/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 256 size_t payload_len) 269 end = payload + payload_len; 564 size_t payload_len) 576 end = payload + payload_len; 251 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 559 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_pwd.c | 186 const u8 *payload, size_t payload_len) 196 if (payload_len < sizeof(struct eap_pwd_id)) { 214 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 220 data->id_server_len = payload_len - sizeof(struct eap_pwd_id); 268 const u8 *payload, size_t payload_len) 460 const u8 *payload, size_t payload_len) 183 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 265 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 457 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 26 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
H A D | ikev2.c | 658 u8 *payload, size_t payload_len) 665 payload_len) < 0) { 656 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/libnfc-nci/src/nfc/ndef/ |
H A D | ndef_utils.c | 85 UINT32 payload_len; local 116 payload_len = *p_rec++; 123 BE_STREAM_TO_UINT32 (payload_len, p_rec); 180 if ( (type_len != 0) || (id_len != 0) || (payload_len != 0) ) 191 p_rec += (payload_len + type_len + id_len); 225 UINT32 payload_len; local 241 payload_len = *p_rec++; 243 BE_STREAM_TO_UINT32 (payload_len, p_rec); 252 p_rec += (payload_len + type_len + id_len); 273 UINT32 payload_len; local 324 UINT32 payload_len; local 369 UINT32 payload_len; local 420 UINT32 payload_len; local 468 UINT32 payload_len; local 525 UINT32 payload_len; local 587 UINT32 payload_len; local 644 UINT32 payload_len; local 780 UINT32 payload_len; local 836 NDEF_MsgAddRec(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, UINT8 tnf, UINT8 *p_type, UINT8 type_len, UINT8 *p_id, UINT8 id_len, UINT8 *p_payload, UINT32 payload_len) argument 932 NDEF_MsgInsertRec(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, INT32 index, UINT8 tnf, UINT8 *p_type, UINT8 type_len, UINT8 *p_id, UINT8 id_len, UINT8 *p_payload, UINT32 payload_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 658 u8 *payload, size_t payload_len) 665 payload_len) < 0) { 656 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pwd.c | 570 const u8 *payload, size_t payload_len) 574 if (payload_len < sizeof(struct eap_pwd_id)) { 588 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 593 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 621 const u8 *payload, size_t payload_len) 736 const u8 *payload, size_t payload_len) 568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
|
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 658 u8 *payload, size_t payload_len) 665 payload_len) < 0) { 656 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 570 const u8 *payload, size_t payload_len) 574 if (payload_len < sizeof(struct eap_pwd_id)) { 588 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 593 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 621 const u8 *payload, size_t payload_len) 736 const u8 *payload, size_t payload_len) 568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
|
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 570 const u8 *payload, size_t payload_len) 574 if (payload_len < sizeof(struct eap_pwd_id)) { 588 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 593 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 621 const u8 *payload, size_t payload_len) 736 const u8 *payload, size_t payload_len) 568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
|
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/bluetooth/bluedroid/stack/avdt/ |
H A D | avdt_scb_act.c | 421 UINT32 payload_len; /* payload length */ local 602 payload_len = (UINT32)(p_scb->p_media_buf + p_scb->frag_off - pad_len - p_payload); 605 p_payload - p_scb->p_media_buf,payload_len); 611 payload_len, time_stamp, seq, m_pt, marker); local
|
/external/kernel-headers/original/linux/ |
H A D | ipv6.h | 123 __be16 payload_len; member in struct:ipv6hdr
|