/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pwd.c | 216 const u8 *payload, size_t payload_len) 226 if (payload_len < sizeof(struct eap_pwd_id)) { 244 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 250 data->id_server_len = payload_len - sizeof(struct eap_pwd_id); 298 const u8 *payload, size_t payload_len) 494 const u8 *payload, size_t payload_len) 213 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 295 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 491 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_gpsk.c | 279 size_t payload_len) 292 end = payload + payload_len; 588 size_t payload_len) 600 end = payload + payload_len; 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
H A D | ikev2.c | 624 u8 *payload, size_t payload_len) 631 payload_len) < 0) { 622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/chromium_org/ipc/ |
H A D | ipc_channel_posix.cc | 921 unsigned payload_len = cmsg->cmsg_len - CMSG_LEN(0); local 922 DCHECK_EQ(0U, payload_len % sizeof(int)); 924 unsigned num_file_descriptors = payload_len / 4;
|
/external/libnfc-nci/halimpl/bcm2079x/hal/hal/ |
H A D | nfc_hal_nci.c | 530 UINT8 payload_len; local 551 payload_len = *p++; 585 if ((nfc_hal_cb.max_rf_credits) && (payload_len > 5))
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pwd.c | 579 const u8 *payload, size_t payload_len) 583 if (payload_len < sizeof(struct eap_pwd_id)) { 597 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 602 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 631 const u8 *payload, size_t payload_len) 746 const u8 *payload, size_t payload_len) 577 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 630 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 745 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
|
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 579 const u8 *payload, size_t payload_len) 583 if (payload_len < sizeof(struct eap_pwd_id)) { 597 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 602 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 631 const u8 *payload, size_t payload_len) 746 const u8 *payload, size_t payload_len) 577 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 630 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 745 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
|
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 579 const u8 *payload, size_t payload_len) 583 if (payload_len < sizeof(struct eap_pwd_id)) { 597 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 602 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 631 const u8 *payload, size_t payload_len) 746 const u8 *payload, size_t payload_len) 577 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 630 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 745 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
|
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/chromium_org/net/quic/ |
H A D | quic_headers_stream.cc | 148 size_t payload_len,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gpsk.c | 279 size_t payload_len) 292 end = payload + payload_len; 588 size_t payload_len) 600 end = payload + payload_len; 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
H A D | ikev2.c | 624 u8 *payload, size_t payload_len) 631 payload_len) < 0) { 622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gpsk.c | 279 size_t payload_len) 292 end = payload + payload_len; 588 size_t payload_len) 600 end = payload + payload_len; 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
H A D | ikev2.c | 624 u8 *payload, size_t payload_len) 631 payload_len) < 0) { 622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/chromium_org/net/spdy/ |
H A D | spdy_framer.cc | 2401 const size_t payload_len = local 2406 payload_len, 2442 const size_t payload_len = GetSerializedLength( local 2446 payload_len, 2679 const size_t payload_len = local 2684 payload_len, 2756 const size_t payload_len = local 2761 payload_len,
|
H A D | spdy_framer.h | 313 // |payload_len| is the uncompressed payload size. 317 size_t payload_len, 315 OnSendCompressedFrame(SpdyStreamId stream_id, SpdyFrameType type, size_t payload_len, size_t frame_len) argument
|
H A D | spdy_session.h | 859 size_t payload_len,
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/main/acm2/ |
H A D | acm_isac.cc | 752 size_t payload_len, 760 static_cast<uint32_t>(payload_len), 751 IncomingPacket(const uint8_t* payload, size_t payload_len, uint16_t rtp_sequence_number, uint32_t rtp_timestamp, uint32_t arrival_timestamp) argument
|
/external/bluetooth/bluedroid/stack/include/ |
H A D | avdt_api.h | 375 typedef void (tAVDT_MEDIA_CBACK)(UINT8 handle, UINT8 *p_payload, UINT32 payload_len,
|
/external/bluetooth/bluedroid/stack/avdt/ |
H A D | avdt_scb_act.c | 428 UINT32 payload_len; /* payload length */ local 609 payload_len = (UINT32)(p_scb->p_media_buf + p_scb->frag_off - pad_len - p_payload); 612 p_payload - p_scb->p_media_buf,payload_len); 618 payload_len, time_stamp, seq, m_pt, marker); local
|