length >= max_len) in OSSL_PARAM_get_utf8_string() 1166 int OSSL_PARAM_get_octet_string(const OSSL_PARAM *p, void **val, size_t max_len, in OSSL_PARAM_get_octet_string() argument 1169 return get_string_internal(p, val, &max_len, used_le in OSSL_PARAM_get_octet_string() 1097 get_string_internal(const OSSL_PARAM *p, void **val, size_t *max_len, size_t *used_len, unsigned int type) get_string_internal() argument [all...] |
/third_party/openssl/crypto/ |
H A D | params.c | 1078 size_t *max_len, size_t *used_len, in get_string_internal() 1108 *max_len = alloc_sz; in get_string_internal() 1111 if (*max_len < sz) in get_string_internal() 1117 int OSSL_PARAM_get_utf8_string(const OSSL_PARAM *p, char **val, size_t max_len) in OSSL_PARAM_get_utf8_string() argument 1119 int ret = get_string_internal(p, (void **)val, &max_len, NULL, in OSSL_PARAM_get_utf8_string() 1128 * to be out of bounds according to |max_len|, so in that case, we in OSSL_PARAM_get_utf8_string() 1137 if (data_length >= max_len) in OSSL_PARAM_get_utf8_string() 1139 if (data_length >= max_len) in OSSL_PARAM_get_utf8_string() 1146 int OSSL_PARAM_get_octet_string(const OSSL_PARAM *p, void **val, size_t max_len, in OSSL_PARAM_get_octet_string() argument 1149 return get_string_internal(p, val, &max_len, used_le in OSSL_PARAM_get_octet_string() 1077 get_string_internal(const OSSL_PARAM *p, void **val, size_t *max_len, size_t *used_len, unsigned int type) get_string_internal() argument [all...] |
/third_party/skia/tests/ |
H A D | WangsFormulaTest.cpp | 61 float max_len = 0; in wangs_formula_conic_reference_impl() local 63 max_len = std::max(max_len, tP[i].length()); in wangs_formula_conic_reference_impl() 65 SkASSERT(max_len > 0); in wangs_formula_conic_reference_impl() 69 const float r_minus_eps = std::max(0.f, max_len - eps); in wangs_formula_conic_reference_impl()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | uuid.h | 15 int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
|
H A D | ip_addr.h | 19 u8 max_len[16]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | uuid.h | 15 int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
|
H A D | ip_addr.h | 22 u8 max_len[16]; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/ |
H A D | p2p_utils.c | 460 unsigned int max_len) in p2p_channels_to_freqs() 464 if (!channels || max_len == 0) in p2p_channels_to_freqs() 471 if (idx + 1 == max_len) in p2p_channels_to_freqs() 477 if (idx + 1 == max_len) in p2p_channels_to_freqs() 459 p2p_channels_to_freqs(const struct p2p_channels *channels, int *freq_list, unsigned int max_len) p2p_channels_to_freqs() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth.h | 407 size_t max_len, int auth_alg, 453 size_t current_len, size_t max_len, 476 u8 *pos, size_t max_len, 479 u8 *pos, size_t max_len,
|
/third_party/FreeBSD/sys/dev/usb/ |
H A D | usb_util.h | 34 uint8_t usb_make_str_desc(void *ptr, uint16_t max_len, const char *s);
|
/third_party/libwebsockets/lib/core-net/ |
H A D | network.c | 657 lws_parse_numeric_address(const char *ads, uint8_t *result, size_t max_len) in lws_parse_numeric_address() argument 675 if (!ipv6 && max_len < 4) in lws_parse_numeric_address() 678 if (ipv6 && max_len < 16) in lws_parse_numeric_address() 682 memset(result, 0, max_len); in lws_parse_numeric_address() 737 memset(orig, 0, max_len); in lws_parse_numeric_address() 778 } while (ts.e > 0 && result - orig <= (int)max_len); in lws_parse_numeric_address()
|