Searched refs:b64len (Results 1 - 7 of 7) sorted by relevance
/external/openssh/ |
H A D | hostfile.c | 76 u_int b64len; local 94 b64len = p - s; 96 if (b64len == 0 || b64len > 1024) { 97 debug2("extract_salt: bad encoded salt length %u", b64len); 100 b64salt = xmalloc(1 + b64len); 101 memcpy(b64salt, s, b64len); 102 b64salt[b64len] = '\0';
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | tncc.c | 150 size_t b64len; local 161 b64 = base64_encode(message, messageLength, &b64len); 168 imc->imc_send = os_zalloc(b64len + 100); 175 os_snprintf((char *) imc->imc_send, b64len + 100,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | tncs.c | 185 size_t b64len; local 200 b64 = base64_encode(message, messageLength, &b64len); 206 tncs->imv_data[imvID].imv_send = os_zalloc(b64len + 100); 214 b64len + 100,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | tncc.c | 150 size_t b64len; local 161 b64 = base64_encode(message, messageLength, &b64len); 168 imc->imc_send = os_zalloc(b64len + 100); 175 os_snprintf((char *) imc->imc_send, b64len + 100,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | tncs.c | 185 size_t b64len; local 200 b64 = base64_encode(message, messageLength, &b64len); 206 tncs->imv_data[imvID].imv_send = os_zalloc(b64len + 100); 214 b64len + 100,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | tncc.c | 150 size_t b64len; local 161 b64 = base64_encode(message, messageLength, &b64len); 168 imc->imc_send = os_zalloc(b64len + 100); 175 os_snprintf((char *) imc->imc_send, b64len + 100,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | tncs.c | 185 size_t b64len; local 200 b64 = base64_encode(message, messageLength, &b64len); 206 tncs->imv_data[imvID].imv_send = os_zalloc(b64len + 100); 214 b64len + 100,
|
Completed in 291 milliseconds