/system/bt/stack/include/ |
advertise_data_parser.h | 50 size_t ad_len = ad.size(); local 51 while (position != ad_len) { 64 if (position + len >= ad_len) { 78 size_t ad_len = ad.size(); local 79 while (position != ad_len) { 86 for (size_t i = position + 1; i < ad_len; i++) { 94 if (position + len >= ad_len) { 107 * This function returns a pointer inside the |ad| array of length |ad_len| 110 static const uint8_t* GetFieldByType(const uint8_t* ad, size_t ad_len, 114 while (position != ad_len) { [all...] |
/external/boringssl/src/crypto/cipher_extra/ |
aead_test.cc | 44 // ad_len, if non-zero, is the required length of the AD. 45 size_t ad_len; member in struct:KnownAEAD 554 const size_t ad_len = local 555 GetParam().ad_len != 0 ? GetParam().ad_len : sizeof(ad) - 1; 556 ASSERT_GE(sizeof(ad) - 1, ad_len); 568 ad_len)); 579 ciphertext_len, ad + 1, ad_len));
|
/external/wpa_supplicant_8/src/crypto/ |
tls_internal.c | 470 size_t res_len, ad_len; local 480 &res_len, &ad, &ad_len, need_more_data); 491 *appl_data = wpabuf_alloc_ext_data(ad, ad_len);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 72 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; local 96 if (aes_siv_decrypt(key, key_len, enc, enc_len, 3, ad, ad_len, 289 size_t ad_len[3] = { ETH_ALEN, auth_len, sizeof(type) }; local 299 3, ad, ad_len, enc) < 0) { [all...] |