/external/iproute2/ip/ |
H A D | ipprefix.c | 76 char abuf[256]; local 80 memset(abuf, '\0', sizeof(abuf)); 82 abuf, sizeof(abuf)));
|
H A D | iprule.c | 54 char abuf[256]; local 91 abuf, sizeof(abuf)), 98 abuf, sizeof(abuf)) 112 abuf, sizeof(abuf)), 119 abuf, sizeof(abuf))); 177 abuf, sizeo [all...] |
H A D | ipxfrm.c | 287 char abuf[256]; local 292 memset(abuf, '\0', sizeof(abuf)); 294 saddr, abuf, sizeof(abuf))); 295 memset(abuf, '\0', sizeof(abuf)); 297 &id->daddr, abuf, sizeof(abuf))); 447 char abuf[25 local 735 char abuf[256]; local 777 char abuf[256]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_das.c | 37 const char *abuf, 66 abuf, from_port); 81 "'%s' from %s:%d", tmp, abuf, from_port); 110 abuf, from_port); 115 "%s:%d", abuf, from_port); 152 char abuf[50]; local 171 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf)); 175 len, abuf, from_port); 184 "from %s:%d failed", abuf, from_por 35 radius_das_disconnect(struct radius_das_data *das, struct radius_msg *msg, const char *abuf, int from_port) argument [all...] |
H A D | radius_client.c | 381 char abuf[50]; local 439 hostapd_ip_txt(&old->addr, abuf, sizeof(abuf)), 463 hostapd_ip_txt(&old->addr, abuf, sizeof(abuf)), 945 char abuf[50]; local 954 hostapd_ip_txt(&nserv->addr, abuf, sizeof(abuf)), 1069 abuf, sizeof(abuf)), 1360 char abuf[50]; local 1409 char abuf[50]; local [all...] |
H A D | radius_server.c | 888 char abuf[50]; local 906 if (inet_ntop(AF_INET6, &from.sin6.sin6_addr, abuf, 907 sizeof(abuf)) == NULL) 908 abuf[0] = '\0'; 911 len, abuf, from_port); 920 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf)); 923 len, abuf, from_port); 931 RADIUS_DEBUG("Unknown client %s - packet ignored", abuf); 964 RADIUS_DEBUG("Invalid Message-Authenticator from %s", abuf); 1431 char abuf[50], mbuf[50]; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_das.c | 37 const char *abuf, 66 abuf, from_port); 81 "'%s' from %s:%d", tmp, abuf, from_port); 110 abuf, from_port); 115 "%s:%d", abuf, from_port); 152 char abuf[50]; local 171 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf)); 175 len, abuf, from_port); 184 "from %s:%d failed", abuf, from_por 35 radius_das_disconnect(struct radius_das_data *das, struct radius_msg *msg, const char *abuf, int from_port) argument [all...] |
H A D | radius_client.c | 381 char abuf[50]; local 439 hostapd_ip_txt(&old->addr, abuf, sizeof(abuf)), 463 hostapd_ip_txt(&old->addr, abuf, sizeof(abuf)), 945 char abuf[50]; local 954 hostapd_ip_txt(&nserv->addr, abuf, sizeof(abuf)), 1069 abuf, sizeof(abuf)), 1360 char abuf[50]; local 1409 char abuf[50]; local [all...] |
H A D | radius_server.c | 888 char abuf[50]; local 906 if (inet_ntop(AF_INET6, &from.sin6.sin6_addr, abuf, 907 sizeof(abuf)) == NULL) 908 abuf[0] = '\0'; 911 len, abuf, from_port); 920 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf)); 923 len, abuf, from_port); 931 RADIUS_DEBUG("Unknown client %s - packet ignored", abuf); 964 RADIUS_DEBUG("Invalid Message-Authenticator from %s", abuf); 1431 char abuf[50], mbuf[50]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_das.c | 37 const char *abuf, 66 abuf, from_port); 81 "'%s' from %s:%d", tmp, abuf, from_port); 110 abuf, from_port); 115 "%s:%d", abuf, from_port); 152 char abuf[50]; local 171 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf)); 175 len, abuf, from_port); 184 "from %s:%d failed", abuf, from_por 35 radius_das_disconnect(struct radius_das_data *das, struct radius_msg *msg, const char *abuf, int from_port) argument [all...] |
