/external/bluetooth/bluez/compat/ |
H A D | pand.c | 103 int sk; member in struct:script_arg 126 static void run_script(char *script, char *dev, char *dst, int sk, int nsk) argument 140 if (sk >= 0) 141 close(sk); 162 static int w4_hup(int sk, struct script_arg *down_cmd) argument 176 pf.fd = sk; 195 getsockopt(sk, SOL_SOCKET, SO_ERROR, &err, &olen); 203 down_cmd->sk, down_cmd->nsk); 205 close(sk); 219 int sk, l local 338 int sk, r = 0; local [all...] |
H A D | bnep.c | 183 static int bnep_connadd(int sk, uint16_t role, char *dev) argument 189 req.sock = sk; 217 int bnep_accept_connection(int sk, uint16_t role, char *dev) argument 224 r = recv(sk, pkt, BNEP_MTU, 0); 245 send(sk, pkt, sizeof(pkt), 0); 259 if (send(sk, rsp, sizeof(*rsp), 0) < 0) 262 return bnep_connadd(sk, role, dev); 266 * sk - Connect L2CAP socket 271 int bnep_create_connection(int sk, uint16_t role, uint16_t svc, char *dev) argument 293 setsockopt(sk, SOL_SOCKE [all...] |
H A D | dun.c | 60 int sk, i; local 62 sk = socket(AF_BLUETOOTH, SOCK_RAW, BTPROTO_RFCOMM); 63 if (sk < 0 ) { 71 close(sk); 78 if (ioctl(sk, RFCOMMGETDEVLIST, (void *) dl) < 0) { 88 close(sk); 186 static int dun_create_tty(int sk, char *tty, int size) argument 199 if (getpeername(sk, (struct sockaddr *) &sa, &alen) < 0) 204 if (getsockname(sk, (struct sockaddr *) &sa, &alen) < 0) 209 id = ioctl(sk, RFCOMMCREATEDE 307 dun_open_connection(int sk, char *pppd, char **args, int wait) argument [all...] |
H A D | fakehid.c | 148 int sk; local 150 sk = socket(PF_BLUETOOTH, SOCK_STREAM, BTPROTO_RFCOMM); 151 if (sk < 0) { 161 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 164 close(sk); 173 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 176 close(sk); 180 return sk; 292 int i, fd, sk, len; local 294 sk 393 int i, fd, sk, len; local 605 int i, fd, sk, len; local [all...] |
H A D | dund.c | 104 int sk, lm; local 127 sk = socket(AF_BLUETOOTH, SOCK_STREAM, BTPROTO_RFCOMM); 128 if (sk < 0) { 138 if (bind(sk, (struct sockaddr *) &sa, sizeof(sa))) { 154 if (lm && setsockopt(sk, SOL_RFCOMM, RFCOMM_LM, &lm, sizeof(lm)) < 0) { 159 listen(sk, 10); 167 nsk = accept(sk, (struct sockaddr *) &sa, &alen); 181 close(sk); 187 close(sk); 222 int sk, er local [all...] |
/external/bluetooth/bluez/test/ |
H A D | attest.c | 104 int sk; local 106 sk = socket(PF_BLUETOOTH, SOCK_STREAM, BTPROTO_RFCOMM); 107 if (sk < 0) { 117 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 120 close(sk); 129 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 132 close(sk); 136 return sk;
|
/external/openssl/crypto/conf/ |
H A D | conf_api.c | 251 STACK_OF(CONF_VALUE) *sk; 256 sk=(STACK_OF(CONF_VALUE) *)a->value; 257 for (i=sk_CONF_VALUE_num(sk)-1; i>=0; i--) 259 vv=sk_CONF_VALUE_value(sk,i); 264 if (sk != NULL) sk_CONF_VALUE_free(sk); 272 STACK_OF(CONF_VALUE) *sk=NULL; 276 if ((sk=sk_CONF_VALUE_new_null()) == NULL) 286 v->value=(char *)sk; 294 if (sk ! [all...] |
/external/bluetooth/bluez/plugins/ |
H A D | mgmtops.c | 79 static void read_version_complete(int sk, void *buf, size_t len) argument 97 if (write(sk, &hdr, sizeof(hdr)) < 0) 117 static void read_info(int sk, uint16_t index) argument 125 if (write(sk, &hdr, sizeof(hdr)) < 0) 130 static void get_connections(int sk, uint16_t index) argument 138 if (write(sk, &hdr, sizeof(hdr)) < 0) 143 static void mgmt_index_added(int sk, uint16_t index) argument 146 read_info(sk, index); 164 static void mgmt_index_removed(int sk, uint16_t index) argument 262 static void mgmt_powered(int sk, uint16_ argument 276 mgmt_discoverable(int