/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 519 * @data_len: Extension payload length 523 const u8 *data, size_t data_len) 532 if (data == NULL || data_len == 0) 535 pos = conn->client_hello_ext = os_malloc(6 + data_len); 539 WPA_PUT_BE16(pos, 4 + data_len); 543 WPA_PUT_BE16(pos, data_len); 545 os_memcpy(pos, data, data_len); 546 conn->client_hello_ext_len = 6 + data_len;
|
pkcs8.c | 134 size_t data_len; local 184 passwd, &data_len); 187 key = pkcs8_key_import(data, data_len);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
driver_i.h | 202 const u8 *data, size_t data_len) 206 data, data_len); 277 const u8 *data, size_t data_len) 281 data, data_len); 353 size_t data_len, int encrypt, 358 data, data_len, encrypt, 389 const u8 *data, size_t data_len) 394 data, data_len);
|
/external/chromium/third_party/libjingle/source/talk/base/ |
socketstream.h | 54 virtual StreamResult Write(const void* data, size_t data_len,
|
/external/iptables/include/libipq/ |
libipq.h | 74 size_t data_len,
|
/external/llvm/test/CodeGen/SystemZ/ |
2009-07-04-Shl32.ll | 6 define void @compdecomp(i8* nocapture %data, i64 %data_len) nounwind {
|
/external/wpa_supplicant/ |
radius.c | 403 const u8 *data, size_t data_len) 408 if (data_len > RADIUS_MAX_ATTR_LEN) { 410 (unsigned long) data_len); 414 buf_needed = msg->buf_used + sizeof(*attr) + data_len; 440 attr->length = sizeof(*attr) + data_len; 441 if (data_len > 0) 442 os_memcpy(attr + 1, data, data_len); 444 msg->buf_used += sizeof(*attr) + data_len; 518 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) 521 size_t left = data_len; [all...] |
tlsv1_client.h | 41 const u8 *data, size_t data_len);
|
ndis_events.c | 200 char *data, size_t data_len) 212 if (2 + data_len > (size_t) (end - pos)) { 214 "data (%d)", data_len); 217 *pos++ = data_len >> 8; 218 *pos++ = data_len & 0xff; 219 os_memcpy(pos, data, data_len); 220 pos += data_len; 254 size_t data_len; local 270 data_len = upper - lower + 1; 271 data = os_malloc(data_len); [all...] |
radius.h | 212 const u8 *data, size_t data_len); 215 size_t data_len); 239 u8 *data, size_t data_len,
|
eap_psk.c | 186 size_t buflen, left, data_len; local 318 data_len = 1; 329 data_len++; 337 rpchannel + 4 + 16, data_len); 339 rpchannel + 4 + 16, data_len, rpchannel + 4); 341 rpchannel, 4 + 16 + data_len);
|
sha256.c | 99 * @data_len: Length of the data area 103 size_t data_len, u8 *mac) 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 115 * @data_len: Length of the data 123 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 137 len[2] = data_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 412 const u8 *data, size_t data_len) 417 if (data_len > RADIUS_MAX_ATTR_LEN) { 419 (unsigned long) data_len); 423 buf_needed = msg->buf_used + sizeof(*attr) + data_len; 443 attr->length = sizeof(*attr) + data_len; 444 if (data_len > 0) 445 os_memcpy(attr + 1, data, data_len); 447 msg->buf_used += sizeof(*attr) + data_len; 521 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) 524 size_t left = data_len; [all...] |
radius.h | 217 const u8 *data, size_t data_len); 220 size_t data_len); 244 const u8 *data, size_t data_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
ndis_events.c | 200 char *data, size_t data_len) 212 if (2 + data_len > (size_t) (end - pos)) { 214 "data (%d)", data_len); 217 *pos++ = data_len >> 8; 218 *pos++ = data_len & 0xff; 219 os_memcpy(pos, data, data_len); 220 pos += data_len; 254 size_t data_len; local 270 data_len = upper - lower + 1; 271 data = os_malloc(data_len); [all...] |
