/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 80 const u8 *mka_msg, size_t msg_len); 706 size_t msg_len) 912 const u8 *mka_msg, size_t msg_len) 925 left_len = msg_len; 981 const u8 *peer_msg, size_t msg_len) 1037 const u8 *peer_msg, size_t msg_len) 1233 const u8 *mka_msg, size_t msg_len) 1512 const u8 *mka_msg, size_t msg_len) 1746 const u8 *mka_msg, size_t msg_len) 1756 left_len = msg_len; 705 ieee802_1x_mka_decode_basic_body(struct ieee802_1x_kay *kay, const u8 *mka_msg, size_t msg_len) argument 911 ieee802_1x_mka_i_in_peerlist(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 979 ieee802_1x_mka_decode_live_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1035 ieee802_1x_mka_decode_potential_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1231 ieee802_1x_mka_decode_sak_use_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1510 ieee802_1x_mka_decode_dist_sak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1745 ieee802_1x_mka_decode_icv_body(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1788 ieee802_1x_mka_decode_dist_cak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1812 ieee802_1x_mka_decode_kmd_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1835 ieee802_1x_mka_decode_announce_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 656 size_t msg_len; local 664 msg_len = be_to_host16(hdr->length); 665 if (msg_len < sizeof(*hdr) || msg_len > len) { 670 if (msg_len < len) { 672 "RADIUS message", (unsigned long) len - msg_len); 679 msg->buf = wpabuf_alloc_copy(data, msg_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 231 int initiator, const u8 *msg, size_t msg_len) 237 "msg_len=%u", 239 peer_capab, initiator, (unsigned int) msg_len); 243 msg_len)) { 282 peer->sm_tmr.buf_len = msg_len; 284 peer->sm_tmr.buf = os_malloc(msg_len); 287 os_memcpy(peer->sm_tmr.buf, msg, msg_len); 229 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument
|
H A D | wpa.c | 34 * @msg_len: Length of message 39 u8 *msg, size_t msg_len, u8 *key_mic) 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 67 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 68 wpa_sm_ether_send(sm, dest, proto, msg, msg_len); 37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
|
H A D | wpa_i.h | 194 size_t *msg_len, void **data_pos) 198 msg_len, data_pos); 317 u8 *msg, size_t msg_len, u8 *key_mic); 192 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 91 u16 data_len, size_t *msg_len, void **data_pos) 98 *msg_len = sizeof(*hdr) + data_len; 99 hdr = os_malloc(*msg_len); 90 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_glue.c | 62 size_t *msg_len, void **data_pos) 66 *msg_len = sizeof(*hdr) + data_len; 67 hdr = os_malloc(*msg_len); 407 size_t *msg_len, void **data_pos) 409 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); 60 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 405 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/valgrind/main/include/vki/ |
H A D | vki-linux.h | 644 unsigned msg_len; member in struct:vki_mmsghdr
|
/external/tcpdump/ |
H A D | print-ldp.c | 567 u_short pdu_len,msg_len,msg_type,msg_tlen; local 607 msg_len=EXTRACT_16BITS(ldp_msg_header->length); 616 msg_len, 620 if (msg_len == 0) /* infinite loop protection */ 624 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */ 627 TCHECK2(*tptr, msg_len); 666 msg_len); 668 tptr += msg_len+4; 669 tlen -= msg_len+4;
|
H A D | print-olsr.c | 96 u_int8_t msg_len[2]; member in struct:olsr_msg4 106 u_int8_t msg_len[2]; member in struct:olsr_msg6 263 u_int msg_type, msg_len, msg_tlen, hello_len; local 312 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len); 313 if ((msg_len >= sizeof (struct olsr_msg6)) 314 && (msg_len <= length)) 318 if (msg_type == 0 || msg_len == 0) { 330 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); 332 msg_tlen = msg_len [all...] |
H A D | print-ppp.c | 880 int peerid_len, passwd_len, msg_len; local 952 msg_len = *p; /* Msg-Length */ 954 if (length - (p - p0) < msg_len) 957 for (i = 0; i< msg_len; i++) {
|
/external/strace/ |
H A D | net.c | 392 uint32_t /* unsigned */ msg_len; member in struct:mmsghdr32 425 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len) argument 429 unsigned msg_len; member in struct:mmsghdr 448 mmsg.msg_len = mmsg32.msg_len; 459 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len); 460 tprintf(", %u}", mmsg.msg_len); 464 decode_mmsg(struct tcb *tcp, unsigned long msg_len) argument [all...] |
