/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.c | 411 const u8 *data2, size_t data2_len) 419 if (data2) { 420 os_memcpy(pos, data2, data2_len); 410 wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len) argument
|
H A D | wpa_auth_ie.h | 54 const u8 *data2, size_t data2_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 212 size_t data_len, const u8 *data2, size_t data2_len, 221 if (data2) { 223 addr[1] = data2; 211 eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len, u8 *res) argument
|
H A D | eap_pax_common.c | 77 * @data2: Optional data, second block; %NULL if not used 78 * @data2_len: Length of data2 in bytes 88 const u8 *data2, size_t data2_len, 103 addr[1] = data2; 108 count = (data1 ? 1 : 0) + (data2 ? 1 : 0) + (data3 ? 1 : 0); 86 eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, const u8 *data1, size_t data1_len, const u8 *data2, size_t data2_len, const u8 *data3, size_t data3_len, u8 *mac) argument
|
H A D | eap_pax_common.h | 85 const u8 *data2, size_t data2_len,
|
H A D | eap_sake_common.c | 200 * @data2: Extra data (end) to bind into the key 201 * @data2_len: Length of the data2 210 const u8 *data2, size_t data2_len, 224 addr[2] = data2; /* Msg[end] */ 208 eap_sake_kdf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.c | 411 const u8 *data2, size_t data2_len) 419 if (data2) { 420 os_memcpy(pos, data2, data2_len); 410 wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len) argument
|
H A D | wpa_auth_ie.h | 54 const u8 *data2, size_t data2_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 212 size_t data_len, const u8 *data2, size_t data2_len, 221 if (data2) { 223 addr[1] = data2; 211 eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len, u8 *res) argument
|
H A D | eap_pax_common.c | 77 * @data2: Optional data, second block; %NULL if not used 78 * @data2_len: Length of data2 in bytes 88 const u8 *data2, size_t data2_len, 103 addr[1] = data2; 108 count = (data1 ? 1 : 0) + (data2 ? 1 : 0) + (data3 ? 1 : 0); 86 eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, const u8 *data1, size_t data1_len, const u8 *data2, size_t data2_len, const u8 *data3, size_t data3_len, u8 *mac) argument
|
H A D | eap_pax_common.h | 85 const u8 *data2, size_t data2_len,
|
H A D | eap_sake_common.c | 200 * @data2: Extra data (end) to bind into the key 201 * @data2_len: Length of the data2 210 const u8 *data2, size_t data2_len, 224 addr[2] = data2; /* Msg[end] */ 208 eap_sake_kdf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len, u8 *buf, size_t buf_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.c | 411 const u8 *data2, size_t data2_len) 419 if (data2) { 420 os_memcpy(pos, data2, data2_len); 410 wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len) argument
|
H A D | wpa_auth_ie.h | 54 const u8 *data2, size_t data2_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 212 size_t data_len, const u8 *data2, size_t data2_len, 221 if (data2) { 223 addr[1] = data2; 211 eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len, u8 *res) argument
|
H A D | eap_pax_common.c | 77 * @data2: Optional data, second block; %NULL if not used 78 * @data2_len: Length of data2 in bytes 88 const u8 *data2, size_t data2_len, 103 addr[1] = data2; 108 count = (data1 ? 1 : 0) + (data2 ? 1 : 0) + (data3 ? 1 : 0); 86 eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, const u8 *data1, size_t data1_len, const u8 *data2, size_t data2_len, const u8 *data3, size_t data3_len, u8 *mac) argument
|
H A D | eap_pax_common.h | 85 const u8 *data2, size_t data2_len,
|
H A D | eap_sake_common.c | 200 * @data2: Extra data (end) to bind into the key 201 * @data2_len: Length of the data2 210 const u8 *data2, size_t data2_len, 224 addr[2] = data2; /* Msg[end] */ 208 eap_sake_kdf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len, u8 *buf, size_t buf_len) argument
|
/external/vixl/test/examples/ |
H A D | test-examples.cc | 290 uint8_t data2[] = { 42 }; local 291 SUM_ARRAY_DOTEST(data2);
|
/external/webp/src/dec/ |
H A D | frame.c | 496 worker->data2 = (void*)&dec->thread_ctx_.io_;
|
/external/webp/src/enc/ |
H A D | alpha.c | 367 worker->data2 = NULL;
|
H A D | analysis.c | 425 job->worker.data2 = &job->it;
|
/external/webp/src/utils/ |
H A D | thread.c | 259 worker->had_error |= !worker->hook(worker->data1, worker->data2);
|
H A D | thread.h | 35 // arguments (data1 and data2), and should return false in case of error. 47 void* data2; // second argument passed to 'hook' member in struct:__anon33403 62 // Triggers the thread to call hook() with data1 and data2 arguments. These 63 // hook/data1/data2 values can be changed at any time before calling this
|
/external/valgrind/main/none/tests/ |
H A D | fdleak_cmsg.stderr.exp | 10 Open file descriptor ...: /tmp/data2 28 Open file descriptor ...: /tmp/data2
|