/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
H A D | ebt_ulog.h | 31 size_t data_len; member in struct:ebt_ulog_packet_msg
|
/external/bluetooth/bluedroid/stack/btm/ |
H A D | btm_ble_batchscan.c | 137 ble_batchscan_cb.main_rep_q.data_len[ble_batchscan_cb.main_rep_q.next_idx] = 0; 157 UINT8 data_len) 169 index, report_format, num_records, data_len); 171 if (index < BTM_BLE_BATCH_REP_MAIN_Q_SIZE && data_len > 0 && num_records > 0) 173 len = ble_batchscan_cb.main_rep_q.data_len[index]; 177 p_app_data = GKI_getbuf(len + data_len); 179 memcpy(p_app_data+len, p_data, data_len); 183 ble_batchscan_cb.main_rep_q.data_len[index] += data_len; 187 p_app_data = GKI_getbuf(data_len); 156 btm_ble_batchscan_enq_rep_data(UINT8 report_format, UINT8 num_records, UINT8 *p_data, UINT8 data_len) argument 325 UINT16 data_len = 0; local 805 UINT16 data_len = 0; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 91 u16 data_len, size_t *msg_len, void **data_pos) 95 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 96 __func__, type, data_len); 98 *msg_len = sizeof(*hdr) + data_len; 105 hdr->length = host_to_be16(data_len); 108 os_memcpy(hdr + 1, data, data_len); 110 os_memset(hdr + 1, 0, data_len); 232 size_t data_len, int encrypt) 236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 238 __func__, MAC2STR(addr), (unsigned long) data_len, encryp 90 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 231 auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, size_t data_len, int encrypt) argument [all...] |
/external/chromium_org/content/browser/download/ |
H A D | save_file.cc | 41 size_t data_len) { 42 return file_.AppendDataToFile(data, data_len); 40 AppendDataToFile(const char* data, size_t data_len) argument
|
/external/chromium_org/crypto/ |
H A D | signature_creator_openssl.cc | 31 int data_len, 39 bool success = RSA_sign(NID_sha1, data, data_len, vector_as_array(signature), 29 Sign(RSAPrivateKey* key, const uint8* data, int data_len, std::vector<uint8>* signature) argument
|
/external/chromium_org/net/http/ |
H A D | partial_data.h | 94 // Reads up to |data_len| bytes from the cache and stores them in the provided 99 int CacheRead(disk_cache::Entry* entry, IOBuffer* data, int data_len, 102 // Writes |data_len| bytes to cache. This is basically a wrapper around the 104 int CacheWrite(disk_cache::Entry* entry, IOBuffer* data, int data_len,
|
/external/libpcap/pcap/ |
H A D | usb.h | 92 u_int32_t data_len; /* amount of urb data really present in this event*/ member in struct:_usb_header 117 u_int32_t data_len; /* amount of urb data really present in this event*/ member in struct:_usb_header_mmapped
|
/external/qemu/ |
H A D | gen-skin.py | 35 data_len = len(data) 40 print "static const unsigned char %s[%d] = {" % (data_name, data_len + data_add)
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.c | 97 * @data_len: Length of the data area 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | rc4.c | 17 u8 *data, size_t data_len) 46 for (k = 0; k < data_len; k++) { 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | sha1.c | 96 * @data_len: Length of the data area 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | sha256.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_none.c | 47 u16 proto, const u8 *data, size_t data_len) 78 const u8 *data, size_t data_len) 46 none_driver_send_ether(void *priv, const u8 *dst, const u8 *src, u16 proto, const u8 *data, size_t data_len) argument 77 none_driver_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.c | 97 * @data_len: Length of the data area 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | rc4.c | 17 u8 *data, size_t data_len) 46 for (k = 0; k < data_len; k++) { 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | sha1.c | 96 * @data_len: Length of the data area 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | sha256.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_none.c | 47 u16 proto, const u8 *data, size_t data_len) 78 const u8 *data, size_t data_len) 46 none_driver_send_ether(void *priv, const u8 *dst, const u8 *src, u16 proto, const u8 *data, size_t data_len) argument 77 none_driver_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 97 * @data_len: Length of the data area 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | rc4.c | 17 u8 *data, size_t data_len) 46 for (k = 0; k < data_len; k++) { 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | sha1.c | 96 * @data_len: Length of the data area 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | sha256.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_none.c | 47 u16 proto, const u8 *data, size_t data_len) 78 const u8 *data, size_t data_len) 46 none_driver_send_ether(void *priv, const u8 *dst, const u8 *src, u16 proto, const u8 *data, size_t data_len) argument 77 none_driver_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 39 const u8 *data /* Z */, size_t data_len, 53 vlen[1] = data_len; 74 const u8 *data /* Z */, size_t data_len, 88 vlen[1] = data_len; 116 size_t data_len, mk_len; local 139 data_len = 2 + psk_len + 6 + seed_len; 140 data = os_malloc(data_len); 154 data, data_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 348 size_t data_len; local 38 eap_gpsk_gkdf_cmac(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument 73 eap_gpsk_gkdf_sha256(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 39 const u8 *data /* Z */, size_t data_len, 53 vlen[1] = data_len; 74 const u8 *data /* Z */, size_t data_len, 88 vlen[1] = data_len; 116 size_t data_len, mk_len; local 139 data_len = 2 + psk_len + 6 + seed_len; 140 data = os_malloc(data_len); 154 data, data_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 348 size_t data_len; local 38 eap_gpsk_gkdf_cmac(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument 73 eap_gpsk_gkdf_sha256(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument [all...] |