/external/iproute2/lib/ |
H A D | ll_addr.c | 32 const char *ll_addr_n2a(unsigned char *addr, int alen, int type, char *buf, int blen) argument 37 if (alen == 4 && 41 if (alen == 16 && type == ARPHRD_TUNNEL6) { 45 for (i=0; i<alen; i++) {
|
H A D | ll_map.c | 34 unsigned short alen; member in struct:ll_cache 83 int alen; local 84 im->alen = alen = RTA_PAYLOAD(tb[IFLA_ADDRESS]); 85 if (alen > sizeof(im->addr)) 86 alen = sizeof(im->addr); 87 memcpy(im->addr, RTA_DATA(tb[IFLA_ADDRESS]), alen); 89 im->alen = 0; 145 unsigned alen) 154 if (alen > sizeo 144 ll_index_to_addr(unsigned idx, unsigned char *addr, unsigned alen) argument [all...] |
H A D | libnetlink.c | 554 int alen) 556 int len = RTA_LENGTH(alen); 566 memcpy(RTA_DATA(rta), data, alen); local 635 const void *data, int alen) 638 int len = RTA_LENGTH(alen); 647 memcpy(RTA_DATA(subrta), data, alen); local 553 addattr_l(struct nlmsghdr *n, int maxlen, int type, const void *data, int alen) argument 634 rta_addattr_l(struct rtattr *rta, int maxlen, int type, const void *data, int alen) argument
|
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_unity.c | 208 int alen = ntohs(attr->lorv); local 217 if (alen) 218 count = alen / sizeof(struct unity_network); 231 if (alen) 232 count = alen / sizeof(struct unity_network);
|
/external/openssl/crypto/dh/ |
H A D | dhtest.c | 103 int i,alen,blen,aout,bout,ret=1; local 166 alen=DH_size(a); 167 abuf=(unsigned char *)OPENSSL_malloc(alen);
|
/external/openssl/crypto/ecdh/ |
H A D | ecdhtest.c | 131 int i,alen,blen,aout,bout,ret=0; local 209 alen=KDF1_SHA1_len; 210 abuf=(unsigned char *)OPENSSL_malloc(alen); 211 aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1);
|
/external/openssl/crypto/modes/ |
H A D | ccm128.c | 105 const unsigned char *aad,size_t alen) 109 if (alen==0) return; 115 if (alen<(0x10000-0x100)) { 116 ctx->cmac.c[0] ^= (u8)(alen>>8); 117 ctx->cmac.c[1] ^= (u8)alen; 120 else if (sizeof(alen)==8 && alen>=(size_t)1<<(32%(sizeof(alen)*8))) { 123 ctx->cmac.c[2] ^= (u8)(alen>>(56%(sizeof(alen)* 104 CRYPTO_ccm128_aad(CCM128_CONTEXT *ctx, const unsigned char *aad,size_t alen) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/dh/ |
H A D | dh_test.c | 94 int i, alen, blen, aout, bout, ret = 1; local 155 alen = DH_size(a); 156 abuf = (unsigned char *)OPENSSL_malloc(alen);
|
/external/chromium_org/third_party/icu/source/samples/uresb/ |
H A D | uresb.c | 187 int alen = len; local 195 ++alen; 200 newstr = (UChar *) malloc((1 + alen) * sizeof(*newstr));
|
/external/chromium_org/third_party/yasm/source/patched-yasm/tools/genperf/ |
H A D | genperf.c | 160 ub4 alen; /* a in 0..alen-1, a power of 2 */ local 197 findhash(&tab, &tabh, &alen, &blen, &salt, &final,
|
H A D | perfect.c | 26 The key is hashed to a pair (a,b) where a in 0..*alen*-1 and b in 196 ub4 alen, /* (a,b) has a in 0..alen-1, a power of 2 */ 203 if (phash_log2(alen)+phash_log2(blen) > UB4BITS) 212 mykey->a_k = state[0]&(alen-1); 224 alen-1, blen-1); 228 ub4 loga = phash_log2(alen); /* log based 2 of blen */ 247 UB4BITS-phash_log2(alen), blen-1); 252 UB4BITS-phash_log2(alen), blen-1); 262 ub4 alen, /* ( 194 initnorm( key *keys, ub4 alen, ub4 blen, ub4 smax, ub4 salt, gencode *final) argument 260 initinl( key *keys, ub4 alen, ub4 blen, ub4 smax, ub4 salt, gencode *final) argument 311 initkey( key *keys, ub4 nkeys, bstuff *tabb, ub4 alen, ub4 blen, ub4 smax, ub4 salt, hashform *form, gencode *final) argument 579 hash_ab( bstuff **tabb, ub4 *alen, ub4 *blen, ub4 *salt, gencode *final, ub4 *scramble, ub4 *smax, key *keys, ub4 nkeys, hashform *form) argument 680 initalen( ub4 *alen, ub4 *blen, ub4 *smax, ub4 nkeys, hashform *form) argument 813 findhash( bstuff **tabb, hstuff **tabh, ub4 *alen, ub4 *blen, ub4 *salt, gencode *final, ub4 *scramble, ub4 *smax, key *keys, ub4 nkeys, hashform *form) argument [all...] |