H A D | radius_client.c | 381 char abuf[50]; local 439 hostapd_ip_txt(&old->addr, abuf, sizeof(abuf)), 463 hostapd_ip_txt(&old->addr, abuf, sizeof(abuf)), 945 char abuf[50]; local 954 hostapd_ip_txt(&nserv->addr, abuf, sizeof(abuf)), 1069 abuf, sizeof(abuf)), 1360 char abuf[50]; local 1409 char abuf[50]; local [all...] |
H A D | radius_server.c | 888 char abuf[50]; local 906 if (inet_ntop(AF_INET6, &from.sin6.sin6_addr, abuf, 907 sizeof(abuf)) == NULL) 908 abuf[0] = '\0'; 911 len, abuf, from_port); 920 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf)); 923 len, abuf, from_port); 931 RADIUS_DEBUG("Unknown client %s - packet ignored", abuf); 964 RADIUS_DEBUG("Invalid Message-Authenticator from %s", abuf); 1431 char abuf[50], mbuf[50]; local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/dh/ |
H A D | dhtest.c | 102 unsigned char *abuf=NULL,*bbuf=NULL; local 167 abuf=(unsigned char *)OPENSSL_malloc(alen); 168 aout=DH_compute_key(abuf,b->pub_key,a); 173 sprintf(buf,"%02X",abuf[i]); 189 if ((aout < 4) || (bout != aout) || (memcmp(abuf,bbuf,aout) != 0)) 199 if (abuf != NULL) OPENSSL_free(abuf);
|
/external/openssl/crypto/dh/ |
H A D | dhtest.c | 102 unsigned char *abuf=NULL,*bbuf=NULL; local 167 abuf=(unsigned char *)OPENSSL_malloc(alen); 168 aout=DH_compute_key(abuf,b->pub_key,a); 173 sprintf(buf,"%02X",abuf[i]); 189 if ((aout < 4) || (bout != aout) || (memcmp(abuf,bbuf,aout) != 0)) 199 if (abuf != NULL) OPENSSL_free(abuf);
|
/external/iproute2/tc/ |
H A D | tc_class.c | 159 char abuf[256]; local 187 abuf[0] = 0; 190 print_tc_classid(abuf, sizeof(abuf), TC_H_MIN(t->tcm_handle)); 192 print_tc_classid(abuf, sizeof(abuf), t->tcm_handle); 194 fprintf(fp, "class %s %s ", rta_getattr_str(tb[TCA_KIND]), abuf); 203 print_tc_classid(abuf, sizeof(abuf), TC_H_MIN(t->tcm_parent)); 205 print_tc_classid(abuf, sizeo [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/egl/android/ |
H A D | native_android.cpp | 177 ANativeWindowBuffer *abuf) 199 handle.handle = get_handle_name(abuf->handle); 201 LOGE("unable to import invalid buffer %p", abuf); 206 abuf->stride * util_format_get_blocksize(templ->format); 214 handle.handle = abuf->handle; 216 abuf->stride * util_format_get_blocksize(templ->format); 223 LOGE("failed to import buffer %p", abuf); 244 ANativeWindowBuffer *abuf) 250 /* how about abuf->usage? */ 251 if (asurf->cache_key.width != abuf 176 import_buffer(struct android_display *adpy, const struct pipe_resource *templ, ANativeWindowBuffer *abuf) argument 243 android_surface_add_cache(struct native_surface *nsurf, ANativeWindowBuffer *abuf) argument 728 ANativeWindowBuffer *abuf; local [all...] |
/external/mesa3d/src/gallium/state_trackers/egl/android/ |
H A D | native_android.cpp | 177 ANativeWindowBuffer *abuf) 199 handle.handle = get_handle_name(abuf->handle); 201 LOGE("unable to import invalid buffer %p", abuf); 206 abuf->stride * util_format_get_blocksize(templ->format); 214 handle.handle = abuf->handle; 216 abuf->stride * util_format_get_blocksize(templ->format); 223 LOGE("failed to import buffer %p", abuf); 244 ANativeWindowBuffer *abuf) 250 /* how about abuf->usage? */ 251 if (asurf->cache_key.width != abuf 176 import_buffer(struct android_display *adpy, const struct pipe_resource *templ, ANativeWindowBuffer *abuf) argument 243 android_surface_add_cache(struct native_surface *nsurf, ANativeWindowBuffer *abuf) argument 728 ANativeWindowBuffer *abuf; local [all...] |
