/system/core/libcutils/ |
socket_local.h | 37 struct sockaddr_un *p_addr, socklen_t *alen);
|
socket_local_server.c | 56 socklen_t alen; local 60 err = socket_make_sockaddr_un(name, namespaceId, &addr, &alen); 80 if(bind(s, (struct sockaddr *) &addr, alen) < 0) {
|
socket_local_client.c | 46 struct sockaddr_un *p_addr, socklen_t *alen) 111 *alen = namelen + offsetof(struct sockaddr_un, sun_path) + 1; 128 socklen_t alen; local 132 err = socket_make_sockaddr_un(name, namespaceId, &addr, &alen); 138 if(connect(fd, (struct sockaddr *) &addr, alen) < 0) {
|
socket_inaddr_any_server.c | 39 size_t alen; local
|
socket_loopback_client.c | 40 socklen_t alen; local
|
socket_loopback_server.c | 39 size_t alen; local
|
socket_network_client.c | 43 socklen_t alen; local
|
/external/iproute2/lib/ |
ll_map.c | 32 int alen; member in struct:idxmap 78 int alen; local 79 im->alen = alen = RTA_PAYLOAD(tb[IFLA_ADDRESS]); 80 if (alen > sizeof(im->addr)) 81 alen = sizeof(im->addr); 82 memcpy(im->addr, RTA_DATA(tb[IFLA_ADDRESS]), alen); 84 im->alen = 0; 138 unsigned alen) 147 if (alen > sizeof(im->addr) [all...] |
ll_addr.c | 32 const char *ll_addr_n2a(unsigned char *addr, int alen, int type, char *buf, int blen) 37 if (alen == 4 && 41 if (alen == 16 && type == ARPHRD_TUNNEL6) { 45 for (i=0; i<alen; i++) {
|
/external/wpa_supplicant/ |
eap_sim_common.c | 236 size_t alen, plen, i, list_len; local 263 alen = pos[1] * 4 - 2; 265 apos, alen); 271 alen -= 2; 272 if ((!aka && (alen % GSM_RAND_LEN)) || 273 (aka && alen != EAP_AKA_RAND_LEN)) { 276 (unsigned long) alen); 280 attr->num_chal = alen / GSM_RAND_LEN; 290 alen -= 2; 291 if (alen != EAP_AKA_AUTN_LEN) [all...] |
eap_gpsk.c | 138 u16 alen; local 144 alen = WPA_GET_BE16(pos); 146 if (end - pos < alen) { 151 data->id_server = os_malloc(alen); 156 os_memcpy(data->id_server, pos, alen); 157 data->id_server_len = alen; 160 pos += alen; 504 u16 alen; local 514 alen = WPA_GET_BE16(pos); 516 if (end - pos < alen) { [all...] |
/external/iproute2/include/ |
ll_map.h | 13 unsigned alen);
|
rt_names.h | 23 const char *ll_addr_n2a(unsigned char *addr, int alen, int type, char *buf, int blen);
|
libnetlink.h | 54 extern int addattr_l(struct nlmsghdr *n, int maxlen, int type, const void *data, int alen); 61 extern int rta_addattr_l(struct rtattr *rta, int maxlen, int type, const void *data, int alen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 506 size_t alen, plen, i, list_len; local 533 alen = pos[1] * 4 - 2; 535 apos, alen); 541 alen -= 2; 542 if ((!aka && (alen % GSM_RAND_LEN)) || 543 (aka && alen != EAP_AKA_RAND_LEN)) { 546 (unsigned long) alen); 550 attr->num_chal = alen / GSM_RAND_LEN; 560 alen -= 2; 561 if (alen != EAP_AKA_AUTN_LEN) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 255 u16 alen; local 274 alen = WPA_GET_BE16(pos); 276 if (end - pos < alen) { 283 data->id_peer = os_malloc(alen); 286 "%d-octet ID_Peer", alen); 289 os_memcpy(data->id_peer, pos, alen); 290 data->id_peer_len = alen; 293 pos += alen; 301 alen = WPA_GET_BE16(pos); 303 if (end - pos < alen) { 473 u16 alen; local [all...] |
/bionic/linker/ |
debugger.c | 54 socklen_t alen; local 76 alen = namelen + offsetof(struct sockaddr_un, sun_path) + 1; 81 RETRY_ON_EINTR(err,connect(s, (struct sockaddr *) &addr, alen));
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 136 u16 alen; local 142 alen = WPA_GET_BE16(pos); 144 if (end - pos < alen) { 149 data->id_server = os_malloc(alen); 154 os_memcpy(data->id_server, pos, alen); 155 data->id_server_len = alen; 158 pos += alen; 489 u16 alen; local 499 alen = WPA_GET_BE16(pos); 501 if (end - pos < alen) { [all...] |
/external/bluetooth/bluez/compat/ |
dun.c | 190 socklen_t alen; local 198 alen = sizeof(sa); 199 if (getpeername(sk, (struct sockaddr *) &sa, &alen) < 0) 203 alen = sizeof(sa); 204 if (getsockname(sk, (struct sockaddr *) &sa, &alen) < 0)
|
/external/ipsec-tools/src/racoon/ |
isakmp_unity.c | 208 int alen = ntohs(attr->lorv); local 217 if (alen) 218 count = alen / sizeof(struct unity_network); 231 if (alen) 232 count = alen / sizeof(struct unity_network);
|
isakmp_cfg.c | 320 size_t alen; local 361 alen = ntohs(attr->lorv); 364 if (tlen < alen) { 373 s_isakmp_cfg_type(type), alen); 437 attr = (struct isakmp_data *)(npp + sizeof(*attr) + alen); 438 tlen -= (sizeof(*attr) + alen); 470 alen = ntohs(attrpl->h.len) - sizeof(*attrpl); 471 if ((buf = vmalloc(alen)) == NULL) { 493 size_t alen; local 546 alen = ntohs(attr->lorv) 661 size_t alen; local 1765 size_t alen = ntohs(attr->lorv); local 1786 size_t alen = ntohs(attr->lorv); local 1810 size_t alen = ntohs(attr->lorv); local [all...] |
/external/openssl/crypto/dh/ |
dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 166 alen=DH_size(a); 167 abuf=(unsigned char *)OPENSSL_malloc(alen);
|
/external/bluetooth/bluez/tools/ |
main.c | 325 socklen_t alen; local 384 alen = sizeof(laddr); 385 if (getsockname(sk, (struct sockaddr *)&laddr, &alen) < 0) { 489 socklen_t alen; local 529 alen = sizeof(raddr); 530 nsk = accept(sk, (struct sockaddr *) &raddr, &alen); 532 alen = sizeof(laddr); 533 if (getsockname(nsk, (struct sockaddr *)&laddr, &alen) < 0) {
|
/external/openssl/crypto/ecdh/ |
ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; local 205 alen=KDF1_SHA1_len; 206 abuf=(unsigned char *)OPENSSL_malloc(alen); 207 aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1);
|
/external/quake/quake/src/QW/qwfwd/ |
qwfwd.c | 171 int alen;
local 212 alen = sizeof(fsin);
213 i1 = recvfrom(s, buffer, 4096, 0, (struct sockaddr *) &fsin, &alen);
|