/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_udp.c | 20 #define COOKIE_LEN 8 48 u8 cookie[COOKIE_LEN]; 182 reply = os_malloc(7 + 2 * COOKIE_LEN + 1); 189 wpa_snprintf_hex(reply + 7, 2 * COOKIE_LEN + 1, 190 priv->cookie, COOKIE_LEN); 192 *reply_len = 7 + 2 * COOKIE_LEN; 216 u8 cookie[COOKIE_LEN]; 268 if (hexstr2bin(buf + 7, cookie, COOKIE_LEN) < 0) { 274 if (os_memcmp(cookie, priv->cookie, COOKIE_LEN) != 0) { 280 pos = buf + 7 + 2 * COOKIE_LEN; [all...] |
/external/tcpdump/ |
print-juniper.c | 370 u_int8_t cookie_len; /* cookie len */ member in struct:juniper_cookie_table_t 417 u_int8_t cookie_len; member in struct:juniper_l2info_t 824 if (l2info.cookie_len == 0) { 830 if (l2info.cookie_len == AS_PIC_COOKIE_LEN) { [all...] |
/external/iproute2/ip/ |
ipl2tp.c | 49 int cookie_len; member in struct:l2tp_parm 178 if (p->cookie_len) addattr_l(&req.n, 1024, L2TP_ATTR_COOKIE, 179 p->cookie, p->cookie_len); 257 if (p->cookie_len > 0) 258 print_cookie("cookie", p->cookie, p->cookie_len); 307 p->cookie_len = RTA_PAYLOAD(attrs[L2TP_ATTR_COOKIE])); 595 p->cookie_len = slen / 2; 596 if (hex2mem(*argv, p->cookie, p->cookie_len) < 0)
|
/external/boringssl/src/ssl/ |
d1_clnt.c | 551 s->d1->cookie_len = CBS_len(&cookie);
|
s3_clnt.c | 673 if (s->d1->cookie_len > sizeof(s->d1->cookie)) { 677 *(p++) = s->d1->cookie_len; 678 memcpy(p, s->d1->cookie, s->d1->cookie_len); 679 p += s->d1->cookie_len; [all...] |
internal.h | 740 size_t cookie_len; member in struct:dtls1_state_st [all...] |