/external/icu/icu4c/source/samples/uresb/ |
H A D | uresb.c | 187 int alen = len; local 195 ++alen; 200 newstr = (UChar *) malloc((1 + alen) * sizeof(*newstr));
|
/external/ltrace/testsuite/ltrace.main/ |
H A D | parameters.c | 106 int alen; member in struct:__anon26669 115 x.alen = 2;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gpsk.c | 242 u16 alen; local 261 alen = WPA_GET_BE16(pos); 263 if (end - pos < alen) { 270 data->id_peer = os_malloc(alen); 273 "%d-octet ID_Peer", alen); 276 os_memcpy(data->id_peer, pos, alen); 277 data->id_peer_len = alen; 280 pos += alen; 288 alen = WPA_GET_BE16(pos); 290 if (end - pos < alen) { 460 u16 alen; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gpsk.c | 242 u16 alen; local 261 alen = WPA_GET_BE16(pos); 263 if (end - pos < alen) { 270 data->id_peer = os_malloc(alen); 273 "%d-octet ID_Peer", alen); 276 os_memcpy(data->id_peer, pos, alen); 277 data->id_peer_len = alen; 280 pos += alen; 288 alen = WPA_GET_BE16(pos); 290 if (end - pos < alen) { 460 u16 alen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gpsk.c | 242 u16 alen; local 261 alen = WPA_GET_BE16(pos); 263 if (end - pos < alen) { 270 data->id_peer = os_malloc(alen); 273 "%d-octet ID_Peer", alen); 276 os_memcpy(data->id_peer, pos, alen); 277 data->id_peer_len = alen; 280 pos += alen; 288 alen = WPA_GET_BE16(pos); 290 if (end - pos < alen) { 460 u16 alen; local [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/modes/ |
H A D | gcm.c | 532 uint64_t alen = ctx->len.u[0]; local 545 alen += len; 546 if (alen > (OPENSSL_U64(1) << 61) || (sizeof(len) == 8 && alen < len)) { 549 ctx->len.u[0] = alen; 1146 uint64_t alen = ctx->len.u[0] << 3; local 1158 alen = BSWAP8(alen); 1163 ctx->len.u[0] = alen; 1166 alen [all...] |
/external/chromium_org/third_party/icu/source/tools/genrb/ |
H A D | derb.c | 345 int alen = len; local 353 ++alen; 358 newstr = (UChar *) uprv_malloc((1 + alen) * sizeof(*newstr));
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
H A D | c_test.c | 117 static int CmpCompare(void* arg, const char* a, size_t alen, argument 119 int n = (alen < blen) ? alen : blen; 122 if (alen < blen) r = -1; 123 else if (alen > blen) r = +1;
|
/external/dhcpcd/ |
H A D | if-linux.c | 439 const void *data, int alen) 441 int len = RTA_LENGTH(alen); 452 memcpy(RTA_DATA(rta), data, alen); local 438 add_attr_l(struct nlmsghdr *n, unsigned int maxlen, int type, const void *data, int alen) argument
|
/external/icu/icu4c/source/tools/genrb/ |
H A D | derb.c | 345 int alen = len; local 353 ++alen; 358 newstr = (UChar *) uprv_malloc((1 + alen) * sizeof(*newstr));
|
/external/libpng/contrib/gregbook/ |
H A D | rpng-win.c | 171 int rc, alen, flen; local 392 alen = strlen(appname); 394 if (alen + flen + 3 > 1023) 395 sprintf(titlebar, "%s: ...%s", appname, filename+(alen+flen+6-1023));
|
/external/openssl/crypto/cms/ |
H A D | cms_sd.c | 707 int alen; local 733 alen = ASN1_item_i2d((ASN1_VALUE *)si->signedAttrs,&abuf, 737 if (EVP_DigestSignUpdate(&mctx, abuf, alen) <= 0) 774 int alen, r = -1; local 790 alen = ASN1_item_i2d((ASN1_VALUE *)si->signedAttrs,&abuf, 794 r = EVP_DigestVerifyUpdate(&mctx, abuf, alen);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gpsk.c | 148 u16 alen; local 154 alen = WPA_GET_BE16(pos); 156 if (end - pos < alen) { 161 data->id_server = os_malloc(alen); 166 os_memcpy(data->id_server, pos, alen); 167 data->id_server_len = alen; 170 pos += alen; 523 u16 alen; local 533 alen = WPA_GET_BE16(pos); 535 if (end - pos < alen) { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gpsk.c | 148 u16 alen; local 154 alen = WPA_GET_BE16(pos); 156 if (end - pos < alen) { 161 data->id_server = os_malloc(alen); 166 os_memcpy(data->id_server, pos, alen); 167 data->id_server_len = alen; 170 pos += alen; 523 u16 alen; local 533 alen = WPA_GET_BE16(pos); 535 if (end - pos < alen) { [all...] |