/external/qemu/distrib/sdl-1.2.15/src/audio/macosx/ |
H A D | SDL_coreaudio.c | 105 AudioBuffer *abuf; local 112 abuf = &ioData->mBuffers[i]; 113 SDL_memset(abuf->mData, this->spec.silence, abuf->mDataByteSize); 127 abuf = &ioData->mBuffers[i]; 128 remaining = abuf->mDataByteSize; 129 ptr = abuf->mData;
|
/external/chromium_org/third_party/openssl/openssl/crypto/ecdh/ |
H A D | ecdhtest.c | 130 unsigned char *abuf=NULL,*bbuf=NULL; local 210 abuf=(unsigned char *)OPENSSL_malloc(alen); 211 aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1); 217 sprintf(buf,"%02X",abuf[i]); 243 if ((aout < 4) || (bout != aout) || (memcmp(abuf,bbuf,aout) != 0)) 274 sprintf(buf, "%02X", abuf[i]); 292 if (abuf != NULL) OPENSSL_free(abuf);
|
/external/openssl/crypto/ecdh/ |
H A D | ecdhtest.c | 130 unsigned char *abuf=NULL,*bbuf=NULL; local 210 abuf=(unsigned char *)OPENSSL_malloc(alen); 211 aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1); 217 sprintf(buf,"%02X",abuf[i]); 243 if ((aout < 4) || (bout != aout) || (memcmp(abuf,bbuf,aout) != 0)) 274 sprintf(buf, "%02X", abuf[i]); 292 if (abuf != NULL) OPENSSL_free(abuf);
|
/external/ipsec-tools/src/libipsec/ |
H A D | ipsec_dump_policy.c | 282 char abuf[NI_MAXHOST * 2 + 2]; local 319 abuf[0] = '\0'; 332 if (set_addresses(abuf, sizeof(abuf), 358 snprintf(buf, len, "%s/%s/%s/%s", proto, mode, abuf, level); 366 snprintf(buf, len, "%s/%s/%s/%s%c%u", proto, mode, abuf, level,
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 846 unsigned char *abuf = NULL; local 849 abuf = OPENSSL_malloc(abuflen); 850 if (!abuf) 853 if (!EVP_SignFinal(&ctx_tmp, abuf, &abuflen, 860 ASN1_STRING_set0(si->enc_digest, abuf, abuflen); 904 unsigned char *abuf = NULL; local 924 alen = ASN1_item_i2d((ASN1_VALUE *)si->auth_attr,&abuf, 926 if(!abuf) 928 if (EVP_DigestSignUpdate(&mctx,abuf,alen) <= 0) 930 OPENSSL_free(abuf); 1071 unsigned char md_dat[EVP_MAX_MD_SIZE], *abuf = NULL; local [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 846 unsigned char *abuf = NULL; local 849 abuf = OPENSSL_malloc(abuflen); 850 if (!abuf) 853 if (!EVP_SignFinal(&ctx_tmp, abuf, &abuflen, 860 ASN1_STRING_set0(si->enc_digest, abuf, abuflen); 904 unsigned char *abuf = NULL; local 924 alen = ASN1_item_i2d((ASN1_VALUE *)si->auth_attr,&abuf, 926 if(!abuf) 928 if (EVP_DigestSignUpdate(&mctx,abuf,alen) <= 0) 930 OPENSSL_free(abuf); 1071 unsigned char md_dat[EVP_MAX_MD_SIZE], *abuf = NULL; local [all...] |
/external/iputils/ |
H A D | tracepath.c | 167 char abuf[128]; local 172 inet_ntop(AF_INET, &sin->sin_addr, abuf, sizeof(abuf)); 189 print_host(abuf, h ? (idn ? idn : h->h_name) : abuf, show_both); 191 print_host(h ? (idn ? idn : h->h_name) : abuf, abuf, show_both);
|
H A D | tracepath6.c | 210 char abuf[NI_MAXHOST], hbuf[NI_MAXHOST]; local 232 abuf, sizeof(abuf), NULL, 0, 234 strcpy(abuf, "???"); 236 abuf[0] = 0; 252 print_host(abuf, hbuf, show_both); 254 print_host(hbuf, abuf, show_both);
|