/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); [all...] |
milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
tls_internal.c | 490 size_t res_len, ad_len; local 500 &res_len, &ad, &ad_len, need_more_data); 503 out = wpabuf_alloc_ext_data(res, res_len); 533 size_t res_len; local 543 wpabuf_len(in_data), &res_len); 548 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.h | 23 unsigned char *res, size_t *res_len,
|
common.c | 723 size_t merge_byte_arrays(u8 *res, size_t res_len, 729 os_memset(res, 0, res_len); 732 if (src1_len >= res_len) { 733 os_memcpy(res, src1, res_len); 734 return res_len; 742 if (len + src2_len >= res_len) { 743 os_memcpy(res + len, src2, res_len - len); 744 return res_len;
|
utils_module_tests.c | 299 size_t res_len; local 303 res = base64_encode((const unsigned char *) "", ~0, &res_len); 309 res = base64_encode((const unsigned char *) "=", 1, &res_len); 310 if (!res || res_len != 5 || res[0] != 'P' || res[1] != 'Q' || 321 res = base64_decode((const unsigned char *) "", 0, &res_len); 327 res = base64_decode((const unsigned char *) "a", 1, &res_len); 333 res = base64_decode((const unsigned char *) "====", 4, &res_len); 339 res = base64_decode((const unsigned char *) "PQ==", 4, &res_len); 340 if (!res || res_len != 1 || res[0] != '=') 344 res = base64_decode((const unsigned char *) "P.Q-=!=*", 8, &res_len); [all...] |
pcsc_funcs.c | [all...] |
common.h | 508 size_t merge_byte_arrays(u8 *res, size_t res_len,
|
/external/tensorflow/tensorflow/contrib/ignite/kernels/dataset/ |
ignite_dataset_iterator.cc | 156 int32_t res_len; local 157 TF_RETURN_IF_ERROR(client_->ReadInt(&res_len)); 158 if (res_len < kMinResLength) 286 int32_t res_len; local 287 TF_RETURN_IF_ERROR(client_->ReadInt(&res_len)); 292 if (res_len < kMinResLength) 325 int32_t page_size = res_len - kScanQueryResHeaderLength; 337 int32_t res_len; local 338 TF_RETURN_IF_ERROR(client_->ReadInt(&res_len)); 344 if (res_len < kMinResLength [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 90 size_t res_len; member in struct:milenage_parameters 130 " res_len INTEGER" 197 if (os_strcmp(col[i], "res_len") == 0 && argv[i]) { 198 m->res_len = atoi(argv[i]); 407 /* Parse IMSI Ki OPc AMF SQN [RES_len] */ 473 m->res_len = atoi(pos); 474 if (m->res_len && 475 (m->res_len < EAP_AKA_RES_MIN_LEN || 476 m->res_len > EAP_AKA_RES_MAX_LEN)) { 477 printf("%s:%d - Invalid RES_len\n" 743 size_t res_len; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 87 u8 *res, size_t *res_len, void *cb_session_ctx);
|
eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 968 if (attr->res == NULL || attr->res_len < data->res_len || 969 attr->res_len_bits != data->res_len * 8 || 970 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { 974 (unsigned long) attr->res_len, 976 (unsigned long) data->res_len * 8); [all...] |
eap_sim_db.c | 55 size_t res_len; member in struct:eap_sim_db_pending::__anon50464::__anon50466 604 entry->u.aka.res_len = (end - start) / 2; 605 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 607 entry->u.aka.res_len = 0; 610 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) [all...] |
/external/ppp/pppd/plugins/pppoatm/ |
ans.c | 41 static int ans(const char *text,int wanted,void *result,int res_len) 114 res_len) < 0) return FATAL;
|
/external/curl/src/ |
tool_doswin.c | 656 DWORD res_len; local 662 res_len = SearchPathA(NULL, bundle_file, NULL, PATH_MAX, buf, &ptr); 663 if(res_len > 0) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 24 size_t res_len; member in struct:eap_aka_data 241 data->res_len = os_strlen(pos) / 2; 242 if (data->res_len > EAP_AKA_RES_MAX_LEN) { 243 data->res_len = 0; 246 if (hexstr2bin(pos, data->res, data->res_len) < 0) 248 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); 279 data->autn, data->res, &data->res_len, 314 data->res, &data->res_len, data->auts); 325 data->res_len = EAP_AKA_RES_MAX_LEN; 674 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8 [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 234 u8 *res, size_t res_len) 262 while (res_len) { 267 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 270 res_len -= hlen; 803 attr->res_len = alen;
|
eap_sim_common.h | 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
ikev2_common.h | 323 size_t *res_len);
|
ikev2_common.c | 432 size_t *res_len) 515 *res_len = decrypted_len;
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 25 const char *label, u8 *res, size_t res_len) 34 WPA_PUT_BE32(key_bits, res_len * 8); 45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 47 left = res_len;
|
wps_i.h | 135 const char *label, u8 *res, size_t res_len);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 67 size_t res_len, *dst_len, prev_len; local 74 res_len = 0; 78 tmp = wpa_config_parse_string(value, &res_len); 88 (u8 *) tmp, res_len); 91 (u8 *) tmp, res_len); 94 if (data->param3 && res_len < (size_t) data->param3) { 97 (unsigned long) res_len, (long) data->param3); 102 if (data->param4 && res_len > (size_t) data->param4) { 105 (unsigned long) res_len, (long) data->param4); 121 (*dst && tmp && prev_len == res_len & 1630 size_t res_len; local [all...] |
/art/test/ti-stress/ |
stress.cc | 110 size_t res_len; local 111 unsigned char* res = writer.CreateImage(&alloc, &res_len); 114 *out_len = res_len;
|