/external/srtp/crypto/test/ |
H A D | auth_driver.c | 74 auth_bits_per_second(auth_t *h, int msg_len); 171 int msg_len = (msg_len_octets + 1)/2; local 178 for (i=0; i < msg_len; i++)
|
/external/openssl/include/openssl/ |
H A D | dtls1.h | 145 unsigned long msg_len; member in struct:hm_header_st
|
/external/openssl/ssl/ |
H A D | d1_both.c | 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 141 OPENSSL_assert((msg_len) > 0); \ 143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \ 150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \ 278 (int)s->d1->w_msg_hdr.msg_len 420 unsigned long msg_len; local 488 size_t frag_off,frag_len,msg_len; local [all...] |
H A D | d1_srvr.c | 886 unsigned int msg_len; local 908 msg_len = p - msg; 911 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len); 1493 unsigned int msg_len; local 1571 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; 1573 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local 1626 unsigned int hlen, msg_len; local 1718 msg_len 1720 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local [all...] |
H A D | dtls1.h | 145 unsigned long msg_len; member in struct:hm_header_st
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
H A D | brw_vs_emit.c | 1523 int msg_len; local 1687 msg_len = 1 + slot; 1688 msg_len = align_interleaved_urb_mlen(brw, msg_len); 1690 assert (msg_len <= BRW_MAX_MRF - 1); 1698 msg_len,
|
/external/libpcap/ |
H A D | pcap-netfilter-linux.c | 111 u_int32_t msg_len; local 202 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); 203 if (msg_len > len) 204 msg_len = len; 206 len -= msg_len; 207 buf += msg_len;
|
/external/libnfc-nci/src/nfa/hci/ |
H A D | nfa_hci_utils.c | 316 tNFA_STATUS nfa_hciu_send_msg (UINT8 pipe_id, UINT8 type, UINT8 instruction, UINT16 msg_len, UINT8 *p_msg) argument 329 pipe_id, nfa_hciu_get_type_inst_names (pipe_id, type, instruction, buff), msg_len); 332 pipe_id, type, instruction, msg_len); 338 while ((first_pkt == TRUE) || (msg_len != 0)) 350 if (msg_len > data_len) 356 data_len = msg_len; 375 msg_len -= data_len; 376 if (msg_len > 0)
|
/external/libnfc-nci/src/nfa/int/ |
H A D | nfa_hci_int.h | 395 UINT16 msg_len; /* For segmentation - length of the combined message */ member in struct:__anon24196
|
/external/libnfc-nci/src/nfc/include/ |
H A D | rw_api.h | 158 UINT16 msg_len; /* Length of the NDEF message */ member in struct:__anon24326 410 ** Parameters: msg_len: The length of the buffer 416 NFC_API extern tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg); 555 ** Parameters: msg_len: The length of the buffer 561 NFC_API extern tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg );
|
/external/libnfc-nci/src/nfc/ndef/ |
H A D | ndef_utils.c | 79 tNDEF_STATUS NDEF_MsgValidate (UINT8 *p_msg, UINT32 msg_len, BOOLEAN b_allow_chunks) argument 82 UINT8 *p_end = p_msg + msg_len; 88 if ( (p_msg == NULL) || (msg_len < 3) )
|
/external/libnfc-nci/src/nfc/tags/ |
H A D | rw_t1t_ndef.c | 50 static tNFC_STATUS rw_t1t_send_ndef_byte (UINT8 data, UINT8 block, UINT8 index, UINT8 msg_len); 1631 static tNFC_STATUS rw_t1t_send_ndef_byte (UINT8 data, UINT8 block, UINT8 index, UINT8 msg_len) argument 1643 if (p_t1t->work_offset == p_t1t->new_ndef_msg_len + msg_len) 2588 ** Parameters: msg_len: The length of the buffer 2594 tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg) argument 2625 if (msg_len > p_t1t->max_ndef_msg_len) 2632 p_t1t->new_ndef_msg_len = msg_len;
|
H A D | rw_t2t_ndef.c | 58 static tNFC_STATUS rw_t2t_write_ndef_first_block (UINT16 msg_len, BOOLEAN b_update_len); 59 static tNFC_STATUS rw_t2t_write_ndef_next_block (UINT16 block, UINT16 msg_len, BOOLEAN b_update_len); 300 evt_data.msg_len = p_t2t->prop_msg_len; 1157 tNFC_STATUS rw_t2t_write_ndef_first_block (UINT16 msg_len, BOOLEAN b_update_len) argument 1174 if (msg_len == 0) 1185 length_field[1] = (UINT8) (msg_len >> 8); 1186 length_field[2] = (UINT8) (msg_len); 1192 length_field[0] = (UINT8) (msg_len); 1263 tNFC_STATUS rw_t2t_write_ndef_next_block (UINT16 block, UINT16 msg_len, BOOLEAN b_update_len) argument 1311 if (msg_len 3061 RW_T2tWriteNDef(UINT16 msg_len, UINT8 *p_msg) argument [all...] |