/system/core/libcutils/ |
socket_local.h | 37 struct sockaddr_un *p_addr, socklen_t *alen);
|
socket_local_server.c | 56 socklen_t alen; local 60 err = socket_make_sockaddr_un(name, namespaceId, &addr, &alen); 80 if(bind(s, (struct sockaddr *) &addr, alen) < 0) {
|
socket_local_client.c | 46 struct sockaddr_un *p_addr, socklen_t *alen) 111 *alen = namelen + offsetof(struct sockaddr_un, sun_path) + 1; 128 socklen_t alen; local 132 err = socket_make_sockaddr_un(name, namespaceId, &addr, &alen); 138 if(connect(fd, (struct sockaddr *) &addr, alen) < 0) {
|
socket_inaddr_any_server.c | 39 size_t alen; local
|
socket_loopback_client.c | 40 socklen_t alen; local
|
socket_loopback_server.c | 39 size_t alen; local
|
socket_network_client.c | 43 socklen_t alen; local
|
/external/iproute2/lib/ |
ll_map.c | 32 int alen; member in struct:idxmap 78 int alen; local 79 im->alen = alen = RTA_PAYLOAD(tb[IFLA_ADDRESS]); 80 if (alen > sizeof(im->addr)) 81 alen = sizeof(im->addr); 82 memcpy(im->addr, RTA_DATA(tb[IFLA_ADDRESS]), alen); 84 im->alen = 0; 138 unsigned alen) 147 if (alen > sizeof(im->addr) [all...] |
ll_addr.c | 32 const char *ll_addr_n2a(unsigned char *addr, int alen, int type, char *buf, int blen) 37 if (alen == 4 && 41 if (alen == 16 && type == ARPHRD_TUNNEL6) { 45 for (i=0; i<alen; i++) {
|
/external/iproute2/include/ |
ll_map.h | 13 unsigned alen);
|
rt_names.h | 23 const char *ll_addr_n2a(unsigned char *addr, int alen, int type, char *buf, int blen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 506 size_t alen, plen, i, list_len; local 533 alen = pos[1] * 4 - 2; 535 apos, alen); 541 alen -= 2; 542 if ((!aka && (alen % GSM_RAND_LEN)) || 543 (aka && alen != EAP_AKA_RAND_LEN)) { 546 (unsigned long) alen); 550 attr->num_chal = alen / GSM_RAND_LEN; 560 alen -= 2; 561 if (alen != EAP_AKA_AUTN_LEN) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 501 size_t alen, plen, i, list_len; local 528 alen = pos[1] * 4 - 2; 530 apos, alen); 536 alen -= 2; 537 if ((!aka && (alen % GSM_RAND_LEN)) || 538 (aka && alen != EAP_AKA_RAND_LEN)) { 541 (unsigned long) alen); 545 attr->num_chal = alen / GSM_RAND_LEN; 555 alen -= 2; 556 if (alen != EAP_AKA_AUTN_LEN) [all...] |
/external/openssl/crypto/modes/ |
ccm128.c | 105 const unsigned char *aad,size_t alen) 109 if (alen==0) return; 115 if (alen<(0x10000-0x100)) { 116 ctx->cmac.c[0] ^= (u8)(alen>>8); 117 ctx->cmac.c[1] ^= (u8)alen; 120 else if (sizeof(alen)==8 && alen>=(size_t)1<<(32%(sizeof(alen)*8))) { 123 ctx->cmac.c[2] ^= (u8)(alen>>(56%(sizeof(alen)*8))) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 255 u16 alen; local 274 alen = WPA_GET_BE16(pos); 276 if (end - pos < alen) { 283 data->id_peer = os_malloc(alen); 286 "%d-octet ID_Peer", alen); 289 os_memcpy(data->id_peer, pos, alen); 290 data->id_peer_len = alen; 293 pos += alen; 301 alen = WPA_GET_BE16(pos); 303 if (end - pos < alen) { 473 u16 alen; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 250 u16 alen; local 269 alen = WPA_GET_BE16(pos); 271 if (end - pos < alen) { 278 data->id_peer = os_malloc(alen); 281 "%d-octet ID_Peer", alen); 284 os_memcpy(data->id_peer, pos, alen); 285 data->id_peer_len = alen; 288 pos += alen; 296 alen = WPA_GET_BE16(pos); 298 if (end - pos < alen) { 468 u16 alen; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 136 u16 alen; local 142 alen = WPA_GET_BE16(pos); 144 if (end - pos < alen) { 149 data->id_server = os_malloc(alen); 154 os_memcpy(data->id_server, pos, alen); 155 data->id_server_len = alen; 158 pos += alen; 489 u16 alen; local 499 alen = WPA_GET_BE16(pos); 501 if (end - pos < alen) { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 131 u16 alen; local 137 alen = WPA_GET_BE16(pos); 139 if (end - pos < alen) { 144 data->id_server = os_malloc(alen); 149 os_memcpy(data->id_server, pos, alen); 150 data->id_server_len = alen; 153 pos += alen; 484 u16 alen; local 494 alen = WPA_GET_BE16(pos); 496 if (end - pos < alen) { [all...] |
/bionic/libc/bionic/ |
system_properties.c | 162 socklen_t alen; local 177 alen = namelen + offsetof(struct sockaddr_un, sun_path) + 1; 179 if(TEMP_FAILURE_RETRY(connect(s, (struct sockaddr *) &addr, alen)) < 0) {
|
/bionic/linker/ |
debugger.c | 72 socklen_t alen; local 94 alen = namelen + offsetof(struct sockaddr_un, sun_path) + 1; 99 RETRY_ON_EINTR(err,connect(s, (struct sockaddr *) &addr, alen));
|
/external/openssh/ |
auth2-hostbased.c | 63 u_int alen, blen, slen; local 71 pkalg = packet_get_string(&alen); 112 buffer_put_string(&b, pkalg, alen);
|
/external/openssl/crypto/dh/ |
dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 166 alen=DH_size(a); 167 abuf=(unsigned char *)OPENSSL_malloc(alen);
|
/system/core/adb/ |
adb_auth_client.c | 210 socklen_t alen; local 213 alen = sizeof(addr); 215 s = adb_socket_accept(fd, &addr, &alen);
|
/ndk/sources/host-tools/sed-4.2.1/sed/ |
utils.c | 557 size_t alen = b->allocated; 559 if (newlen <= alen) 561 alen *= 2; 562 if (newlen < alen) 563 try = realloc(b->b, alen); /* Note: *not* the REALLOC() macro! */ 566 alen = newlen; 567 try = REALLOC(b->b, alen, char); 569 b->allocated = alen; 553 size_t alen = b->allocated; local
|
/external/libppp/src/ |
chap.c | 700 u_char alen; local 746 bp = mbuf_Read(bp, &alen, 1); 747 len -= alen + 1; 753 *chap->challenge.peer = alen; 754 bp = mbuf_Read(bp, chap->challenge.peer + 1, alen); 768 bp = mbuf_Read(bp, &alen, 1); 769 len -= alen + 1; 775 if ((ans = malloc(alen + 1)) == NULL) { 781 bp = mbuf_Read(bp, ans + 1, alen); 785 alen == 49 && ans[alen] == 0 [all...] |