/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
|
eap_sim_common.c | 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 213 len[0] = msg_len; 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 400 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 408 len[0] = msg_len; 414 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
|
/hardware/qcom/msm8x84/original-kernel-headers/media/ |
msmb_pproc.h | 150 uint32_t msg_len; member in struct:msm_cpp_frame_info_t 312 uint32_t msg_len; member in struct:msm_cpp_frame_info32_t
|
/system/extras/tests/net_test/ |
csocket.py | 102 msg_len = len(CMsgHdr) + datalen 104 msg_control += CMsgHdr((msg_len, msg_level, msg_type)).Pack()
|
/external/libnfc-nci/src/nfa/hci/ |
nfa_hci_main.c | 732 nfa_hci_cb.msg_len = 0; 768 pkt_len = nfa_hci_cb.msg_len; [all...] |
nfa_hci_utils.c | 316 tNFA_STATUS nfa_hciu_send_msg (UINT8 pipe_id, UINT8 type, UINT8 instruction, UINT16 msg_len, UINT8 *p_msg) 329 pipe_id, nfa_hciu_get_type_inst_names (pipe_id, type, instruction, buff), msg_len); 332 pipe_id, type, instruction, msg_len); 338 while ((first_pkt == TRUE) || (msg_len != 0)) 350 if (msg_len > data_len) 356 data_len = msg_len; 375 msg_len -= data_len; 376 if (msg_len > 0) [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 205 size_t *msg_len, void **data_pos) 209 msg_len, data_pos); 358 u8 *msg, size_t msg_len, u8 *key_mic);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/dvb/ |
frontend.h | 93 __u8 msg_len; /* valid values are 3...6 */ member in struct:dvb_diseqc_master_cmd 99 __u8 msg_len; /* valid values are 0...4, 0 means no msg */ member in struct:dvb_diseqc_slave_reply
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/dvb/ |
frontend.h | 94 __u8 msg_len; /* valid values are 3...6 */ member in struct:dvb_diseqc_master_cmd 100 __u8 msg_len; /* valid values are 0...4, 0 means no msg */ member in struct:dvb_diseqc_slave_reply
|
/system/bt/stack/smp/ |
smp_keys.c | 1244 UINT8 msg_len = BT_OCTET32_LEN \/* U size *\/ + BT_OCTET32_LEN \/* V size *\/ + 1 \/* Z size *\/; local 1359 UINT8 msg_len = BT_OCTET32_LEN \/* U size *\/ + BT_OCTET32_LEN \/* V size *\/ local 1592 UINT8 msg_len = 1 \/* Counter size *\/ + 4 \/* keyID size *\/ + local 1832 UINT8 msg_len = BT_OCTET16_LEN \/* N1 size *\/ + BT_OCTET16_LEN \/* N2 size *\/ + local 2117 UINT8 msg_len = 4 \/* KeyID size *\/; local [all...] |
/external/boringssl/src/crypto/rsa/ |
padding.c | 245 const unsigned msg_len = from_len - zero_index; local 246 if (msg_len > to_len) { 253 if (msg_len > INT_MAX) { 258 memcpy(to, &from[zero_index], msg_len); 259 return (int)msg_len;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 62 size_t *msg_len, void **data_pos) 66 *msg_len = sizeof(*hdr) + data_len; 67 hdr = os_malloc(*msg_len); 422 size_t *msg_len, void **data_pos) 424 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
|
p2p_supplicant_sd.c | 103 size_t msg_len, size_t offset) 114 if (offset > msg_len) 117 tmp = os_malloc(DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN + msg_len); 121 end = spos + msg_len; 126 os_memcpy(tmp + DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN, msg, msg_len);
|
/external/kernel-headers/original/uapi/linux/ |
tipc_config.h | 395 int msg_len; local 397 msg_len = TCM_LENGTH(data_len); 399 tcm_hdr->tcm_len = htonl(msg_len);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
tipc_config.h | 406 int msg_len; local 408 msg_len = TCM_LENGTH(data_len); 410 tcm_hdr->tcm_len = htonl(msg_len);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
tipc_config.h | 381 int msg_len; local 383 msg_len = TCM_LENGTH(data_len); 385 tcm_hdr->tcm_len = htonl(msg_len);
|
/external/boringssl/src/ssl/ |
d1_lib.c | 330 l2n3(msg_hdr->msg_len, p); 333 l2n3(msg_hdr->msg_len, p);
|
/external/opencv/cxcore/src/ |
cxerror.cpp | 181 size_t msg_len = strlen(err_msg ? err_msg : "") + 1024; 182 char* message = (char*)alloca(msg_len);
|
/external/curl/lib/ |
smb.c | 407 const void *msg, size_t msg_len) 410 cmd, msg_len); local 412 msg, msg_len); 414 return smb_send(conn, sizeof(struct smb_header) + msg_len, 0);
|
/system/bt/stack/gatt/ |
gatt_main.c | 1002 UINT16 msg_len; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 670 size_t msg_len; local 678 msg_len = be_to_host16(hdr->length); 679 if (msg_len < sizeof(*hdr) || msg_len > len) { 684 if (msg_len < len) { 686 "RADIUS message", (unsigned long) len - msg_len); 693 msg->buf = wpabuf_alloc_copy(data, msg_len); [all...] |
/external/libnfc-nci/src/nfc/include/ |
rw_api.h | 159 UINT16 msg_len; /* Length of the NDEF message */ member in struct:__anon16496 411 ** Parameters: msg_len: The length of the buffer 417 NFC_API extern tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg); 556 ** Parameters: msg_len: The length of the buffer 562 NFC_API extern tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg ); [all...] |
/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_kay.c | 80 const u8 *mka_msg, size_t msg_len); 706 size_t msg_len) 913 const u8 *mka_msg, size_t msg_len) 926 left_len = msg_len; 982 const u8 *peer_msg, size_t msg_len) 1040 const u8 *peer_msg, size_t msg_len) 1238 const u8 *mka_msg, size_t msg_len) [all...] |
/bionic/libc/kernel/uapi/linux/dvb/ |
frontend.h | 90 __u8 msg_len; member in struct:dvb_diseqc_master_cmd 95 __u8 msg_len; member in struct:dvb_diseqc_slave_reply
|
/development/ndk/platforms/android-21/include/linux/dvb/ |
frontend.h | 90 __u8 msg_len; member in struct:dvb_diseqc_master_cmd 95 __u8 msg_len; member in struct:dvb_diseqc_slave_reply
|