sk, uint16_t index, void *buf, size_t len) argument 314 mgmt_connectable(int sk, uint16_t index, void *buf, size_t len) argument 352 mgmt_pairable(int sk, uint16_t index, void *buf, size_t len) argument 381 mgmt_new_key(int sk, uint16_t index, void *buf, size_t len) argument 416 mgmt_device_connected(int sk, uint16_t index, void *buf, size_t len) argument 441 mgmt_device_disconnected(int sk, uint16_t index, void *buf, size_t len) argument 467 mgmt_connect_failed(int sk, uint16_t index, void *buf, size_t len) argument 543 mgmt_pin_code_request(int sk, uint16_t index, void *buf, size_t len) argument 622 mgmt_user_confirm_request(int sk, uint16_t index, void *buf, size_t len) argument 741 read_index_list_complete(int sk, void *buf, size_t len) argument 776 read_info_complete(int sk, uint16_t index, void *buf, size_t len) argument 843 set_powered_complete(int sk, uint16_t index, void *buf, size_t len) argument 857 set_discoverable_complete(int sk, uint16_t index, void *buf, size_t len) argument 894 set_connectable_complete(int sk, uint16_t index, void *buf, size_t len) argument 922 set_pairable_complete(int sk, uint16_t index, void *buf, size_t len) argument 952 disconnect_complete(int sk, uint16_t index, void *buf, size_t len) argument 980 pair_device_complete(int sk, uint16_t index, void *buf, size_t len) argument 1005 get_connections_complete(int sk, uint16_t index, void *buf, size_t len) argument 1038 set_local_name_complete(int sk, uint16_t index, void *buf, size_t len) argument 1068 read_local_oob_data_complete(int sk, uint16_t index, void *buf, size_t len) argument 1093 read_local_oob_data_failed(int sk, uint16_t index) argument 1111 mgmt_cmd_complete(int sk, uint16_t index, void *buf, size_t len) argument 1210 mgmt_cmd_status(int sk, uint16_t index, void *buf, size_t len) argument 1231 mgmt_controller_error(int sk, uint16_t index, void *buf, size_t len) argument 1243 mgmt_auth_failed(int sk, uint16_t index, void *buf, size_t len) argument 1265 mgmt_local_name_changed(int sk, uint16_t index, void *buf, size_t len) argument 1290 mgmt_device_found(int sk, uint16_t index, void *buf, size_t len) argument 1325 mgmt_remote_name(int sk, uint16_t index, void *buf, size_t len) argument 1349 mgmt_discovering(int sk, uint16_t index, void *buf, size_t len) argument 1386 int sk; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 121 u8 *sk, size_t sk_len, 185 os_memcpy(sk, pos, sk_len); 199 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 227 msk, emsk, sk, *sk_len, 236 u8 *sk, size_t *sk_len) 261 msk, emsk, sk, *sk_len, 281 * @sk: Buffer for SK (at least EAP_GPSK_MAX_SK_LEN bytes) 292 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 330 msk, emsk, sk, sk_len, 336 msk, emsk, sk, sk_le 116 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 197 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 233 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 287 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 376 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 400 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument [all...] |
H A D | eap_gpsk_common.h | 60 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 63 int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor,
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 112 u8 *sk, size_t sk_len, 176 os_memcpy(sk, pos, sk_len); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 227 u8 *sk, size_t *sk_len) 252 msk, emsk, sk, *sk_len, 272 * @sk: Buffer for SK (at least EAP_GPSK_MAX_SK_LEN bytes) 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 321 msk, emsk, sk, sk_len, 327 msk, emsk, sk, sk_le 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 367 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 391 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument [all...] |