driver_test.c | 510 const u8 *data, size_t data_len) 514 if (data_len > 14) { 518 data_len -= 14; 520 wpa_supplicant_rx_eapol(drv->ctx, src, data, data_len); 527 const u8 *data, size_t data_len) 532 wpa_supplicant_sta_rx(drv->ctx, data, data_len, &rx_status); 837 const u8 *data, size_t data_len) 849 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len); 856 msg_len = 6 + sizeof(eth) + data_len; 862 os_memcpy(msg + 6 + sizeof(eth), data, data_len); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
ndis_events.c | 200 char *data, size_t data_len) 212 if (2 + data_len > (size_t) (end - pos)) { 214 "data (%d)", data_len); 217 *pos++ = data_len >> 8; 218 *pos++ = data_len & 0xff; 219 os_memcpy(pos, data, data_len); 220 pos += data_len; 254 size_t data_len; local 270 data_len = upper - lower + 1; 271 data = os_malloc(data_len); [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.h | 203 const u8 *data, size_t data_len); 206 size_t data_len); 230 const u8 *data, size_t data_len,
|
radius.c | 458 const u8 *data, size_t data_len) 463 if (data_len > RADIUS_MAX_ATTR_LEN) { 465 (unsigned long) data_len); 469 buf_needed = sizeof(*attr) + data_len; 480 attr->length = sizeof(*attr) + data_len; 481 wpabuf_put_data(msg->buf, data, data_len); 562 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) 565 size_t left = data_len; 1089 const u8 *data, size_t data_len, 1099 if (data_len > 128 [all...] |
/external/chromium/net/disk_cache/ |
sparse_control.cc | 213 int data_len = entry_->GetDataSize(kSparseIndex); local 214 if (!data_len) { 217 rv = OpenSparseEntry(data_len); 326 int data_len = entry->GetDataSize(kSparseIndex); local 327 if (data_len < static_cast<int>(sizeof(SparseData)) || 331 int map_len = data_len - sizeof(SparseHeader); 350 deleter, &ChildrenDeleter::Start, buffer, data_len)); 353 deleter, &ChildrenDeleter::ReadData, address, data_len)); 385 int SparseControl::OpenSparseEntry(int data_len) { 386 if (data_len < static_cast<int>(sizeof(SparseData)) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
wpas_glue.c | 62 const void *data, u16 data_len, 67 *msg_len = sizeof(*hdr) + data_len; 74 hdr->length = host_to_be16(data_len); 77 os_memcpy(hdr + 1, data, data_len); 79 os_memset(hdr + 1, 0, data_len); 358 const void *data, u16 data_len, 361 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
|
/external/chromium/net/socket/ |
socket_test_util.h | 69 MockRead() : async(false), result(0), data(NULL), data_len(0), 74 data_len(0), sequence_number(0), time_stamp(base::Time::Now()) { } 78 data(NULL), data_len(0), sequence_number(seq), 83 data_len(strlen(data)), sequence_number(0), 88 data_len(strlen(data)), sequence_number(0), 92 MockRead(bool async, const char* data, int data_len) : async(async), 93 result(0), data(data), data_len(data_len), sequence_number(0), 98 result(0), data(data), data_len(strlen(data)), sequence_number(seq), 102 MockRead(bool async, const char* data, int data_len, int seq) : async(async) 109 int data_len; member in struct:net::MockRead [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 55 const u8 *data, size_t data_len) 61 data, data_len); 66 const u8 *dst, const u8 *data, size_t data_len) 71 data, data_len); [all...] |
/external/chromium/net/http/ |
partial_data.cc | 417 int data_len, CompletionCallback* callback) { 418 int read_len = std::min(data_len, cached_min_len_); 437 int data_len, CompletionCallback* callback) { 438 DVLOG(3) << "To write: " << data_len; 440 return entry->WriteSparseData(current_range_start_, data, data_len, 447 data, data_len, callback, true);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.c | 99 * @data_len: Length of the data area 103 size_t data_len, u8 *mac) 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 115 * @data_len: Length of the data 123 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 137 len[2] = data_len;
|