Searched defs:payload_len (Results 26 - 40 of 40) sorted by relevance

12

/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gpsk.c256 size_t payload_len)
269 end = payload + payload_len;
564 size_t payload_len)
576 end = payload + payload_len;
251 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
559 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_pwd.c186 const u8 *payload, size_t payload_len)
196 if (payload_len < sizeof(struct eap_pwd_id)) {
214 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id));
220 data->id_server_len = payload_len - sizeof(struct eap_pwd_id);
268 const u8 *payload, size_t payload_len)
460 const u8 *payload, size_t payload_len)
183 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
265 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
457 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_tls_common.c19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument
24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len,
26 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
H A Dikev2.c658 u8 *payload, size_t payload_len)
665 payload_len) < 0) {
656 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/libnfc-nci/src/nfc/ndef/
H A Dndef_utils.c85 UINT32 payload_len; local
116 payload_len = *p_rec++;
123 BE_STREAM_TO_UINT32 (payload_len, p_rec);
180 if ( (type_len != 0) || (id_len != 0) || (payload_len != 0) )
191 p_rec += (payload_len + type_len + id_len);
225 UINT32 payload_len; local
241 payload_len = *p_rec++;
243 BE_STREAM_TO_UINT32 (payload_len, p_rec);
252 p_rec += (payload_len + type_len + id_len);
273 UINT32 payload_len; local
324 UINT32 payload_len; local
369 UINT32 payload_len; local
420 UINT32 payload_len; local
468 UINT32 payload_len; local
525 UINT32 payload_len; local
587 UINT32 payload_len; local
644 UINT32 payload_len; local
780 UINT32 payload_len; local
836 NDEF_MsgAddRec(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, UINT8 tnf, UINT8 *p_type, UINT8 type_len, UINT8 *p_id, UINT8 id_len, UINT8 *p_payload, UINT32 payload_len) argument
932 NDEF_MsgInsertRec(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, INT32 index, UINT8 tnf, UINT8 *p_type, UINT8 type_len, UINT8 *p_id, UINT8 id_len, UINT8 *p_payload, UINT32 payload_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.c658 u8 *payload, size_t payload_len)
665 payload_len) < 0) {
656 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pwd.c570 const u8 *payload, size_t payload_len)
574 if (payload_len < sizeof(struct eap_pwd_id)) {
588 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
593 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id);
621 const u8 *payload, size_t payload_len)
736 const u8 *payload, size_t payload_len)
568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
H A Dikev2.c690 u8 *payload, size_t payload_len)
697 payload_len) < 0) {
688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.c658 u8 *payload, size_t payload_len)
665 payload_len) < 0) {
656 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pwd.c570 const u8 *payload, size_t payload_len)
574 if (payload_len < sizeof(struct eap_pwd_id)) {
588 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
593 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id);
621 const u8 *payload, size_t payload_len)
736 const u8 *payload, size_t payload_len)
568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
H A Dikev2.c690 u8 *payload, size_t payload_len)
697 payload_len) < 0) {
688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_pwd.c570 const u8 *payload, size_t payload_len)
574 if (payload_len < sizeof(struct eap_pwd_id)) {
588 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
593 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id);
621 const u8 *payload, size_t payload_len)
736 const u8 *payload, size_t payload_len)
568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
H A Dikev2.c690 u8 *payload, size_t payload_len)
697 payload_len) < 0) {
688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/bluetooth/bluedroid/stack/avdt/
H A Davdt_scb_act.c421 UINT32 payload_len; /* payload length */ local
602 payload_len = (UINT32)(p_scb->p_media_buf + p_scb->frag_off - pad_len - p_payload);
605 p_payload - p_scb->p_media_buf,payload_len);
611 payload_len, time_stamp, seq, m_pt, marker); local
/external/kernel-headers/original/linux/
H A Dipv6.h123 __be16 payload_len; member in struct:ipv6hdr

Completed in 214 milliseconds

12