H A D | eap_gpsk_common.h | 54 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 57 int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 112 u8 *sk, size_t sk_len, 176 os_memcpy(sk, pos, sk_len); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 227 u8 *sk, size_t *sk_len) 252 msk, emsk, sk, *sk_len, 272 * @sk: Buffer for SK (at least EAP_GPSK_MAX_SK_LEN bytes) 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 321 msk, emsk, sk, sk_len, 327 msk, emsk, sk, sk_le 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 367 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 391 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 112 u8 *sk, size_t sk_len, 176 os_memcpy(sk, pos, sk_len); 190 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 218 msk, emsk, sk, *sk_len, 227 u8 *sk, size_t *sk_len) 252 msk, emsk, sk, *sk_len, 272 * @sk: Buffer for SK (at least EAP_GPSK_MAX_SK_LEN bytes) 283 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, 321 msk, emsk, sk, sk_len, 327 msk, emsk, sk, sk_le 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 224 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 367 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 391 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument [all...] |
/external/bluetooth/bluez/tools/ |
H A D | rfcomm.c | 327 int sk, fd, try = 30; local 357 sk = socket(AF_BLUETOOTH, SOCK_STREAM, BTPROTO_RFCOMM); 358 if (sk < 0) { 366 if (setsockopt(sk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) { 372 if (bind(sk, (struct sockaddr *) &laddr, sizeof(laddr)) < 0) { 374 close(sk); 378 if (connect(sk, (struct sockaddr *) &raddr, sizeof(raddr)) < 0) { 380 close(sk); 385 if (getsockname(sk, (struct sockaddr *)&laddr, &alen) < 0) { 387 close(sk); 491 int sk, nsk, fd, lm, try = 30; local [all...] |
H A D | l2ping.c | 80 int i, sk, lost; local 95 sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP); 96 if (sk < 0) { 106 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 116 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 125 if (getsockname(sk, (struct sockaddr *) &addr, &optlen) < 0) { 156 if (send(sk, send_buf, L2CAP_CMD_HDR_SIZE + size, 0) <= 0) { 167 pf[0].fd = sk; 180 if ((err = recv(sk, recv_buf, L2CAP_CMD_HDR_SIZE + size, 0)) < 0) { 248 close(sk); [all...] |
H A D | ciptool.c | 138 int sk; local 145 if ((sk = socket(AF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP)) < 0) { 154 if (bind(sk, (struct sockaddr *)&addr, sizeof(addr)) < 0) { 156 close(sk); 163 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &size) < 0) { 165 close(sk); 173 if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)) < 0) { 175 close(sk); 184 if (connect(sk, (struct sockaddr *)&addr, sizeof(addr)) < 0) { 186 close(sk); 342 int dev_id, sk; local [all...] |
H A D | avinfo.c | 448 static ssize_t avdtp_send(int sk, void *data, int len) argument 452 ret = send(sk, data, len, 0); 468 static ssize_t avdtp_receive(int sk, void *data, int len) argument 472 ret = recv(sk, data, len, 0); 483 static ssize_t avdtp_get_caps(int sk, int seid) argument 494 ret = avdtp_send(sk, &req, sizeof(req)); 499 ret = avdtp_receive(sk, caps, sizeof(buffer)); 514 static ssize_t avdtp_discover(int sk) argument 525 ret = avdtp_send(sk, &req, sizeof(req)); 530 ret = avdtp_receive(sk, discove 576 int sk; local 626 int opt, sk, dev_id; local [all...] |
