/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_hostap.c | 62 size_t blen = PRISM2_HOSTAPD_GENERIC_ELEMENT_HDR_LEN + wpa_ie_len; local 63 if (blen < sizeof(*param)) 64 blen = sizeof(*param); 66 param = os_zalloc(blen); 73 res = hostapd_ioctl(drv, param, blen, 1); 158 size_t blen; local 186 blen = sizeof(*param) + key_len; 187 buf = os_zalloc(blen); 216 if (hostapd_ioctl(drv, param, blen, 1)) {
|
driver_ndis.c | 767 size_t blen, count, i; local 773 blen = 65535; 774 b = os_zalloc(blen); 777 len = ndis_get_oid(drv, OID_802_11_BSSID_LIST, (char *) b, blen); 807 if (((char *) bss->IEs) + bss->IELength > (char *) b + blen) { 841 if (pos > (char *) b + blen) 1258 size_t blen, i; local 1937 size_t blen = sizeof(*b) + 1024; local 2867 size_t blen = sizeof(*b) + 1024; local [all...] |
/external/iproute2/include/ |
utils.h | 92 extern char* hexstring_n2a(const __u8 *str, int len, char *buf, int blen); 93 extern __u8* hexstring_a2n(const char *str, __u8 *buf, int blen);
|
/external/icu4c/tools/makeconv/ |
gencnvex.c | 368 if(m->bLen>extData->maxInBytes) { 369 extData->maxInBytes=m->bLen; 375 ratio=(u16Length+(m->bLen-1))/m->bLen; 512 if(m->bLen==unitIndex+1) { 516 if(subStart<subLimit && mappings[map[subStart]].bLen==unitIndex+1) { 608 if(flag==0 || flag==1 || (flag==2 && m->bLen==1)) { 654 switch(m->bLen) { 664 /* the parser enforces m->bLen<=UCNV_EXT_MAX_BYTES */ 667 resultBytes=utm_allocN(extData->fromUBytes, m->bLen); [all...] |
/external/openssl/crypto/bio/ |
bss_mem.c | 172 int blen; local 188 blen=bm->length; 189 if (BUF_MEM_grow_clean(bm,blen+inl) != (blen+inl)) 191 memcpy(&(bm->data[blen]),in,inl);
|
/external/openssh/ |
auth2-pubkey.c | 74 u_int alen, blen, slen; local 86 pkblob = packet_get_string(&blen); 88 buffer_append(&b, pkblob, blen); 94 pkblob = packet_get_string(&blen); 103 key = key_from_blob(pkblob, blen); 136 buffer_put_string(&b, pkblob, blen); 163 packet_put_string(pkblob, blen);
|
monitor_wrap.c | 469 mm_newkeys_from_blob(u_char *blob, int blen) 478 debug3("%s: %p(%d)", __func__, blob, blen); 480 dump_base64(stderr, blob, blen); 483 buffer_append(&b, blob, blen); 1088 u_int blen; local 1107 blob = buffer_get_string(&m, &blen); 1108 if ((key = key_from_blob(blob, blen)) == NULL) 1124 u_int blen; local 1132 if (key_to_blob(key, &blob, &blen) == 0) 1137 buffer_put_string(&m, blob, blen); 1154 u_int blen; local [all...] |
ssh-keysign.c | 68 u_int blen, len; local 103 pkblob = buffer_get_string(&b, &blen); 108 else if ((key = key_from_blob(pkblob, blen)) == NULL)
|
authfd.c | 319 u_int blen; local 343 blob = buffer_get_string(&auth->identities, &blen); 345 key = key_from_blob(blob, blen); 424 u_int blen; local 428 if (key_to_blob(key, &blob, &blen) == 0) 436 buffer_put_string(&msg, blob, blen); 600 u_int blen; local 612 key_to_blob(key, &blob, &blen); 614 buffer_put_string(&msg, blob, blen);
|
ssh-agent.c | 230 u_int blen; local 231 key_to_blob(id->key, &blob, &blen); 232 buffer_put_string(&msg, blob, blen); 316 u_int blen, dlen, slen = 0; local 325 blob = buffer_get_string(&e->request, &blen); 333 key = key_from_blob(blob, blen); 362 u_int blen, bits; local 379 blob = buffer_get_string(&e->request, &blen); 380 key = key_from_blob(blob, blen); [all...] |
sshconnect2.c | 558 u_int alen, blen; local 567 pkblob = packet_get_string(&blen); 569 buffer_append(&b, pkblob, blen); 574 pkblob = packet_get_string(&blen); 578 debug("Server accepts key: pkalg %s blen %u", pkalg, blen); 584 if ((key = key_from_blob(pkblob, blen)) == NULL) { 1659 u_int blen, slen; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_hostap.c | 403 size_t blen; local 406 blen = sizeof(*param) + key_len; 407 buf = os_zalloc(blen); 443 if (hostapd_ioctl(drv, param, blen)) { 459 size_t blen; local 462 blen = sizeof(*param) + 32; 463 buf = os_zalloc(blen); 475 if (hostapd_ioctl(drv, param, blen)) { 706 size_t blen, elem_len; local 709 blen = PRISM2_HOSTAPD_GENERIC_ELEMENT_HDR_LEN + elem_len [all...] |
