/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 53 struct wpa_eapol_key *key, size_t extra_len, 76 struct wpa_eapol_key *key, size_t extra_len, 75 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
|
H A D | peerkey.c | 181 const struct wpa_eapol_key *key, size_t extra_len, int ver) 198 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 527 const struct wpa_eapol_key *key, size_t extra_len, int ver) 540 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 609 const struct wpa_eapol_key *key, size_t extra_len) 624 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 1165 struct wpa_eapol_key *key, size_t extra_len, 1170 wpa_supplicant_process_smk_error(sm, src_addr, key, extra_len); 1173 wpa_supplicant_process_smk_m2(sm, src_addr, key, extra_len, 1177 wpa_supplicant_process_smk_m45(sm, src_addr, key, extra_len, 179 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 525 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 607 wpa_supplicant_process_smk_error( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len) argument 1164 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument [all...] |
H A D | wpa.c | 1098 size_t extra_len, u16 ver, 1106 if (keydatalen > extra_len) { 1108 " key_data_length=%lu > extra_len=%lu", 1110 (unsigned long) extra_len); 1208 int extra_len, u16 ver) 1230 key_info, extra_len, 1433 size_t plen, data_len, extra_len; local 1613 extra_len = data_len - sizeof(*hdr) - sizeof(*key); 1615 if (WPA_GET_BE16(key->key_data_length) > extra_len) { 1619 (unsigned long) extra_len); 1095 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, size_t keydatalen, int key_info, size_t extra_len, u16 ver, struct wpa_gtk_data *gd) argument 1205 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int extra_len, u16 ver) argument [all...] |
/external/chromium/sdch/open-vcdiff/src/ |
H A D | zlib.h | 115 uInt extra_len; /* extra field length (valid if extra != Z_NULL) */ member in struct:gz_header_s 679 a zero byte, and that if extra is not Z_NULL, that extra_len bytes are 832 extra_len contains the actual extra field length, and extra contains the 833 extra field, or that field truncated if extra_max is less than extra_len.
|
/external/chromium/third_party/zlib/ |
H A D | zlib.h | 115 uInt extra_len; /* extra field length (valid if extra != Z_NULL) */ member in struct:gz_header_s 679 a zero byte, and that if extra is not Z_NULL, that extra_len bytes are 832 extra_len contains the actual extra field length, and extra contains the 833 extra field, or that field truncated if extra_max is less than extra_len.
|
/external/qemu/distrib/zlib-1.2.3/ |
H A D | zlib.h | 115 uInt extra_len; /* extra field length (valid if extra != Z_NULL) */ member in struct:gz_header_s 679 a zero byte, and that if extra is not Z_NULL, that extra_len bytes are 832 extra_len contains the actual extra field length, and extra contains the 833 extra field, or that field truncated if extra_max is less than extra_len.
