/external/wpa_supplicant_8/src/drivers/ |
driver_hostap.c | 134 event.tx_status.data_len = len; 144 size_t data_len = len; local 181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); 192 event.rx_mgmt.frame_len = data_len; 200 handle_data(drv, buf, data_len, stype); 283 size_t data_len, int encrypt, const u8 *own_addr, 292 len = sizeof(*hdr) + sizeof(rfc1042_header) + 2 + data_len; 314 memcpy(pos, data, data_len);
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_privsep.c | 30 const void *data, size_t data_len) 38 io[1].iov_len = data_len;
|
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 172 const char *passwd, size_t *data_len) 230 *data_len = enc_data_len - pad;
|
/hardware/qcom/media/mm-video/vidc/venc/test/ |
video_encoder_test.c | 627 unsigned int data_len =0; local 688 data_len = read_frame ( enc_buffer.ptrbuffer, 691 if (data_len == 0) 696 enc_buffer.len = data_len; 697 DEBUG_PRINT("\n Read Frame from File szie = %d",(int)data_len); 810 unsigned int data_len =0; local 852 data_len = read_frame ( tempbuffer->pbuffer, 856 if (data_len == 0)
|
/external/bluetooth/bluedroid/stack/l2cap/ |
l2c_int.h | 607 extern void l2cu_send_peer_config_rej (tL2C_CCB *p_ccb, UINT8 *p_data, UINT16 data_len, UINT16 rej_len); 610 extern void l2cu_send_peer_echo_req (tL2C_LCB *p_lcb, UINT8 *p_data, UINT16 data_len); 611 extern void l2cu_send_peer_echo_rsp (tL2C_LCB *p_lcb, UINT8 id, UINT8 *p_data, UINT16 data_len); 662 extern BOOLEAN l2cu_check_feature_req (tL2C_LCB *p_lcb, UINT8 id, UINT8 *p_data, UINT16 data_len); 663 extern void l2cu_check_feature_rsp (tL2C_LCB *p_lcb, UINT8 id, UINT8 *p_data, UINT16 data_len); [all...] |
/external/dhcpcd/ |
net.c | 762 valid_udp_packet(const uint8_t *data, size_t data_len, struct in_addr *from, 768 if (data_len < sizeof(packet.ip)) { 774 memcpy(&packet, data, MIN(data_len, sizeof(packet))); 777 if (data_len > sizeof(packet)) { 787 if (data_len < bytes) {
|
/external/chromium/net/http/ |
http_cache_transaction.cc | [all...] |
http_transaction_unittest.cc | 283 int data_len = static_cast<int>(data_.size()); local 284 int num = std::min(buf_len, data_len - data_cursor_);
|
/external/kernel-headers/original/linux/ |
skbuff.h | 200 * @data_len: Data length 274 data_len, member in struct:sk_buff 786 return skb->data_len; 791 return skb->len - skb->data_len; 878 BUG_ON(skb->len < skb->data_len); 1005 if (unlikely(skb->data_len)) { 1031 if (skb->data_len) [all...] |
/external/openssh/ |
pkcs11.h | 826 unsigned char *data, unsigned long data_len, 847 unsigned char *data, unsigned long *data_len)); 863 unsigned char *data, unsigned long data_len, 882 unsigned char *data, unsigned long data_len, 898 unsigned char *data, unsigned long data_len, 908 unsigned char *data, unsigned long data_len, 927 unsigned long *data_len)); [all...] |
clientloop.c | 1662 u_int data_len; local 1672 u_int data_len; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
drv_callbacks.c | 698 const u8 *data, size_t data_len) 713 ieee802_1x_receive(hapd, src, data, data_len); 750 data->ft_rrb_rx.data, data->ft_rrb_rx.data_len); 761 data->tx_status.data_len, 768 data->tx_status.data_len, 776 data->eapol_tx_status.data_len, 808 data->eapol_rx.data_len);
|
wpa_auth_ie.c | 340 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, 344 *pos++ = RSN_SELECTOR_LEN + data_len + data2_len; 347 os_memcpy(pos, data, data_len); 348 pos += data_len;
|
ap_drv_ops.h | 149 size_t data_len, int encrypt, 155 data_len, encrypt,
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 57 size_t data_len, u8 *hash) 65 hmac_sha1(key, key_len, data, data_len, tmphash); 71 hmac_md5(key, key_len, data, data_len, tmphash); 115 const u8 *data, size_t data_len, 134 len[1] = data_len; 694 const u8 *skeyseed, const u8 *data, size_t data_len, 721 data, data_len, keybuf, keybuf_len)) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 60 const void *data, u16 data_len, 65 *msg_len = sizeof(*hdr) + data_len; 72 hdr->length = host_to_be16(data_len); 75 os_memcpy(hdr + 1, data, data_len); 77 os_memset(hdr + 1, 0, data_len); 366 const void *data, u16 data_len, 369 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
|
/external/libnfc-nci/src/nfa/int/ |
nfa_hci_int.h | 454 extern void nfa_hci_handle_admin_gate_rsp (UINT8 *p_data, UINT8 data_len); 457 extern void nfa_hci_handle_dyn_pipe_pkt (UINT8 pipe, UINT8 *p_data, UINT16 data_len); 480 extern tNFA_STATUS nfa_hciu_asmbl_dyn_pipe_pkt (UINT8 *p_data, UINT8 data_len);
|
/external/oprofile/opjitconv/ |
debug_line.c | 199 void * data, size_t data_len) 202 emit_unsigned_LEB128(b, data_len + 1); 204 add_data(b, data, data_len);
|
/external/chromium/webkit/glue/ |
resource_loader_bridge.h | 338 virtual void AppendDataToUpload(const char* data, int data_len) = 0;
|
multipart_response_delegate.cc | 80 int data_len, 88 data_.append(data, data_len);
|
/external/libnfc-nci/src/nfa/include/ |
nfa_ee_api.h | 437 UINT16 data_len,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_nss.c | 113 u8 *data, size_t data_len)
|
tls.h | 468 * @data_len: Extension payload length 474 size_t data_len);
|
crypto_openssl.c | 138 u8 *data, size_t data_len) 164 if (EVP_CipherUpdate(&ctx, data, &outl, data, data_len)) 733 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 736 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 775 size_t data_len, u8 *mac) 777 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 819 int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) 821 return omac1_aes_128_vector(key, 1, &data, &data_len, mac);
|
/external/chromium/chrome/browser/download/ |
download_file_manager.cc | 200 const int data_len = contents[i].second; local 202 download->AppendDataToFile(data->data(), data_len);
|