/external/openssh/ |
rsa.c | 78 int len, ilen, olen; local 83 olen = BN_num_bytes(key->n); 84 outbuf = xmalloc(olen); 97 memset(outbuf, 0, olen); 107 int len, ilen, olen; local 109 olen = BN_num_bytes(key->n); 110 outbuf = xmalloc(olen); 123 memset(outbuf, 0, olen);
|
ssh-pkcs11-helper.c | 272 ssize_t len, olen, set_size; local 317 olen = buffer_len(&oqueue); 318 if (olen > 0) 343 len = write(out, buffer_ptr(&oqueue), olen);
|
/external/wpa_supplicant_8/src/utils/ |
base64.c | 34 size_t olen; local 37 olen = len * 4 / 3 + 4; /* 3-byte blocks to 4-byte */ 38 olen += olen / 72; /* line feeds */ 39 olen++; /* nul termination */ 40 if (olen < len) 42 out = os_malloc(olen); 101 size_t i, count, olen; local 118 olen = count / 4 * 3; 119 pos = out = os_malloc(olen); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
base64.c | 40 size_t olen; local 43 olen = len * 4 / 3 + 4; /* 3-byte blocks to 4-byte */ 44 olen += olen / 72; /* line feeds */ 45 olen++; /* nul termination */ 46 if (olen < len) 48 out = os_malloc(olen); 107 size_t i, count, olen; local 123 olen = count / 4 * 3; 124 pos = out = os_malloc(olen); [all...] |
/external/openssl/crypto/asn1/ |
n_pkey.c | 126 int rsalen, pkeylen, olen; local 164 olen = i2d_NETSCAPE_ENCRYPTED_PKEY(enckey, NULL); 167 return olen;
|
/external/openssl/ssl/ |
s2_pkt.c | 518 unsigned int j,k,olen,p,bs; local 522 olen=len; 648 s->s2->wpend_tot=olen; 654 return(write_pending(s,buf,olen));
|
/external/ppp/pppd/ |
cbcp.c | 233 int code, opt, id, len, olen, delay; local 259 GETCHAR(olen, p); 261 if (olen < 2 || olen > len) { 266 len -= olen; 273 if (olen > 2) { 278 if (olen > 3) { 283 memcpy(str, p, olen - 4); 284 str[olen - 4] = 0;
|
ipv6cp.c | 1440 int code, id, len, olen; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_nss.c | 53 int olen; local 96 if (PK11_CipherOp(ctx, cypher, &olen, 8, (void *) clear, 8) !=
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.c | 263 size_t olen; local 279 olen = out_end - out_pos; 281 out_pos, &olen, &alert); 288 out_pos += olen;
|
tlsv1_server.c | 237 size_t olen; local 253 olen = out_end - out_pos; 255 out_pos, &olen, &alert); 262 out_pos += olen;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 313 size_t olen; local 341 olen = wpabuf_tailroom(buf); 343 out_pos, &olen, &alert); 368 if (olen < 2) { 394 wpabuf_put(buf, olen);
|
tlsv1_server.c | 240 size_t olen; local 249 olen = out_end - out_pos; 251 out_pos, &olen, &alert); 267 if (olen < 2) { 295 out_pos += olen;
|
/ndk/sources/host-tools/make-3.81/ |
expand.c | 527 unsigned int olen = variable_buffer_length; 536 variable_buffer_length = olen; 550 unsigned int olen = variable_buffer_length; 562 variable_buffer_length = olen; 521 unsigned int olen = variable_buffer_length; local 544 unsigned int olen = variable_buffer_length; local
|
/external/bluetooth/bluez/attrib/ |
gatttool.c | 78 uint16_t handle, i, olen = 0; local 102 olen = enc_confirmation(opdu, sizeof(opdu)); 104 if (olen > 0) 105 g_attrib_send(attrib, 0, opdu[0], opdu, olen, NULL, NULL, NULL);
|
interactive.c | 104 uint16_t handle, i, olen; local 130 olen = enc_confirmation(opdu, sizeof(opdu)); 132 if (olen > 0) 133 g_attrib_send(attrib, 0, opdu[0], opdu, olen, NULL, NULL, NULL);
|
client.c | 277 uint16_t olen; local 306 olen = enc_confirmation(opdu, sizeof(opdu)); 307 g_attrib_send(gatt->attrib, 0, opdu[0], opdu, olen,
|
/external/bluetooth/bluez/compat/ |
pand.c | 193 socklen_t olen = sizeof(err); local 195 getsockopt(sk, SOL_SOCKET, SO_ERROR, &err, &olen); 218 socklen_t olen; local 245 olen = sizeof(l2o); 246 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, &olen) < 0) { 337 socklen_t olen; local 352 olen = sizeof(l2o); 353 getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, &olen);
|
/external/iproute2/misc/ |
ifstat.c | 540 socklen_t olen = sizeof(cred); local 542 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || 543 olen < sizeof(cred))
|
nstat.c | 425 socklen_t olen = sizeof(cred); local 427 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || 428 olen < sizeof(cred))
|
rtacct.c | 416 socklen_t olen = sizeof(cred); local 418 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || 419 olen < sizeof(cred))
|
/external/tcpdump/ |
print-pim.c | 649 u_int16_t otype, olen; local 654 olen = EXTRACT_16BITS(&bp[2]); 655 TCHECK2(bp[0], 4 + olen); 660 olen); 669 if (olen != 4) { 670 (void)printf("ERROR: Option Lenght != 4 Bytes (%u)", olen); 685 switch (olen) { 693 printf("ERROR: Option Lenght != 4 Bytes (%u)", olen); 720 while (ptr < (bp+olen)) { 735 print_unknown_data(bp,"\n\t ",olen); [all...] |
print-fr.c | 721 int olen; local 753 olen = length; /* preserve the original length for non verbose mode */ 770 printf(", length %u",olen); 801 printf(", length %u",olen);
|
/external/bluetooth/bluez/btio/ |
btio.c | 791 socklen_t olen; local 794 olen = len; 795 if (getsockname(sock, src, &olen) < 0) { 801 olen = len; 802 if (getpeername(sock, dst, &olen) < 0) {
|
/external/bluetooth/bluez/lib/ |
hci.c | 1088 socklen_t olen; local 1092 olen = sizeof(of); 1093 if (getsockopt(dd, SOL_HCI, HCI_FILTER, &of, &olen) < 0) [all...] |