/external/chromium/net/socket/ |
H A D | socket_test_util.h | 69 MockRead() : async(false), result(0), data(NULL), data_len(0), 74 data_len(0), sequence_number(0), time_stamp(base::Time::Now()) { } 78 data(NULL), data_len(0), sequence_number(seq), 83 data_len(strlen(data)), sequence_number(0), 88 data_len(strlen(data)), sequence_number(0), 92 MockRead(bool async, const char* data, int data_len) : async(async), argument 93 result(0), data(data), data_len(data_len), sequence_number(0), 98 result(0), data(data), data_len(strlen(data)), sequence_number(seq), 102 MockRead(bool async, const char* data, int data_len, in argument 109 int data_len; member in struct:net::MockRead [all...] |
/external/chromium/net/spdy/ |
H A D | spdy_framer.cc | 417 size_t data_len) { 424 size_t process_bytes = std::min(data_len, remaining_control_payload_); 454 return data_len; 462 size_t data_len) { 464 size_t original_data_len = data_len; 477 &data_len, 486 size_t bytes_to_send = std::min(data_len, remaining_control_payload_); 490 data_len -= bytes_to_send; 509 return original_data_len - data_len; 416 NewProcessControlFrameHeaderBlock(const char* data, size_t data_len) argument 461 ProcessControlFrameHeaderBlock(const char* data, size_t data_len) argument
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | stream.cc | 66 StreamResult StreamInterface::WriteAll(const void* data, size_t data_len, argument 70 while (total_written < data_len) { 72 data_len - total_written, ¤t_written, error); 212 StreamResult StreamTap::Write(const void* data, size_t data_len, argument 218 StreamResult res = StreamAdapterInterface::Write(data, data_len, 332 StreamResult NullStream::Write(const void* data, size_t data_len, argument 334 if (written) *written = data_len; 410 StreamResult FileStream::Write(const void* data, size_t data_len, argument 414 size_t result = fwrite(data, 1, data_len, file_); 415 if ((result == 0) && (data_len > 897 Write(const void* data, size_t data_len, size_t* written, int* error) argument 957 Write(const void* data, size_t data_len, size_t* written, int* error) argument [all...] |
/external/dbus/dbus/ |
H A D | dbus-marshal-basic.c | 705 int data_len, /* doesn't include nul if any */ 715 _dbus_warn ("insert_at = %d string len = %d data_len = %d\n", 716 insert_at, _dbus_string_get_length (str), data_len); 719 value_len = data_len; 721 value_len = data_len + 1; /* value has a nul */ 729 _dbus_assert (data_len <= DBUS_MAXIMUM_SIGNATURE_LENGTH); 730 _dbus_assert (data_len <= 255); /* same as max sig len right now */ 732 if (!_dbus_string_insert_byte (str, pos, data_len)) 739 if (!marshal_4_octets (str, pos, data_len, 701 marshal_len_followed_by_bytes(int marshal_as, DBusString *str, int insert_at, const unsigned char *value, int data_len, int byte_order, int *pos_after) argument
|
/external/openssh/ |
H A D | serverloop.c | 904 u_int data_len; local 910 data = packet_get_string(&data_len); 912 buffer_append(&stdin_buffer, data, data_len); 913 memset(data, 0, data_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 1253 size_t data_len) 1251 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_ralink.c | 255 const u8 *data, size_t data_len) 263 if (data_len < 8) { 265 "Event (len=%lu)", (unsigned long) data_len); 279 if (data_len < 8 + pmkid->NumCandidates * sizeof(PMKID_CANDIDATE)) { 254 wpa_driver_ralink_event_pmkid(struct wpa_driver_ralink_data *drv, const u8 *data, size_t data_len) argument
|
H A D | driver_test.c | 510 const u8 *data, size_t data_len) 514 if (data_len > 14) { 518 data_len -= 14; 520 wpa_supplicant_rx_eapol(drv->ctx, src, data, data_len); 527 const u8 *data, size_t data_len) 532 wpa_supplicant_sta_rx(drv->ctx, data, data_len, &rx_status); 837 const u8 *data, size_t data_len) 849 wpa_hexdump(MSG_MSGDUMP, "test_send_eapol TX frame", data, data_len); 856 msg_len = 6 + sizeof(eth) + data_len; 862 os_memcpy(msg + 6 + sizeof(eth), data, data_len); 507 wpa_driver_test_eapol(struct wpa_driver_test_data *drv, struct sockaddr *from, socklen_t fromlen, const u8 *data, size_t data_len) argument 524 wpa_driver_test_mlme(struct wpa_driver_test_data *drv, struct sockaddr *from, socklen_t fromlen, const u8 *data, size_t data_len) argument 836 wpa_driver_test_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument 990 wpa_driver_test_send_mlme(void *priv, const u8 *data, size_t data_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_fast.c | 1124 static int eap_fast_parse_tlvs(u8 *data, size_t data_len, argument 1133 end = data + data_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.c | 412 const u8 *data, size_t data_len) 417 if (data_len > RADIUS_MAX_ATTR_LEN) { 419 (unsigned long) data_len); 423 buf_needed = msg->buf_used + sizeof(*attr) + data_len; 443 attr->length = sizeof(*attr) + data_len; 444 if (data_len > 0) 445 os_memcpy(attr + 1, data, data_len); 447 msg->buf_used += sizeof(*attr) + data_len; 521 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) argument 524 size_t left = data_len; 411 radius_msg_add_attr(struct radius_msg *msg, u8 type, const u8 *data, size_t data_len) argument 1046 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 1433 size_t plen, data_len, extra_len; local 1461 data_len = plen + sizeof(*hdr); 1493 if (data_len < len) { 1495 "802.1X data", (unsigned long) len - data_len); 1604 wpa_supplicant_verify_eapol_key_mic(sm, key, ver, tmp, data_len)) 1609 peerkey_verify_eapol_key_mic(sm, peerkey, key, ver, tmp, data_len)) 1613 extra_len = data_len - sizeof(*hdr) - sizeof(*key);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ft.c | 26 const u8 *data, size_t data_len) 32 data, data_len); 37 const u8 *dst, const u8 *data, size_t data_len) 42 data, data_len); 1247 const u8 *data, size_t data_len) 1257 if (data_len < sizeof(*frame)) 1331 const u8 *data, size_t data_len) 1339 if (data_len < sizeof(*frame)) 1397 const u8 *data, size_t data_len) 1407 if (data_len < sizeo 25 wpa_ft_rrb_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) argument 36 wpa_ft_action_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) argument 1245 wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) argument 1329 wpa_ft_rrb_rx_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) argument 1395 wpa_ft_rrb_rx_push(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) argument 1469 wpa_ft_rrb_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 1142 size_t data_len) 1140 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_bsd.c | 524 bsd_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, argument 529 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", data, data_len); 532 data_len);
|
H A D | driver_hostap.c | 134 event.tx_status.data_len = len; 144 size_t data_len = len; local 181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); 192 event.rx_mgmt.frame_len = data_len; 200 handle_data(drv, buf, data_len, stype); 283 size_t data_len, int encrypt, const u8 *own_addr, 292 len = sizeof(*hdr) + sizeof(rfc1042_header) + 2 + data_len; 314 memcpy(pos, data, data_len); 282 hostap_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument
|
H A D | driver_madwifi.c | 1081 madwifi_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, argument 1097 len = data_len + sizeof(struct l2_ethhdr); 1110 memcpy(eth+1, data, data_len);
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 582 const u8 *data, size_t data_len) 587 if (data_len > RADIUS_MAX_ATTR_LEN) { 589 (unsigned long) data_len); 593 buf_needed = sizeof(*attr) + data_len; 604 attr->length = sizeof(*attr) + data_len; 605 wpabuf_put_data(msg->buf, data, data_len); 686 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) argument 689 size_t left = data_len; 1211 const u8 *data, size_t data_len, 1220 if (data_len > 12 581 radius_msg_add_attr(struct radius_msg *msg, u8 type, const u8 *data, size_t data_len) argument 1210 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_i.h | 194 const void *data, u16 data_len, 198 return sm->ctx->alloc_eapol(sm->ctx->ctx, type, data, data_len, 193 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ft.c | 26 const u8 *data, size_t data_len) 32 data, data_len); 37 const u8 *dst, const u8 *data, size_t data_len) 42 data, data_len); 1247 const u8 *data, size_t data_len) 1257 if (data_len < sizeof(*frame)) 1331 const u8 *data, size_t data_len) 1339 if (data_len < sizeof(*frame)) 1397 const u8 *data, size_t data_len) 1407 if (data_len < sizeo 25 wpa_ft_rrb_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) argument 36 wpa_ft_action_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) argument 1245 wpa_ft_rrb_rx_pull(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) argument 1329 wpa_ft_rrb_rx_resp(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) argument 1395 wpa_ft_rrb_rx_push(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) argument 1469 wpa_ft_rrb_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 1142 size_t data_len) 1140 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_bsd.c | 524 bsd_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, argument 529 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", data, data_len); 532 data_len);
|
H A D | driver_hostap.c | 134 event.tx_status.data_len = len; 144 size_t data_len = len; local 181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); 192 event.rx_mgmt.frame_len = data_len; 200 handle_data(drv, buf, data_len, stype); 283 size_t data_len, int encrypt, const u8 *own_addr, 292 len = sizeof(*hdr) + sizeof(rfc1042_header) + 2 + data_len; 314 memcpy(pos, data, data_len); 282 hostap_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument
|
H A D | driver_madwifi.c | 1081 madwifi_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, argument 1097 len = data_len + sizeof(struct l2_ethhdr); 1110 memcpy(eth+1, data, data_len);
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 582 const u8 *data, size_t data_len) 587 if (data_len > RADIUS_MAX_ATTR_LEN) { 589 (unsigned long) data_len); 593 buf_needed = sizeof(*attr) + data_len; 604 attr->length = sizeof(*attr) + data_len; 605 wpabuf_put_data(msg->buf, data, data_len); 686 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) argument 689 size_t left = data_len; 1211 const u8 *data, size_t data_len, 1220 if (data_len > 12 581 radius_msg_add_attr(struct radius_msg *msg, u8 type, const u8 *data, size_t data_len) argument 1210 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_i.h | 194 const void *data, u16 data_len, 198 return sm->ctx->alloc_eapol(sm->ctx->ctx, type, data, data_len, 193 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|