/external/zlib/src/test/ |
H A D | minigzip.c | 403 off_t buf_len; /* length of the input file */ local 408 buf_len = sb.st_size; 409 if (buf_len <= 0) return Z_ERRNO; 412 buf = mmap((caddr_t) 0, buf_len, PROT_READ, MAP_SHARED, ifd, (off_t)0); 416 len = gzwrite(out, (char *)buf, (unsigned)buf_len); 418 if (len != (int)buf_len) error(gzerror(out, &err)); 420 munmap(buf, buf_len);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_drv_ops.c | 729 const u8 *peer, u8 *buf, u16 *buf_len) 734 buf_len); 728 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
H A D | peerkey_auth.c | 87 size_t buf_len; local 117 buf_len = kde.rsn_ie_len + 2 + RSN_SELECTOR_LEN + ETH_ALEN; 118 buf = os_malloc(buf_len); 152 size_t buf_len; local 161 buf_len = 2 + RSN_SELECTOR_LEN + ETH_ALEN + 165 pos = buf = os_malloc(buf_len); 205 size_t buf_len; local 214 buf_len = kde->rsn_ie_len + 219 pos = buf = os_malloc(buf_len);
|
H A D | wnm_ap.c | 26 u8 *buf, u16 *buf_len, enum wnm_oper oper) 30 return hostapd_drv_wnm_oper(hapd, oper, addr, buf, buf_len); 36 u8 *buf, u16 *buf_len, enum wnm_oper oper) 40 return hostapd_drv_wnm_oper(hapd, oper, addr, buf, buf_len); 25 ieee80211_11_get_tfs_ie(struct hostapd_data *hapd, const u8 *addr, u8 *buf, u16 *buf_len, enum wnm_oper oper) argument 35 ieee80211_11_set_tfs_ie(struct hostapd_data *hapd, const u8 *addr, u8 *buf, u16 *buf_len, enum wnm_oper oper) argument
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 146 size_t buf_len; local 148 buf_len = 2 * ETH_ALEN + 1 + mdie_len + ftie_len + rsnie_len + ric_len; 149 buf = os_malloc(buf_len);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-eax.c | 33 size_t buf_len; local 39 buf_len = nonce_len; 41 buf_len = data_len; 42 if (hdr_len > buf_len) 43 buf_len = hdr_len; 44 buf_len += 16; 46 buf = os_malloc(buf_len); 97 size_t buf_len; local 103 buf_len = nonce_len; 105 buf_len [all...] |
H A D | sha1-prf.c | 24 * @buf_len: Number of bytes of key to generate 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 48 while (pos < buf_len) { 49 plen = buf_len - pos; 30 sha1_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
H A D | sha1-tprf.c | 23 * @buf_len: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 51 output_len[0] = (buf_len >> 8) & 0xff; 52 output_len[1] = buf_len & 0xff; 54 while (pos < buf_len) { 56 plen = buf_len - pos; 29 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256-prf.c | 24 * @buf_len: Number of bytes of key to generate 30 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 32 sha256_prf_bits(key, key_len, label, data, data_len, buf, buf_len * 8); 44 * @buf_len: Number of bits of key to generate 47 * given key. If the requested buf_len is not divisible by eight, the least 61 size_t buf_len = (buf_len_bits + 7) / 8; local 74 while (pos < buf_len) { 75 plen = buf_len - pos; 29 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 2441 * @buf_len: Buffer length in octets 2448 int (*get_noa)(void *priv, u8 *buf, size_t buf_len); 2534 * @buf_len: Return the len of buf 2538 u8 *buf, u16 *buf_len); 2583 * @buf_len: Buffer length 2586 int (*driver_cmd)(void *priv, char *cmd, char *buf, size_t buf_len); 3752 u16 buf_len; member in struct:wpa_event_data::wnm
|
H A D | driver_atheros.c | 2194 u8 *buf, u16 *buf_len) 2208 return athr_wnm_tfs(drv, peer, buf, buf_len, oper); 2193 atheros_wnm_oper(void *priv, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
|
H A D | driver_nl80211.c | 374 const u8 *buf, size_t buf_len, u64 *cookie, 386 size_t buf_len); 10554 const u8 *buf, size_t buf_len, 10570 wpa_hexdump(MSG_MSGDUMP, "CMD_FRAME", buf, buf_len); 10587 NLA_PUT(msg, NL80211_ATTR_FRAME, buf_len, buf); 10552 nl80211_send_frame_cmd(struct i802_bss *bss, unsigned int freq, unsigned int wait, const u8 *buf, size_t buf_len, u64 *cookie_out, int no_cck, int no_ack, int offchanok) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.c | 17 u8 *buf, size_t buf_len) 60 extra[0] = buf_len & 0xff; 69 while (pos < buf_len) { 71 plen = buf_len - pos; 15 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | eap_sake_common.c | 203 * @buf_len: Number of bytes of key to generate 211 u8 *buf, size_t buf_len) 230 while (pos < buf_len) { 231 plen = buf_len - pos; 208 eap_sake_kdf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len, u8 *buf, size_t buf_len) argument
