/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 640 * @data_len: Extension payload length 644 const u8 *data, size_t data_len) 653 if (data == NULL || data_len == 0) 656 pos = conn->client_hello_ext = os_malloc(6 + data_len); 660 WPA_PUT_BE16(pos, 4 + data_len); 664 WPA_PUT_BE16(pos, data_len); 666 os_memcpy(pos, data, data_len); 667 conn->client_hello_ext_len = 6 + data_len; 643 tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | drv_callbacks.c | 703 const u8 *data, size_t data_len) 718 ieee802_1x_receive(hapd, src, data, data_len); 824 data->ft_rrb_rx.data, data->ft_rrb_rx.data_len); 835 data->tx_status.data_len, 842 data->tx_status.data_len, 850 data->eapol_tx_status.data_len, 882 data->eapol_rx.data_len); 702 hostapd_event_eapol_rx(struct hostapd_data *hapd, const u8 *src, const u8 *data, size_t data_len) argument
|
H A D | wpa_auth_glue.c | 276 const u8 *data, size_t data_len, 287 return hostapd_drv_hapd_send_eapol(hapd, addr, data, data_len, 347 size_t data_len; member in struct:wpa_auth_ft_iface_iter_data 370 idata->data, idata->data_len); 382 const u8 *data, size_t data_len) 396 idata.data_len = data_len; 401 return data_len; 408 data, data_len); 412 buf = os_malloc(sizeof(*buf) + data_len); 275 hostapd_wpa_auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, size_t data_len, int encrypt) argument 381 hostapd_wpa_auth_send_ether(void *ctx, const u8 *dst, u16 proto, const u8 *data, size_t data_len) argument 428 hostapd_wpa_auth_send_ft_action(void *ctx, const u8 *dst, const u8 *data, size_t data_len) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_internal.c | 560 size_t data_len) 565 data, data_len); 558 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.c | 32 const u8 **data, size_t *data_len) 48 *data_len = blob->len; 31 eap_tls_check_blob(struct eap_sm *sm, const char **name, const u8 **data, size_t *data_len) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 35 *pos++ = RSN_SELECTOR_LEN + data_len; 38 os_memcpy(pos, data, data_len); 39 pos += data_len;
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 640 * @data_len: Extension payload length 644 const u8 *data, size_t data_len) 653 if (data == NULL || data_len == 0) 656 pos = conn->client_hello_ext = os_malloc(6 + data_len); 660 WPA_PUT_BE16(pos, 4 + data_len); 664 WPA_PUT_BE16(pos, data_len); 666 os_memcpy(pos, data, data_len); 667 conn->client_hello_ext_len = 6 + data_len; 643 tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | preauth_test.c | 48 const void *data, u16 data_len, 53 *msg_len = sizeof(*hdr) + data_len; 60 hdr->length = htons(data_len); 63 os_memcpy(hdr + 1, data, data_len); 65 os_memset(hdr + 1, 0, data_len); 75 const void *data, u16 data_len, 78 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); 47 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 74 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | drv_callbacks.c | 703 const u8 *data, size_t data_len) 718 ieee802_1x_receive(hapd, src, data, data_len); 824 data->ft_rrb_rx.data, data->ft_rrb_rx.data_len); 835 data->tx_status.data_len, 842 data->tx_status.data_len, 850 data->eapol_tx_status.data_len, 882 data->eapol_rx.data_len); 702 hostapd_event_eapol_rx(struct hostapd_data *hapd, const u8 *src, const u8 *data, size_t data_len) argument
|
H A D | wpa_auth_glue.c | 276 const u8 *data, size_t data_len, 287 return hostapd_drv_hapd_send_eapol(hapd, addr, data, data_len, 347 size_t data_len; member in struct:wpa_auth_ft_iface_iter_data 370 idata->data, idata->data_len); 382 const u8 *data, size_t data_len) 396 idata.data_len = data_len; 401 return data_len; 408 data, data_len); 412 buf = os_malloc(sizeof(*buf) + data_len); 275 hostapd_wpa_auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, size_t data_len, int encrypt) argument 381 hostapd_wpa_auth_send_ether(void *ctx, const u8 *dst, u16 proto, const u8 *data, size_t data_len) argument 428 hostapd_wpa_auth_send_ft_action(void *ctx, const u8 *dst, const u8 *data, size_t data_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_internal.c | 560 size_t data_len) 565 data, data_len); 558 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.c | 32 const u8 **data, size_t *data_len) 48 *data_len = blob->len; 31 eap_tls_check_blob(struct eap_sm *sm, const char **name, const u8 **data, size_t *data_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 35 *pos++ = RSN_SELECTOR_LEN + data_len; 38 os_memcpy(pos, data, data_len); 39 pos += data_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 640 * @data_len: Extension payload length 644 const u8 *data, size_t data_len) 653 if (data == NULL || data_len == 0) 656 pos = conn->client_hello_ext = os_malloc(6 + data_len); 660 WPA_PUT_BE16(pos, 4 + data_len); 664 