/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
privsep_commands.h | 59 size_t seq_len; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant/ |
driver_atmel.c | 88 u8 seq_len; member in struct:atmel_param 194 int set_tx, const u8 *seq, size_t seq_len, 227 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 229 (unsigned long) seq_len, (unsigned long) key_len); 231 if (seq_len > 8) 251 os_memcpy(param->seq, seq, seq_len); 252 param->seq_len = seq_len;
|
driver_wext.h | 30 int set_tx, const u8 *seq, size_t seq_len,
|
driver_ndiswrapper.c | 43 size_t seq_len; member in struct:wpa_key 116 const u8 *seq, size_t seq_len, 131 wpa_key.seq_len = seq_len; 150 seq, seq_len, key, key_len);
|
driver_prism54.c | 113 const u8 *seq, size_t seq_len, 143 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 145 (unsigned long) seq_len, (unsigned long) key_len); 147 if (seq_len > 8) 176 os_memcpy(param->u.crypt.seq, seq, seq_len);
|
driver_madwifi.c | 200 const u8 *seq, size_t seq_len, 222 seq, seq_len, 242 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 244 (unsigned long) seq_len, (unsigned long) key_len); 246 if (seq_len > sizeof(u_int64_t)) { 247 wpa_printf(MSG_DEBUG, "%s: seq_len %lu too big", 248 __FUNCTION__, (unsigned long) seq_len); 276 for (i = 0; i < seq_len; i++) 281 os_memcpy(&wk.ik_keyrsc, seq, seq_len);
|
driver_ipw.c | 220 const u8 *seq, size_t seq_len, 247 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 249 (unsigned long) seq_len, (unsigned long) key_len); 251 if (seq_len > 8) 266 os_memcpy(param->u.crypt.seq, seq, seq_len);
|
wpa_i.h | 161 const u8 *seq, size_t seq_len, 165 seq, seq_len, key, key_len);
|
driver_hostap.c | 154 int set_tx, const u8 *seq, size_t seq_len, 181 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 183 (unsigned long) seq_len, (unsigned long) key_len); 185 if (seq_len > 8) 214 os_memcpy(param->u.crypt.seq, seq, seq_len);
|
driver_bsd.c | 244 const u8 *seq, size_t seq_len, 277 "%s: alg=%s addr=%s key_idx=%d set_tx=%d seq_len=%zu key_len=%zu", 279 seq_len, key_len); 281 if (seq_len > sizeof(u_int64_t)) { 282 wpa_printf(MSG_DEBUG, "%s: seq_len %zu too big", 283 __func__, seq_len); 312 os_memcpy(&wk.ik_keyrsc, seq, seq_len);
|
driver_broadcom.c | 162 const u8 *seq, size_t seq_len, 194 if (seq && seq_len > 0) 195 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len);
|
driver_wext.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_atmel.c | 87 u8 seq_len; member in struct:atmel_param 193 int set_tx, const u8 *seq, size_t seq_len, 226 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 228 (unsigned long) seq_len, (unsigned long) key_len); 230 if (seq_len > 8) 250 os_memcpy(param->seq, seq, seq_len); 251 param->seq_len = seq_len;
|
driver_ndiswrapper.c | 43 size_t seq_len; member in struct:wpa_key 116 const u8 *seq, size_t seq_len, 131 wpa_key.seq_len = seq_len; 150 seq, seq_len, key, key_len);
|
driver_prism54.c | 111 const u8 *seq, size_t seq_len, 141 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 143 (unsigned long) seq_len, (unsigned long) key_len); 145 if (seq_len > 8) 174 os_memcpy(param->u.crypt.seq, seq, seq_len);
|
driver_madwifi.c | 210 const u8 *seq, size_t seq_len, 232 seq, seq_len, 252 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 254 (unsigned long) seq_len, (unsigned long) key_len); 256 if (seq_len > sizeof(u_int64_t)) { 257 wpa_printf(MSG_DEBUG, "%s: seq_len %lu too big", 258 __FUNCTION__, (unsigned long) seq_len); 286 for (i = 0; i < seq_len; i++) 291 os_memcpy(&wk.ik_keyrsc, seq, seq_len);
|
driver_ipw.c | 218 const u8 *seq, size_t seq_len, 245 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 247 (unsigned long) seq_len, (unsigned long) key_len); 249 if (seq_len > 8) 264 os_memcpy(param->u.crypt.seq, seq, seq_len);
|
driver_wext.h | 63 int set_tx, const u8 *seq, size_t seq_len,
|
driver_hostap.c | 152 int set_tx, const u8 *seq, size_t seq_len, 179 wpa_printf(MSG_DEBUG, "%s: alg=%s key_idx=%d set_tx=%d seq_len=%lu " 181 (unsigned long) seq_len, (unsigned long) key_len); 183 if (seq_len > 8) 212 os_memcpy(param->u.crypt.seq, seq, seq_len);
|
driver_bsd.c | 248 const u8 *seq, size_t seq_len, 281 "%s: alg=%s addr=%s key_idx=%d set_tx=%d seq_len=%zu key_len=%zu", 283 seq_len, key_len); 285 if (seq_len > sizeof(u_int64_t)) { 286 wpa_printf(MSG_DEBUG, "%s: seq_len %zu too big", 287 __func__, seq_len); 316 os_memcpy(&wk.ik_keyrsc, seq, seq_len);
|
driver_privsep.c | 201 const u8 *seq, size_t seq_len, 218 if (seq && seq_len > 0 && seq_len < sizeof(cmd.seq)) { 219 os_memcpy(cmd.seq, seq, seq_len); 220 cmd.seq_len = seq_len;
|
driver_broadcom.c | 167 const u8 *seq, size_t seq_len, 199 if (seq && seq_len > 0) 200 wpa_hexdump(MSG_MSGDUMP, "BROADCOM: SEQ", seq, seq_len);
|
/system/core/libcutils/ |
strdup8to16.c | 115 int seq_len; local 128 seq_len = UTF8_SEQ_LENGTH(**pUtf8Ptr); 130 ret = (**pUtf8Ptr) & leaderMask [seq_len - 1]; 135 for (i = 1; i < seq_len ; i++, (*pUtf8Ptr)++) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_i.h | 138 const u8 *seq, size_t seq_len, 143 seq, seq_len, key, key_len);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 156 const u8 *seq, size_t seq_len, 162 wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
|