/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
H A D | AuthenticationManager.java | 414 public void handleMessage(byte[] msg, int msglen) throws IOException argument 424 byte[] tmp = new byte[msglen]; 425 System.arraycopy(msg, 0, tmp, 0, msglen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | preauth.c | 142 size_t msglen; local 151 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 155 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 157 ETH_P_RSN_PREAUTH, msg, msglen);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | preauth.c | 132 size_t msglen; local 141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 147 ETH_P_RSN_PREAUTH, msg, msglen);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | preauth.c | 132 size_t msglen; local 141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 147 ETH_P_RSN_PREAUTH, msg, msglen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | preauth.c | 132 size_t msglen; local 141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 147 ETH_P_RSN_PREAUTH, msg, msglen);
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
H A D | pmac_test.c | 31 int msglen; 137 if ((err = pmac_memory(idx, tests[x].key, 16, tests[x].msg, tests[x].msglen, outtag, &len)) != CRYPT_OK) {
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
H A D | KexManager.java | 379 public synchronized void handleMessage(byte[] msg, int msglen) throws IOException argument 420 kip = new PacketKexInit(msg, 0, msglen); 526 PacketKexDhGexGroup dhgexgrp = new PacketKexDhGexGroup(msg, 0, msglen); 537 PacketKexDhGexReply dhgexrpl = new PacketKexDhGexReply(msg, 0, msglen); 593 PacketKexDHReply dhr = new PacketKexDHReply(msg, 0, msglen);
|
/external/ppp/pppd/ |
H A D | eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen 1148 int msglen; local 1176 int msglen; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 672 size_t msglen; local 676 msglen = 1000; 678 msglen += tls_client_cert_chain_der_len(conn); 680 msg = os_malloc(msglen); 685 end = msg + msglen;
|
H A D | tlsv1_server_write.c | 663 size_t msglen; local 667 msglen = 1000 + tls_server_cert_chain_der_len(conn); 669 msg = os_malloc(msglen); 674 end = msg + msglen;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_write.c | 735 size_t msglen; local 739 msglen = 2000; 741 msglen += tls_client_cert_chain_der_len(conn); 743 msg = os_malloc(msglen); 748 end = msg + msglen;
|
H A D | tlsv1_server_write.c | 667 size_t msglen; local 671 msglen = 1000 + tls_server_cert_chain_der_len(conn); 673 msg = os_malloc(msglen); 678 end = msg + msglen;
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_write.c | 735 size_t msglen; local 739 msglen = 2000; 741 msglen += tls_client_cert_chain_der_len(conn); 743 msg = os_malloc(msglen); 748 end = msg + msglen;
|
H A D | tlsv1_server_write.c | 667 size_t msglen; local 671 msglen = 1000 + tls_server_cert_chain_der_len(conn); 673 msg = os_malloc(msglen); 678 end = msg + msglen;
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_write.c | 735 size_t msglen; local 739 msglen = 2000; 741 msglen += tls_client_cert_chain_der_len(conn); 743 msg = os_malloc(msglen); 748 end = msg + msglen;
|
H A D | tlsv1_server_write.c | 667 size_t msglen; local 671 msglen = 1000 + tls_server_cert_chain_der_len(conn); 673 msg = os_malloc(msglen); 678 end = msg + msglen;
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | wpas_glue.c | 127 size_t msglen; local 175 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL); 180 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen); 181 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 125 size_t msglen; local 173 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL); 178 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen); 179 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 1421 const char *msg, size_t msglen) 1456 tmp = os_malloc(msglen + 3); 1460 os_memcpy(tmp + 1, msg, msglen); 1461 tmp[msglen + 1] = ']'; 1462 tmp[msglen + 2] = '\0'; 1466 config->pending_req_otp_len = msglen + 3; 1486 #define eap_sm_request(sm, type, msg, msglen) do { } while (0) 1420 eap_sm_request(struct eap_sm *sm, eap_ctrl_req_type type, const char *msg, size_t msglen) argument
|
/external/bluetooth/bluedroid/udrv/ulinux/ |
H A D | uipc.c | 723 UINT16 msglen) 727 BTIF_TRACE_DEBUG2("UIPC_Send : ch_id:%d %d bytes", ch_id, msglen); 731 if (write(uipc_main.ch[ch_id].fd, p_buf, msglen) < 0) 722 UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen) argument
|
/external/quake/quake/src/WinQuake/ |
H A D | net_bw.cpp | 242 static int BW_ioctl(int s, char *msg, int msglen)
argument 244 Q_memcpy(lowmem_buffer, msg, msglen);
248 regs.x.cx = msglen;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1619 const char *msg, size_t msglen) 1645 tmp = os_malloc(msglen + 3); 1649 os_memcpy(tmp + 1, msg, msglen); 1650 tmp[msglen + 1] = ']'; 1651 tmp[msglen + 2] = '\0'; 1655 config->pending_req_otp_len = msglen + 3; 1673 #define eap_sm_request(sm, type, msg, msglen) do { } while (0) 1618 eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, const char *msg, size_t msglen) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 1619 const char *msg, size_t msglen) 1645 tmp = os_malloc(msglen + 3); 1649 os_memcpy(tmp + 1, msg, msglen); 1650 tmp[msglen + 1] = ']'; 1651 tmp[msglen + 2] = '\0'; 1655 config->pending_req_otp_len = msglen + 3; 1673 #define eap_sm_request(sm, type, msg, msglen) do { } while (0) 1618 eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, const char *msg, size_t msglen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 1619 const char *msg, size_t msglen) 1645 tmp = os_malloc(msglen + 3); 1649 os_memcpy(tmp + 1, msg, msglen); 1650 tmp[msglen + 1] = ']'; 1651 tmp[msglen + 2] = '\0'; 1655 config->pending_req_otp_len = msglen + 3; 1673 #define eap_sm_request(sm, type, msg, msglen) do { } while (0) 1618 eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, const char *msg, size_t msglen) argument
|
/external/openssl/ssl/ |
H A D | s3_clnt.c | 2753 size_t msglen; local 2807 msglen=255; 2808 if (EVP_PKEY_encrypt(pkey_ctx,tmp,&msglen,premaster_secret,32)<0) { 2813 if (msglen >= 0x80) 2816 *(p++)= msglen & 0xff; 2817 n=msglen+3; 2821 *(p++)= msglen & 0xff; 2822 n=msglen+2; 2824 memcpy(p, tmp, msglen);
|