|
H A D | ikev2_common.c | 374 size_t sign_len, buf_len; local 385 buf_len = 4 + ID_len; 386 buf = os_zalloc(buf_len); 392 1, (const u8 **) &buf, &buf_len, hash) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast_pac.c | 186 size_t buf_len; member in struct:eap_fast_read_ctx 195 if (fgets(rc->buf, rc->buf_len, rc->f) == NULL) 206 if (len >= rc->buf_len) 207 len = rc->buf_len - 1; 213 rc->buf[rc->buf_len - 1] = '\0'; 259 rc->buf_len = 2048; 260 rc->buf = os_malloc(rc->buf_len); 477 static void eap_fast_write(char **buf, char **pos, size_t *buf_len, argument 493 if (*pos - *buf + need > *buf_len) { 494 char *nbuf = os_realloc(*buf, *buf_len 574 eap_fast_add_pac_data(struct eap_fast_pac *pac, char **buf, char **pos, size_t *buf_len) argument 624 size_t buf_len; local [all...] |
H A D | ikev2.c | 34 size_t buf_len, pad_len; local 60 buf_len = data->i_nonce_len + data->r_nonce_len + 2 * IKEV2_SPI_LEN; 61 buf = os_malloc(buf_len); 109 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
|
H A D | mschapv2.c | 113 const u8 *buf, size_t buf_len) 116 if (buf_len < 2 + 2 * MSCHAPV2_AUTH_RESPONSE_LEN || 112 mschapv2_verify_auth_response(const u8 *auth_response, const u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 685 size_t buf_len, srv_id_info_len, pac_len; local 746 buf_len = sizeof(*pac_tlv) + 750 buf = wpabuf_alloc(buf_len);
|
H A D | ikev2.c | 38 size_t buf_len, pad_len; local 64 buf_len = data->i_nonce_len + data->r_nonce_len + 2 * IKEV2_SPI_LEN; 65 buf = os_malloc(buf_len); 113 ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.c | 40 int lab_len, ctx_len, ret_len, buf_len; local 46 buf_len = lab_len + ctx_len + 4; 54 buf = os_zalloc(buf_len); 60 WPA_PUT_BE16(&buf[buf_len - 2], ret_bits); 64 if (omac1_aes_128(kdk, buf, buf_len, ret)) {
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 1265 u8 *buf, size_t buf_len) 1272 if (data_len + 16 > buf_len) 1278 if (padlen && data_len < buf_len) { 1281 buf_len = data_len + padlen; 1283 buf_len = data_len; 1296 while (pos < buf_len) { 1309 return buf_len; 1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 125 int buf_len; /* length of TPK message for retransmission */ member in struct:wpa_tdls_peer::tpk_timer 282 peer->sm_tmr.buf_len = msg_len; 341 peer->sm_tmr.buf_len)) { 377 peer->sm_tmr.buf_len = 0; 1024 size_t buf_len; local 1102 buf_len = 0; 1104 buf_len += peer->rsnie_i_len + sizeof(struct wpa_tdls_ftie) + 1109 buf_len += 170; 1111 buf_len += sizeof(struct wpa_tdls_lnkid); 1113 rbuf = os_zalloc(buf_len 1206 size_t buf_len; local 1297 size_t buf_len; local 1393 size_t buf_len = 0; local [all...] |
H A D | wpa_ft.c | 151 size_t buf_len; local 160 buf_len = 2 + sizeof(struct rsn_mdie) + 2 + sizeof(struct rsn_ftie) + 162 buf = os_zalloc(buf_len);
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.c | 245 unsigned char *buf, size_t *buf_len, 249 unsigned char *buf, size_t *buf_len); 258 static int scard_parse_fsp_templ(unsigned char *buf, size_t buf_len, argument 269 end = pos + buf_len; 782 unsigned char *buf, size_t *buf_len, 850 rlen = *buf_len; 853 *buf_len = resp[1] < rlen ? resp[1] : rlen; 863 unsigned char *buf, size_t *buf_len) 865 return _scard_select_file(scard, file_id, buf, buf_len, 781 _scard_select_file(struct scard_data *scard, unsigned short file_id, unsigned char *buf, size_t *buf_len, sim_types sim_type, unsigned char *aid, size_t aidlen) argument 862 scard_select_file(struct scard_data *scard, unsigned short file_id, unsigned char *buf, size_t *buf_len) argument
|