/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 91 u16 data_len, size_t *msg_len, void **data_pos) 95 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 96 __func__, type, data_len); 98 *msg_len = sizeof(*hdr) + data_len; 105 hdr->length = host_to_be16(data_len); 108 os_memcpy(hdr + 1, data, data_len); 110 os_memset(hdr + 1, 0, data_len); 232 size_t data_len, int encrypt) 236 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 238 __func__, MAC2STR(addr), (unsigned long) data_len, encryp 90 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 231 auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, size_t data_len, int encrypt) argument [all...] |
/external/chromium_org/content/browser/download/ |
H A D | save_file.cc | 41 size_t data_len) { 42 return file_.AppendDataToFile(data, data_len); 40 AppendDataToFile(const char* data, size_t data_len) argument
|
/external/chromium_org/net/http/ |
H A D | partial_data.h | 94 // Reads up to |data_len| bytes from the cache and stores them in the provided 99 int CacheRead(disk_cache::Entry* entry, IOBuffer* data, int data_len, 102 // Writes |data_len| bytes to cache. This is basically a wrapper around the 104 int CacheWrite(disk_cache::Entry* entry, IOBuffer* data, int data_len,
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | hmac.h | 75 /* HMAC calculates the HMAC of |data_len| bytes of |data|, using the given key 81 size_t data_len, uint8_t *out, 103 /* HMAC_Update hashes |data_len| bytes from |data| into the current HMAC 106 size_t data_len);
|
/external/libpcap/pcap/ |
H A D | usb.h | 92 u_int32_t data_len; /* amount of urb data really present in this event*/ member in struct:_usb_header 117 u_int32_t data_len; /* amount of urb data really present in this event*/ member in struct:_usb_header_mmapped
|
/external/qemu/ |
H A D | gen-skin.py | 35 data_len = len(data) 40 print "static const unsigned char %s[%d] = {" % (data_name, data_len + data_add)
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md5.c | 97 * @data_len: Length of the data area 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | rc4.c | 17 u8 *data, size_t data_len) 46 for (k = 0; k < data_len; k++) { 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | sha1.c | 96 * @data_len: Length of the data area 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | sha256.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_none.c | 47 u16 proto, const u8 *data, size_t data_len) 78 const u8 *data, size_t data_len) 46 none_driver_send_ether(void *priv, const u8 *dst, const u8 *src, u16 proto, const u8 *data, size_t data_len) argument 77 none_driver_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md5.c | 97 * @data_len: Length of the data area 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | rc4.c | 17 u8 *data, size_t data_len) 46 for (k = 0; k < data_len; k++) { 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | sha1.c | 96 * @data_len: Length of the data area 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | sha256.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_none.c | 47 u16 proto, const u8 *data, size_t data_len) 78 const u8 *data, size_t data_len) 46 none_driver_send_ether(void *priv, const u8 *dst, const u8 *src, u16 proto, const u8 *data, size_t data_len) argument 77 none_driver_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5.c | 97 * @data_len: Length of the data area 101 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 104 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | rc4.c | 17 u8 *data, size_t data_len) 46 for (k = 0; k < data_len; k++) { 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
H A D | sha1.c | 96 * @data_len: Length of the data area 100 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 103 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | sha256.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_none.c | 47 u16 proto, const u8 *data, size_t data_len) 78 const u8 *data, size_t data_len) 46 none_driver_send_ether(void *priv, const u8 *dst, const u8 *src, u16 proto, const u8 *data, size_t data_len) argument 77 none_driver_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 39 const u8 *data /* Z */, size_t data_len, 53 vlen[1] = data_len; 74 const u8 *data /* Z */, size_t data_len, 88 vlen[1] = data_len; 116 size_t data_len, mk_len; local 139 data_len = 2 + psk_len + 6 + seed_len; 140 data = os_malloc(data_len); 154 data, data_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 348 size_t data_len; local 38 eap_gpsk_gkdf_cmac(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument 73 eap_gpsk_gkdf_sha256(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 39 const u8 *data /* Z */, size_t data_len, 53 vlen[1] = data_len; 74 const u8 *data /* Z */, size_t data_len, 88 vlen[1] = data_len; 116 size_t data_len, mk_len; local 139 data_len = 2 + psk_len + 6 + seed_len; 140 data = os_malloc(data_len); 154 data, data_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 348 size_t data_len; local 38 eap_gpsk_gkdf_cmac(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument 73 eap_gpsk_gkdf_sha256(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 39 const u8 *data /* Z */, size_t data_len, 53 vlen[1] = data_len; 74 const u8 *data /* Z */, size_t data_len, 88 vlen[1] = data_len; 116 size_t data_len, mk_len; local 139 data_len = 2 + psk_len + 6 + seed_len; 140 data = os_malloc(data_len); 154 data, data_len); 156 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { 348 size_t data_len; local 38 eap_gpsk_gkdf_cmac(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument 73 eap_gpsk_gkdf_sha256(const u8 *psk , const u8 *data , size_t data_len, u8 *buf, size_t len ) argument [all...] |
/external/chromium_org/net/quic/ |
H A D | quic_packet_generator_test.cc | 466 size_t data_len = 2 * kDefaultMaxPacketSize + 100; local 468 generator_.ConsumeData(3, CreateData(data_len), 0, true, 470 EXPECT_EQ(data_len, consumed.bytes_consumed); 499 size_t data_len = 1 * kDefaultMaxPacketSize + 100; local 501 generator_.ConsumeData(3, CreateData(data_len), 0, true, 503 EXPECT_EQ(data_len, consumed.bytes_consumed); 597 size_t data_len = 3 * kDefaultMaxPacketSize + 1; local 599 7, CreateData(data_len), 0, true, MUST_FEC_PROTECT, NULL); 600 EXPECT_EQ(data_len, consumed.bytes_consumed); 658 size_t data_len local 768 size_t data_len = kDefaultMaxPacketSize; local 791 size_t data_len = kDefaultMaxPacketSize; local 840 size_t data_len = kDefaultMaxPacketSize; local 934 size_t data_len = kDefaultMaxPacketSize + 100; local [all...] |