/external/openssl/crypto/engine/ |
H A D | eng_table.c | 66 STACK_OF(ENGINE) *sk; 69 /* Zero if 'sk' is newer than the cached 'funct', non-zero otherwise */ 153 fnd->sk = sk_ENGINE_new_null(); 154 if(!fnd->sk) 163 (void)sk_ENGINE_delete_ptr(fnd->sk, e); 165 if(!sk_ENGINE_push(fnd->sk, e)) 192 /* Iterate the 'c->sk' stack removing any occurance of 'e' */ 193 while((n = sk_ENGINE_find(pile->sk, e)) >= 0) 195 (void)sk_ENGINE_delete(pile->sk, n); 218 sk_ENGINE_free(p->sk); [all...] |
/external/openssl/crypto/x509/ |
H A D | x509_att.c | 83 int X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, ASN1_OBJECT *obj, 89 if (sk == NULL) return(-1); 93 n=sk_X509_ATTRIBUTE_num(sk); 96 ex=sk_X509_ATTRIBUTE_value(sk,lastpos); 125 STACK_OF(X509_ATTRIBUTE) *sk=NULL; 135 if ((sk=sk_X509_ATTRIBUTE_new_null()) == NULL) 139 sk= *x; 143 if (!sk_X509_ATTRIBUTE_push(sk,new_attr)) 146 *x=sk; 147 return(sk); [all...] |
H A D | x509_lu.c | 235 STACK_OF(X509_LOOKUP) *sk; 241 sk=vfy->get_cert_methods; 242 for (i=0; i<sk_X509_LOOKUP_num(sk); i++) 244 lu=sk_X509_LOOKUP_value(sk,i); 248 sk_X509_LOOKUP_free(sk); 260 STACK_OF(X509_LOOKUP) *sk; 263 sk=v->get_cert_methods; 264 for (i=0; i<sk_X509_LOOKUP_num(sk); i++) 266 lu=sk_X509_LOOKUP_value(sk,i); 491 STACK_OF(X509) *sk; [all...] |
/external/kernel-headers/original/linux/ |
H A D | netlink.h | 179 extern void netlink_kernel_release(struct sock *sk); 180 extern int __netlink_change_ngroups(struct sock *sk, unsigned int groups); 181 extern int netlink_change_ngroups(struct sock *sk, unsigned int groups); 182 extern void __netlink_clear_multicast_users(struct sock *sk, unsigned int group); 183 extern void netlink_clear_multicast_users(struct sock *sk, unsigned int group); 185 extern int netlink_has_listeners(struct sock *sk, unsigned int group); 199 int netlink_attachskb(struct sock *sk, struct sk_buff *skb, 201 void netlink_detachskb(struct sock *sk, struct sk_buff *skb); 202 int netlink_sendskb(struct sock *sk, struct sk_buff *skb);
|
/external/bluetooth/bluez/serial/ |
H A D | proxy.c | 273 int err, sk; local 291 sk = socket(AF_UNIX, SOCK_STREAM, 0); 292 if (sk < 0) { 299 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 303 close(sk); 308 return sk; 314 int err, sk, port; local 331 sk = socket(PF_INET, SOCK_STREAM, 0); 332 if (sk < 0) { 338 if (connect(sk, (struc 351 int err, sk; local 375 int sk; local 760 int sk; local 809 int sk, ret; local [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 67 static int add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype, 69 static ASN1_TYPE *get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid); 746 STACK_OF(X509_ATTRIBUTE) *sk; 835 sk=si->auth_attr; 839 if (sk_X509_ATTRIBUTE_num(sk) > 0) 1021 STACK_OF(X509_ATTRIBUTE) *sk; 1068 sk=si->auth_attr; 1069 if ((sk != NULL) && (sk_X509_ATTRIBUTE_num(sk) != 0)) 1078 message_digest=PKCS7_digest_from_attributes(sk); 1202 PKCS7_set_signed_attributes(PKCS7_SIGNER_INFO *p7si, STACK_OF(X509_ATTRIBUTE) *sk) argument 1222 PKCS7_set_attributes(PKCS7_SIGNER_INFO *p7si, STACK_OF(X509_ATTRIBUTE) *sk) argument [all...] |
/external/bluetooth/bluez/src/ |
H A D | sdpd-server.c | 169 int sk, len, size; local 174 sk = g_io_channel_unix_get_fd(chan); 177 sdp_svcdb_collect_all(sk); 181 len = recv(sk, &hdr, sizeof(sdp_pdu_hdr_t), MSG_PEEK); 183 sdp_svcdb_collect_all(sk); 192 len = recv(sk, buf, size, 0); 194 sdp_svcdb_collect_all(sk); 199 handle_request(sk, buf, len);
|