/external/iptables/include/libipq/ |
libipq.h | 74 size_t data_len,
|
/external/wpa_supplicant/ |
radius.c | 403 const u8 *data, size_t data_len) 408 if (data_len > RADIUS_MAX_ATTR_LEN) { 410 (unsigned long) data_len); 414 buf_needed = msg->buf_used + sizeof(*attr) + data_len; 440 attr->length = sizeof(*attr) + data_len; 441 if (data_len > 0) 442 os_memcpy(attr + 1, data, data_len); 444 msg->buf_used += sizeof(*attr) + data_len; 518 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) 521 size_t left = data_len; [all...] |
tlsv1_client.h | 41 const u8 *data, size_t data_len);
|
eap_psk.c | 186 size_t buflen, left, data_len; local 318 data_len = 1; 329 data_len++; 337 rpchannel + 4 + 16, data_len); 339 rpchannel + 4 + 16, data_len, rpchannel + 4); 341 rpchannel, 4 + 16 + data_len);
|
driver_test.c | 395 const u8 *data, size_t data_len) 399 if (data_len > 14) { 403 data_len -= 14; 405 wpa_supplicant_rx_eapol(drv->ctx, src, data, data_len); 412 const u8 *data, size_t data_len) 416 ieee80211_sta_rx(drv->ctx, data, data_len, &rx_status); 640 const u8 *data, size_t data_len) 648 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len); 660 io[2].iov_len = data_len; 773 size_t data_len) [all...] |
driver.h | 615 * @data_len: Size of the EAPOL packet 628 const u8 *data, size_t data_len); 719 * @data_len: Size of the management frame 725 int (*send_mlme)(void *priv, const u8 *data, size_t data_len);
|
sha256.c | 99 * @data_len: Length of the data area 103 size_t data_len, u8 *mac) 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 115 * @data_len: Length of the data 123 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 137 len[2] = data_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 412 const u8 *data, size_t data_len) 417 if (data_len > RADIUS_MAX_ATTR_LEN) { 419 (unsigned long) data_len); 423 buf_needed = msg->buf_used + sizeof(*attr) + data_len; 443 attr->length = sizeof(*attr) + data_len; 444 if (data_len > 0) 445 os_memcpy(attr + 1, data, data_len); 447 msg->buf_used += sizeof(*attr) + data_len; 521 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) 524 size_t left = data_len; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.h | 44 const u8 *data, size_t data_len);
|
tlsv1_client.c | 519 * @data_len: Extension payload length 523 const u8 *data, size_t data_len) 532 if (data == NULL || data_len == 0) 535 pos = conn->client_hello_ext = os_malloc(6 + data_len); 539 WPA_PUT_BE16(pos, 4 + data_len); 543 WPA_PUT_BE16(pos, data_len); 545 os_memcpy(pos, data, data_len); 546 conn->client_hello_ext_len = 6 + data_len;
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.h | 44 const u8 *data, size_t data_len);
|
tlsv1_client.c | 519 * @data_len: Extension payload length 523 const u8 *data, size_t data_len) 532 if (data == NULL || data_len == 0) 535 pos = conn->client_hello_ext = os_malloc(6 + data_len); 539 WPA_PUT_BE16(pos, 4 + data_len); 543 WPA_PUT_BE16(pos, data_len); 545 os_memcpy(pos, data, data_len); 546 conn->client_hello_ext_len = 6 + data_len;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 67 u16 data_len, size_t *msg_len, void **data_pos) 71 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 72 __func__, type, data_len); 74 *msg_len = sizeof(*hdr) + data_len; 81 hdr->length = host_to_be16(data_len); 84 os_memcpy(hdr + 1, data, data_len); 86 os_memset(hdr + 1, 0, data_len); 241 size_t data_len, int encrypt) 246 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 248 __func__, MAC2STR(addr), (unsigned long) data_len, encrypt) [all...] |
driver_i.h | 202 const u8 *data, size_t data_len) 206 data, data_len); 277 const u8 *data, size_t data_len) 281 data, data_len); 353 size_t data_len, int encrypt, 358 data, data_len, encrypt, 389 const u8 *data, size_t data_len) 394 data, data_len);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.h | 194 size_t data_len, int encrypt); 200 size_t data_len); 204 const u8 *data, size_t data_len); 235 u8 *data, size_t data_len); 282 const u8 *data, size_t data_len);
|
/external/bluetooth/hcidump/src/ |
hcidump.c | 276 frm.data_len = len; 299 frm.len = frm.data_len; 308 dp->size = htonl(frm.data_len); 318 dh->len = htobs(frm.data_len); 324 if (write_n(fd, buf, frm.data_len + hdr_size) < 0) { 391 frm.data_len = ntohl(ph.len) - 8; 392 err = read_n(fd, frm.data + 1, frm.data_len - 1); 406 frm.data_len = ntohl(dp.len) + 1; 407 err = read_n(fd, frm.data + 1, frm.data_len - 1); 411 frm.data_len = ntohl(dp.len) [all...] |
/external/chromium/net/http/ |
partial_data.cc | 417 int data_len, CompletionCallback* callback) { 418 int read_len = std::min(data_len, cached_min_len_); 437 int data_len, CompletionCallback* callback) { 438 DVLOG(3) << "To write: " << data_len; 440 return entry->WriteSparseData(current_range_start_, data, data_len, 447 data, data_len, callback, true);
|
/external/chromium/base/ |
pickle.h | 48 Pickle(const char* data, int data_len); 118 bool WriteBytes(const void* data, int data_len);
|
/external/chromium/net/tools/fetch/ |
http_listen_socket.cc | 123 int data_len = recv_data_.length(); local 129 while (pos < data_len) {
|
/external/iproute2/tc/ |
em_cmp.c | 145 int data_len) 149 if (data_len < sizeof(*cmp)) {
|
em_u32.c | 153 int data_len) 157 if (data_len < sizeof(*u_key)) {
|
/external/chromium/net/disk_cache/ |
sparse_control.h | 84 int OpenSparseEntry(int data_len);
|
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
pseudotcpchannel.h | 97 talk_base::StreamResult Write(const void* data, size_t data_len,
|
/external/valgrind/main/coregrind/ |
pub_core_debuginfo.h | 86 Word data_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.c | 99 * @data_len: Length of the data area 103 size_t data_len, u8 *mac) 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 115 * @data_len: Length of the data 123 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 137 len[2] = data_len;
|