/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-tlsprf.c | 37 size_t len[3]; local 40 len[0] = SHA256_MAC_LEN; 42 len[1] = os_strlen(label); 44 len[2] = seed_len; 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
|
H A D | sha256.c | 22 * @len: Lengths of the data blocks 27 const u8 *addr[], const size_t *len, u8 *mac) 71 _len[i + 1] = len[i]; 26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 37 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_OTP, reqData, &len); 43 pos, len); 55 eap_sm_request_otp(sm, (const char *) pos, len);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs8.c | 19 struct crypto_private_key * pkcs8_key_import(const u8 *buf, size_t len) argument 30 if (asn1_get_next(buf, len, &hdr) < 0 || 71 if (asn1_get_next(pos, len, &hdr) < 0 || 90 if (oid.len != 7 || 122 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd) argument 142 if (asn1_get_next(buf, len, &hdr) < 0 ||
|
/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password.c | 85 struct wpabuf * ext_password_alloc(size_t len) argument 89 buf = wpabuf_alloc(len);
|
H A D | uuid.c | 51 int len; local 52 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 58 if (len < 0 || (size_t) len >= max_len)
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_module_tests.c | 273 size_t len; local 277 len = os_strlen(test->data) / 2; 278 buf = wpabuf_alloc(len); 281 if (hexstr2bin(test->data, wpabuf_put(buf, len), len) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.h | 133 char *buf, size_t len) 132 wpa_supplicant_ctrl_iface_send(struct ctrl_iface_priv *priv, int level, char *buf, size_t len) argument
|
H A D | nfc_pw_token.c | 20 size_t i, len; local 29 len = wpabuf_len(buf); 30 for (i = 0; i < len; i++)
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | hs20.c | 44 u8 *len; local 51 len = eid++; /* to be filled */ 88 *len = eid - len - 1; 98 size_t len = 0; local 105 len = 1 + os_strlen(url); 106 if (5 + len > 255) { 113 buf = wpabuf_alloc(4 + 7 + len); 124 wpabuf_put_u8(buf, 5 + len); 128 wpabuf_put_u8(buf, len [all...] |
H A D | preauth_auth.h | 19 u8 *buf, size_t len); 41 u8 *buf, size_t len) 39 rsn_preauth_send(struct hostapd_data *hapd, struct sta_info *sta, u8 *buf, size_t len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | common_module_tests.c | 18 size_t len; member in struct:ieee802_11_parse_test_data 64 res = ieee802_11_parse_elems(test->data, test->len, &elems, 1); 66 ieee802_11_ie_count(test->data, test->len) != test->count) { 86 size_t len; member in struct:rsn_ie_parse_test_data 150 if (wpa_parse_wpa_ie_rsn(test->data, test->len, &data) !=
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-ctr.c | 28 size_t j, len, left = data_len; local 41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 42 for (j = 0; j < len; j++) 44 pos += len; 45 left -= len;
|
H A D | md5.c | 22 * @len: Lengths of the data blocks 27 const u8 *addr[], const size_t *len, u8 *mac) 72 _len[i + 1] = len[i]; 26 hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | sha1-prf.c | 38 size_t len[3]; local 41 len[0] = label_len; 43 len[1] = data_len; 45 len[2] = 1; 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, 56 if (hmac_sha1_vector(key, key_len, 3, addr, len,
|
H A D | sha1-tprf.c | 38 size_t len[5]; local 41 len[0] = 0; 43 len[1] = label_len + 1; 45 len[2] = seed_len; 47 len[3] = 2; 49 len[4] = 1; 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash)) 66 len[0] = SHA1_MAC_LEN;
|
H A D | sha1.c | 22 * @len: Lengths of the data blocks 27 const u8 *addr[], const size_t *len, u8 *mac) 71 _len[i + 1] = len[i]; 26 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
H A D | sha256-tlsprf.c | 37 size_t len[3]; local 40 len[0] = SHA256_MAC_LEN; 42 len[1] = os_strlen(label); 44 len[2] = seed_len; 53 hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A); 57 hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
|
H A D | sha256.c | 22 * @len: Lengths of the data blocks 27 const u8 *addr[], const size_t *len, u8 *mac) 71 _len[i + 1] = len[i]; 26 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 34 size_t password_len, len; local 37 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_OTP, reqData, &len); 43 pos, len); 55 eap_sm_request_otp(sm, (const char *) pos, len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs8.c | 19 struct crypto_private_key * pkcs8_key_import(const u8 *buf, size_t len) argument 30 if (asn1_get_next(buf, len, &hdr) < 0 || 71 if (asn1_get_next(pos, len, &hdr) < 0 || 90 if (oid.len != 7 || 122 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd) argument 142 if (asn1_get_next(buf, len, &hdr) < 0 ||
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password.c | 85 struct wpabuf * ext_password_alloc(size_t len) argument 89 buf = wpabuf_alloc(len);
|
H A D | uuid.c | 51 int len; local 52 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 58 if (len < 0 || (size_t) len >= max_len)
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_module_tests.c | 273 size_t len; local 277 len = os_strlen(test->data) / 2; 278 buf = wpabuf_alloc(len); 281 if (hexstr2bin(test->data, wpabuf_put(buf, len), len) < 0) {
|
/external/xmp_toolkit/XMPCore/src/com/adobe/xmp/impl/ |
H A D | CountOutputStream.java | 43 public void write(byte[] buf, int off, int len) throws IOException argument 45 out.write(buf, off, len); 46 bytesWritten += len;
|