Searched refs:msglen (Results 26 - 50 of 55) sorted by relevance

123

/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/
H A DAuthenticationManager.java414 public void handleMessage(byte[] msg, int msglen) throws IOException argument
424 byte[] tmp = new byte[msglen];
425 System.arraycopy(msg, 0, tmp, 0, msglen);
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dpreauth.c142 size_t msglen; local
151 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL);
155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
157 ETH_P_RSN_PREAUTH, msg, msglen);
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpreauth.c132 size_t msglen; local
141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL);
145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
147 ETH_P_RSN_PREAUTH, msg, msglen);
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpreauth.c132 size_t msglen; local
141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL);
145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
147 ETH_P_RSN_PREAUTH, msg, msglen);
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpreauth.c132 size_t msglen; local
141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL);
145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
147 ETH_P_RSN_PREAUTH, msg, msglen);
/external/dropbear/libtomcrypt/src/mac/pmac/
H A Dpmac_test.c31 int msglen;
137 if ((err = pmac_memory(idx, tests[x].key, 16, tests[x].msg, tests[x].msglen, outtag, &len)) != CRYPT_OK) {
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
H A DKexManager.java379 public synchronized void handleMessage(byte[] msg, int msglen) throws IOException argument
420 kip = new PacketKexInit(msg, 0, msglen);
526 PacketKexDhGexGroup dhgexgrp = new PacketKexDhGexGroup(msg, 0, msglen);
537 PacketKexDhGexReply dhgexrpl = new PacketKexDhGexReply(msg, 0, msglen);
593 PacketKexDHReply dhr = new PacketKexDHReply(msg, 0, msglen);
/external/ppp/pppd/
H A Deap.c1050 int msglen; local
1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr;
1060 PUTSHORT(msglen, outp);
1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen);
1081 int msglen; local
1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE +
1092 PUTSHORT(msglen, outp);
1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen);
1117 int msglen; local
1126 msglen
1148 int msglen; local
1176 int msglen; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_client_write.c672 size_t msglen; local
676 msglen = 1000;
678 msglen += tls_client_cert_chain_der_len(conn);
680 msg = os_malloc(msglen);
685 end = msg + msglen;
H A Dtlsv1_server_write.c663 size_t msglen; local
667 msglen = 1000 + tls_server_cert_chain_der_len(conn);
669 msg = os_malloc(msglen);
674 end = msg + msglen;
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_write.c735 size_t msglen; local
739 msglen = 2000;
741 msglen += tls_client_cert_chain_der_len(conn);
743 msg = os_malloc(msglen);
748 end = msg + msglen;
H A Dtlsv1_server_write.c667 size_t msglen; local
671 msglen = 1000 + tls_server_cert_chain_der_len(conn);
673 msg = os_malloc(msglen);
678 end = msg + msglen;
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_write.c735 size_t msglen; local
739 msglen = 2000;
741 msglen += tls_client_cert_chain_der_len(conn);
743 msg = os_malloc(msglen);
748 end = msg + msglen;
H A Dtlsv1_server_write.c667 size_t msglen; local
671 msglen = 1000 + tls_server_cert_chain_der_len(conn);
673 msg = os_malloc(msglen);
678 end = msg + msglen;
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_write.c735 size_t msglen; local
739 msglen = 2000;
741 msglen += tls_client_cert_chain_der_len(conn);
743 msg = os_malloc(msglen);
748 end = msg + msglen;
H A Dtlsv1_server_write.c667 size_t msglen; local
671 msglen = 1000 + tls_server_cert_chain_der_len(conn);
673 msg = os_malloc(msglen);
678 end = msg + msglen;
/external/wpa_supplicant_6/wpa_supplicant/
H A Dwpas_glue.c127 size_t msglen; local
175 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL);
180 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen);
181 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen);
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_glue.c125 size_t msglen; local
173 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL);
178 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen);
179 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap.c1421 const char *msg, size_t msglen)
1456 tmp = os_malloc(msglen + 3);
1460 os_memcpy(tmp + 1, msg, msglen);
1461 tmp[msglen + 1] = ']';
1462 tmp[msglen + 2] = '\0';
1466 config->pending_req_otp_len = msglen + 3;
1486 #define eap_sm_request(sm, type, msg, msglen) do { } while (0)
1420 eap_sm_request(struct eap_sm *sm, eap_ctrl_req_type type, const char *msg, size_t msglen) argument
/external/bluetooth/bluedroid/udrv/ulinux/
H A Duipc.c723 UINT16 msglen)
727 BTIF_TRACE_DEBUG2("UIPC_Send : ch_id:%d %d bytes", ch_id, msglen);
731 if (write(uipc_main.ch[ch_id].fd, p_buf, msglen) < 0)
722 UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen) argument
/external/quake/quake/src/WinQuake/
H A Dnet_bw.cpp242 static int BW_ioctl(int s, char *msg, int msglen) argument
244 Q_memcpy(lowmem_buffer, msg, msglen);
248 regs.x.cx = msglen;
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c1619 const char *msg, size_t msglen)
1645 tmp = os_malloc(msglen + 3);
1649 os_memcpy(tmp + 1, msg, msglen);
1650 tmp[msglen + 1] = ']';
1651 tmp[msglen + 2] = '\0';
1655 config->pending_req_otp_len = msglen + 3;
1673 #define eap_sm_request(sm, type, msg, msglen) do { } while (0)
1618 eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, const char *msg, size_t msglen) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap.c1619 const char *msg, size_t msglen)
1645 tmp = os_malloc(msglen + 3);
1649 os_memcpy(tmp + 1, msg, msglen);
1650 tmp[msglen + 1] = ']';
1651 tmp[msglen + 2] = '\0';
1655 config->pending_req_otp_len = msglen + 3;
1673 #define eap_sm_request(sm, type, msg, msglen) do { } while (0)
1618 eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, const char *msg, size_t msglen) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap.c1619 const char *msg, size_t msglen)
1645 tmp = os_malloc(msglen + 3);
1649 os_memcpy(tmp + 1, msg, msglen);
1650 tmp[msglen + 1] = ']';
1651 tmp[msglen + 2] = '\0';
1655 config->pending_req_otp_len = msglen + 3;
1673 #define eap_sm_request(sm, type, msg, msglen) do { } while (0)
1618 eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, const char *msg, size_t msglen) argument
/external/openssl/ssl/
H A Ds3_clnt.c2753 size_t msglen; local
2807 msglen=255;
2808 if (EVP_PKEY_encrypt(pkey_ctx,tmp,&msglen,premaster_secret,32)<0) {
2813 if (msglen >= 0x80)
2816 *(p++)= msglen & 0xff;
2817 n=msglen+3;
2821 *(p++)= msglen & 0xff;
2822 n=msglen+2;
2824 memcpy(p, tmp, msglen);

Completed in 640 milliseconds

123