|
/external/wpa_supplicant/ |
H A D | eap_sim_common.c | 169 const u8 *mac, const u8 *extra, size_t extra_len) 187 len[1] = extra_len; 194 extra, extra_len); 207 const u8 *extra, size_t extra_len) 216 len[1] = extra_len; 222 extra, extra_len); 641 const u8 *extra, size_t extra_len) 654 msg->buf + msg->mac, extra, extra_len); 168 eap_sim_verify_mac(const u8 *k_aut, const u8 *req, size_t req_len, const u8 *mac, const u8 *extra, size_t extra_len) argument 206 eap_sim_add_mac(const u8 *k_aut, u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 640 eap_sim_msg_finish(struct eap_sim_msg *msg, size_t *len, const u8 *k_aut, const u8 *extra, size_t extra_len) argument
|
H A D | mlme.c | 592 int transaction, u8 *extra, size_t extra_len, 599 buf = os_malloc(sizeof(*mgmt) + 6 + extra_len); 621 os_memcpy(buf + len, extra, extra_len); 622 len += extra_len; 591 ieee80211_send_auth(struct wpa_supplicant *wpa_s, int transaction, u8 *extra, size_t extra_len, int encrypt) argument
|
H A D | wpa.c | 2251 const struct wpa_eapol_key *key, size_t extra_len, int ver) 2269 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 2507 const struct wpa_eapol_key *key, size_t extra_len, int ver) 2522 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 2646 const struct wpa_eapol_key *key, size_t extra_len) 2662 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 3009 size_t extra_len, u16 ver, 3017 if (keydatalen > extra_len) { 3019 " key_data_length=%lu > extra_len=%lu", 3021 (unsigned long) extra_len); 2249 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 2505 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 2644 wpa_supplicant_process_smk_error( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len) argument 3006 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, size_t keydatalen, int key_info, size_t extra_len, u16 ver, struct wpa_gtk_data *gd) argument 3112 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int extra_len, u16 ver) argument 3389 size_t plen, data_len, extra_len; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 171 const u8 *mac, const u8 *extra, size_t extra_len) 190 len[1] = extra_len; 198 extra, extra_len); 211 const u8 *extra, size_t extra_len) 220 len[1] = extra_len; 226 extra, extra_len); 366 const u8 *mac, const u8 *extra, size_t extra_len) 385 len[1] = extra_len; 393 extra, extra_len); 406 u8 *mac, const u8 *extra, size_t extra_len) 170 eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 210 eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 365 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 405 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 1014 eap_sim_msg_finish(struct eap_sim_msg *msg, const u8 *k_aut, const u8 *extra, size_t extra_len) argument 1031 msg->mac, extra, extra_len); local 1038 extra, extra_len); local [all...] |
H A D | eap_sim_common.h | 93 const u8 *mac, const u8 *extra, size_t extra_len); 95 const u8 *extra, size_t extra_len); 106 size_t extra_len); 108 u8 *mac, const u8 *extra, size_t extra_len); 134 size_t extra_len) 221 const u8 *extra, size_t extra_len); 131 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_aka.c | 791 size_t extra_len) 795 extra_len); 796 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 788 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/zlib/ |
H A D | zlib.h | 118 uInt extra_len; /* extra field length (valid if extra != Z_NULL) */ member in struct:gz_header_s 720 a zero byte, and that if extra is not Z_NULL, that extra_len bytes are 925 extra_len contains the actual extra field length, and extra contains the 926 extra field, or that field truncated if extra_max is less than extra_len.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 654 size_t extra_len) 658 extra_len); 659 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 651 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_upnp_web.c | 682 size_t extra_len = 0; local 695 extra_len = 3000; 697 extra_len += os_strlen(sm->wps->friendly_name); 699 extra_len += os_strlen(sm->wps->manufacturer_url); 701 extra_len += os_strlen(sm->wps->model_description); 703 extra_len += os_strlen(sm->wps->model_url); 705 extra_len += os_strlen(sm->wps->upc); 709 extra_len = os_strlen(wps_scpd_xml); 729 buf = wpabuf_alloc(1000 + extra_len);
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | mlme.c | 233 int transaction, u8 *extra, size_t extra_len, 240 buf = os_malloc(sizeof(*mgmt) + 6 + extra_len); 262 os_memcpy(buf + len, extra, extra_len); 263 len += extra_len; 282 size_t extra_len; local 296 extra_len = 0; 314 extra_len = wpa_s->mlme.ft_ies_len; 319 ieee80211_send_auth(wpa_s, 1, extra, extra_len, 0); 232 ieee80211_send_auth(struct wpa_supplicant *wpa_s, int transaction, u8 *extra, size_t extra_len, int encrypt) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_wext.c | 1533 size_t extra_len; local 1551 extra_len = 0; 1553 extra_len += 2 + data->ssid_len; 1555 extra_len += 3; 1557 r = os_zalloc(sizeof(*r) + extra_len + data->ie_len); 1561 r->ie_len = extra_len + data->ie_len;
|