driver_ndis.c | 838 size_t blen, count, i; local 844 blen = 65535; 845 b = os_zalloc(blen); 848 len = ndis_get_oid(drv, OID_802_11_BSSID_LIST, (char *) b, blen); 878 if (((char *) bss->IEs) + bss->IELength > (char *) b + blen) { 912 if (pos > (char *) b + blen) 1359 size_t blen, i; local 2038 size_t blen = sizeof(*b) + 1024; local 2983 size_t blen = sizeof(*b) + 1024; local [all...] |
/external/openssl/crypto/asn1/ |
asn_mime.c | 103 static int mime_bound_check(char *line, int linelen, char *bound, int blen); 611 int len, blen; local 617 blen = strlen(bound); 624 state = mime_bound_check(linebuf, len, bound, blen); 921 static int mime_bound_check(char *line, int linelen, char *bound, int blen) 924 if(blen == -1) blen = strlen(bound); 926 if(blen + 2 > linelen) return 0; 928 if(!strncmp(line, "--", 2) && !strncmp(line + 2, bound, blen)) { 929 if(!strncmp(line + blen + 2, "--", 2)) return 2 [all...] |
/bionic/libc/stdio/ |
fvwrite.c | 111 size_t blen = fp->_p - fp->_bf._base; local 119 } while (_size < (int)(blen + len)); 126 fp->_p = _base + blen;
|
/external/openssl/crypto/dh/ |
dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 178 blen=DH_size(b); 179 bbuf=(unsigned char *)OPENSSL_malloc(blen);
|
/frameworks/compile/slang/ |
slang_rs_reflect_utils.cpp | 130 const char *buff, int blen, int seg_num, FILE *pfout) { 141 while (write_length < blen) { 146 || (write_length == blen)) {
|
/external/iproute2/lib/ |
utils.c | 631 char *hexstring_n2a(const __u8 *str, int len, char *buf, int blen) 637 if (blen < 3) 641 blen -= 2; 642 if (i != len-1 && blen > 1) { 644 blen--; 650 __u8* hexstring_a2n(const char *str, __u8 *buf, int blen) 675 if (cnt < blen) { 683 if (cnt < blen) 684 memset(buf+cnt, 0, blen-cnt);
|
/external/openssl/crypto/ecdh/ |
ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; local 226 blen=KDF1_SHA1_len; 227 bbuf=(unsigned char *)OPENSSL_malloc(blen); 228 bout=ECDH_compute_key(bbuf,blen,EC_KEY_get0_public_key(a),b,KDF1_SHA1);
|
/frameworks/base/core/jni/ |
android_util_XmlBlock.cpp | 43 jsize bLen = env->GetArrayLength(bArray); 44 if (off < 0 || off >= bLen || len < 0 || len > bLen || (off+len) > bLen) {
|
/external/grub/netboot/ |
sk_g16.h | 146 volatile short blen; /* Buffer Length (two's complement) */ member in struct:rmd 164 unsigned short blen; /* Buffer Length (two's complement) */ member in struct:tmd
|
/external/zlib/contrib/iostream/ |
zfstream.cpp | 192 int bl = blen(); 242 required = blen();
|
/external/svox/pico/lib/ |
picodata.h | 294 blenmax is the max length (in number of bytes) of buf; blen is 303 picoos_uint16 *blen); 306 blenmax is the max length (in number of bytes) of buf; blen is 315 picoos_uint16 *blen); 326 picoos_uint16 *blen); 366 content; blenmax is the max length (bytes) accessible in buf; blen 374 picoos_uint8 *buf, const picoos_uint16 blenmax, picoos_uint16 *blen);
|
picoacph.c | 973 picoos_uint16 blen = 0; local 1053 picoos_uint16 blen = 0; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
mlme.c | 333 size_t blen, buflen; local 352 blen = 0; 369 blen += 24; 376 blen += 10; 385 blen += 4; 393 ies = pos = buf + blen; 394 blen += 2 + wpa_s->mlme.ssid_len; 402 pos = buf + blen; 403 blen += len + 2; 412 pos = buf + blen; [all...] |