/external/bluetooth/bluez/common/ |
btio.c | 682 socklen_t olen; local 685 olen = len; 686 if (getsockname(sock, src, &olen) < 0) { 692 olen = len; 693 if (getpeername(sock, dst, &olen) < 0) {
|
/external/qemu/slirp/ |
ip_input.c | 709 int olen; 711 olen = (ip->ip_hl<<2) - sizeof (struct ip); 713 i = m->m_len - (sizeof (struct ip) + olen); 714 memcpy(opts, opts + olen, (unsigned)i); 715 m->m_len -= olen;
|
/external/qemu/slirp-android/ |
ip_input.c | 709 int olen; 711 olen = (ip->ip_hl<<2) - sizeof (struct ip); 713 i = m->m_len - (sizeof (struct ip) + olen); 714 memcpy(opts, opts + olen, (unsigned)i); 715 m->m_len -= olen;
|
/external/iproute2/misc/ |
nstat.c | 425 socklen_t olen = sizeof(cred); local 427 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || 428 olen < sizeof(cred))
|
rtacct.c | 416 socklen_t olen = sizeof(cred); local 418 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || 419 olen < sizeof(cred))
|
ifstat.c | 540 socklen_t olen = sizeof(cred); local 542 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || 543 olen < sizeof(cred))
|
/external/openssl/crypto/asn1/ |
a_object.c | 86 int a2d_ASN1_OBJECT(unsigned char *out, int olen, const char *buf, int num) 205 if (len+i > olen)
|
tasn_dec.c | 76 static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass, 1256 static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass, 1333 if (olen) 1334 *olen = plen;
|
asn1.h | 892 int a2d_ASN1_OBJECT(unsigned char *out,int olen, const char *buf, int num); [all...] |
/external/ppp/pppd/ |
ipv6cp.c | 1440 int code, id, len, olen; local [all...] |
ipcp.c | 2036 int code, id, len, olen; local [all...] |
eap.c | 1257 int dsize, fd, olen = len; local 1284 if (olen <= 0 || *inp + 1 > olen) { 1285 dbglog("EAP: decoded pseudonym is unusable <%.*B>", olen, inp); [all...] |
sys-solaris.c | [all...] |
/external/openssl/ssl/ |
s2_pkt.c | 516 unsigned int j,k,olen,p,mac_size,bs; local 519 olen=len; 641 s->s2->wpend_tot=olen; 647 return(write_pending(s,buf,olen));
|
/external/srec/seti/sltsEngine/src/ |
run_seq_lts.c | 410 unsigned char olen; local 430 PORT_FREAD_CHAR(&olen, sizeof(char), 1, fp); 431 out = outputs[i] = lts_alloc(olen + 1, sizeof(char)); 437 if (olen > 0) { 438 PORT_FREAD_CHAR(out, sizeof(char), olen, fp); 440 out[olen] = '\0'; 454 pfprintf(PSTDOUT,"LOAD_TREE: outputs[%d] len %d out %x out %s\n", i, olen, outputs[i], outputs[i]); [all...] |
/external/tcpdump/ |
print-fr.c | 721 int olen; local 753 olen = length; /* preserve the original length for non verbose mode */ 770 printf(", length %u",olen); 801 printf(", length %u",olen);
|
print-ppp.c | 1400 u_int olen = length; \/* _o_riginal length *\/ local [all...] |
/external/clearsilver/mod_ecs/ |
mod_ecs.c | 107 static int buf_getline (const char *idata, int ilen, char *odata, int olen, int *nonl) 123 if (len > olen) len = olen;
|
/external/clearsilver/cgi/ |
cgi.c | 883 static NEOERR *cgi_compress (STRING *str, char *obuf, int *olen) 891 stream.avail_out = (uInt)*olen; 892 if ((uLong)stream.avail_out != *olen) 893 return nerr_raise(NERR_NOMEM, "Destination too big: %d", *olen); 909 *olen = stream.total_out; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast.c | 1366 size_t tlv_len, olen; local [all...] |
/external/wpa_supplicant/ |
eap_fast.c | 1870 size_t tlv_len, olen; local [all...] |
tlsv1_client.c | 1965 size_t olen; local [all...] |
/external/bluetooth/bluez/lib/ |
hci.c | 994 socklen_t olen; local 998 olen = sizeof(of); 999 if (getsockopt(dd, SOL_HCI, HCI_FILTER, &of, &olen) < 0) [all...] |
/external/ipsec-tools/src/racoon/ |
gssapi.c | 554 plog(LLV_DEBUG, LOCATION, NULL, "wrapped HASH, ilen %zu olen %zu\n",
|
/external/qemu/ |
i386-dis.c | 6195 size_t olen = strlen (obuf); local 6445 size_t olen; local [all...] |