WPA_PUT_BE16(pos, data_len); 666 os_memcpy(pos, data, data_len); 667 conn->client_hello_ext_len = 6 + data_len; 643 tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 95 u16 data_len, size_t *msg_len, void **data_pos) 99 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 100 __func__, type, data_len); 102 *msg_len = sizeof(*hdr) + data_len; 109 hdr->length = host_to_be16(data_len); 112 os_memcpy(hdr + 1, data, data_len); 114 os_memset(hdr + 1, 0, data_len); 236 size_t data_len, int encrypt) 240 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 242 __func__, MAC2STR(addr), (unsigned long) data_len, encryp 94 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 235 auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, size_t data_len, int encrypt) argument [all...] |
/external/bluetooth/bluedroid/stack/hcic/ |
H A D | hciblecmds.c | 215 BOOLEAN btsnd_hcic_ble_set_adv_data (UINT8 data_len, UINT8 *p_data) argument 233 if (p_data != NULL && data_len > 0) 235 if (data_len > HCIC_PARAM_SIZE_BLE_WRITE_ADV_DATA) 236 data_len = HCIC_PARAM_SIZE_BLE_WRITE_ADV_DATA; 238 UINT8_TO_STREAM (pp, data_len); 240 ARRAY_TO_STREAM (pp, p_data, data_len); 246 BOOLEAN btsnd_hcic_ble_set_scan_rsp_data (UINT8 data_len, UINT8 *p_scan_rsp) argument 264 if (p_scan_rsp != NULL && data_len > 0) 267 if (data_len > HCIC_PARAM_SIZE_BLE_WRITE_SCAN_RSP ) 268 data_len [all...] |
/external/bluetooth/bluedroid/stack/include/ |
H A D | sdp_api.h | 89 UINT16 data_len; member in struct:__anon1451
|
/external/chromium/net/disk_cache/ |
H A D | sparse_control.cc | 213 int data_len = entry_->GetDataSize(kSparseIndex); local 214 if (!data_len) { 217 rv = OpenSparseEntry(data_len); 326 int data_len = entry->GetDataSize(kSparseIndex); local 327 if (data_len < static_cast<int>(sizeof(SparseData)) || 331 int map_len = data_len - sizeof(SparseHeader); 350 deleter, &ChildrenDeleter::Start, buffer, data_len)); 353 deleter, &ChildrenDeleter::ReadData, address, data_len)); 385 int SparseControl::OpenSparseEntry(int data_len) { argument 386 if (data_len < static_cas [all...] |
/external/chromium/net/server/ |
H A D | http_server.cc | 287 int data_len = connection->recv_data_.length(); local 292 while (pos < data_len) {
|
/external/chromium/third_party/libjingle/source/talk/base/ |
H A D | httpbase.cc | 328 virtual StreamResult Write(const void* data, size_t data_len, argument
|
H A D | schanneladapter.cc | 351 size_t data_len = 0, extra_len = 0; local 354 data_len += in_buf[i].cbBuffer; 363 if ((data_len == 0) && (inbuf[0] == 0x15)) {
|
H A D | stream.h | 75 // data_len bytes stored in data. The variables read and write are set only 89 virtual StreamResult Write(const void* data, size_t data_len, 131 // The buffer contains data_len bytes. NULL is returned if no data is 137 virtual const void* GetReadData(size_t* data_len) { return NULL; } argument 154 // Write data_len bytes found in data, circumventing any throttling which 164 //virtual bool ForceWrite(const void* data, size_t data_len, int* error) { 211 StreamResult WriteAll(const void* data, size_t data_len, 256 virtual StreamResult Write(const void* data, size_t data_len, argument 258 return stream_->Write(data, data_len, written, error); 270 virtual const void* GetReadData(size_t* data_len) { [all...] |
/external/chromium_org/content/child/ |
H A D | resource_dispatcher.cc | 430 int data_len) { 439 request_info->peer->OnDownloadedData(data_len); 428 OnDownloadedData(const IPC::Message& message, int request_id, int data_len) argument
|
/external/chromium_org/net/disk_cache/ |
H A D | sparse_control.cc | 222 int data_len = entry_->GetDataSize(kSparseIndex); local 223 if (!data_len) { 226 rv = OpenSparseEntry(data_len); 336 int data_len = entry->GetDataSize(kSparseIndex); local 337 if (data_len < static_cast<int>(sizeof(SparseData)) || 341 int map_len = data_len - sizeof(SparseHeader); 362 base::Bind(&ChildrenDeleter::Start, deleter, buffer, data_len)); 366 base::Bind(&ChildrenDeleter::ReadData, deleter, address, data_len)); 398 int SparseControl::OpenSparseEntry(int data_len) { argument 399 if (data_len < static_cas [all...] |
/external/chromium_org/net/disk_cache/v3/ |
H A D | sparse_control_v3.cc | 317 int data_len = entry->GetDataSize(kSparseIndex); local 318 if (data_len < static_cast<int>(sizeof(SparseData)) || 322 int map_len = data_len - sizeof(SparseHeader); 343 base::Bind(&ChildrenDeleter::Start, deleter, buffer, data_len)); 347 base::Bind(&ChildrenDeleter::ReadData, deleter, address, data_len)); 362 int data_len = entry_->GetDataSize(kSparseIndex); local 363 if (!data_len) { 366 rv = OpenSparseEntry(data_len); 402 int SparseControl::OpenSparseEntry(int data_len) { argument 403 if (data_len < static_cas [all...] |