/external/android-clat/ |
H A D | netlink_msg.c | 53 * payload_len - bytelength of structure 55 struct nl_msg *nlmsg_alloc_generic(uint16_t type, uint16_t flags, void *payload_struct, size_t payload_len) { argument 63 if ((sizeof(struct nl_msg) + payload_len) > msg->nm_size) { 68 msg->nm_nlh->nlmsg_len = NLMSG_LENGTH(payload_len); 72 memcpy(nlmsg_data(msg->nm_nlh), payload_struct, payload_len);
|
H A D | translate.c | 119 * payload_len - length of other data inside packet 123 void fill_ip_header(struct iphdr *ip, uint16_t payload_len, uint8_t protocol, argument 131 ip->tot_len = htons(sizeof(struct iphdr) + payload_len); 153 * payload_len - length of other data inside packet 157 void fill_ip6_header(struct ip6_hdr *ip6, uint16_t payload_len, uint8_t protocol, argument 162 ip6->ip6_plen = htons(payload_len);
|
/external/tcpdump/ |
H A D | print-ip6.c | 89 register u_int payload_len; local 105 payload_len = EXTRACT_16BITS(&ip6->ip6_plen); 106 len = payload_len + sizeof(struct ip6_hdr); 132 payload_len));
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.c | 116 * @payload_len: Payload length in bytes (data after Type) 126 * payload_len bytes and has the EAP header and Type field already filled in. 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 136 payload_len;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.c | 116 * @payload_len: Payload length in bytes (data after Type) 126 * payload_len bytes and has the EAP header and Type field already filled in. 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 136 payload_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_common.c | 116 * @payload_len: Payload length in bytes (data after Type) 126 * payload_len bytes and has the EAP header and Type field already filled in. 128 struct wpabuf * eap_msg_alloc(int vendor, EapType type, size_t payload_len, argument 136 payload_len;
|
/external/libnfc-nci/src/nfa/dm/ |
H A D | nfa_dm_ndef.c | 241 UINT32 payload_len) 273 if ((payload_len>1) && (p_payload[0] == p_cb->p_ndef_handler[i]->uri_id)) 370 UINT32 payload_len; local 437 p_payload = NDEF_RecGetPayload (p_rec, &payload_len); 440 if ((p_handler = nfa_dm_ndef_find_next_handler (NULL, tnf, p_type, type_len, p_payload, payload_len)) == NULL) 455 p_handler = nfa_dm_ndef_find_next_handler (p_handler, tnf, p_type, type_len, p_payload, payload_len); 467 ndef_data.len = payload_len + (UINT32) (p_payload - p_rec); 519 p_handler = nfa_dm_ndef_find_next_handler (p_handler, tnf, p_type, type_len, p_payload, payload_len); 236 nfa_dm_ndef_find_next_handler(tNFA_DM_API_REG_NDEF_HDLR *p_init_handler, UINT8 tnf, UINT8 *p_type_name, UINT8 type_name_len, UINT8 *p_payload, UINT32 payload_len) argument
|
/external/libnl/lib/netfilter/ |
H A D | queue_msg.c | 221 * @arg payload_len payload length 226 const void *payload_data, unsigned payload_len) 243 nla.nla_len = payload_len + sizeof(nla); 250 iov[2].iov_len = NLA_ALIGN(payload_len); 224 nfnl_queue_msg_send_verdict_payload(struct nl_sock *nlh, const struct nfnl_queue_msg *msg, const void *payload_data, unsigned payload_len) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 171 WPA_PUT_BE16(length, payload_len); 196 if (pos + payload_len > buf + buf_size) 198 os_memmove(pos, payload, payload_len); 199 pos += payload_len; 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 171 WPA_PUT_BE16(length, payload_len); 196 if (pos + payload_len > buf + buf_size) 198 os_memmove(pos, payload, payload_len); 199 pos += payload_len; 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 171 WPA_PUT_BE16(length, payload_len); 196 if (pos + payload_len > buf + buf_size) 198 os_memmove(pos, payload, payload_len); 199 pos += payload_len; 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|
/external/libnfc-nci/halimpl/bcm2079x/hal/hal/ |
H A D | nfc_hal_nci.c | 530 UINT8 payload_len; local 551 payload_len = *p++; 585 if ((nfc_hal_cb.max_rf_credits) && (payload_len > 5))
|
/external/libnfc-nci/src/nfc/ndef/ |
H A D | ndef_cho_utils.c | 131 UINT32 payload_len; local 145 payload_len = (UINT32)carrier_type_len + carrier_data_len + 2; 151 (UINT8*)p_id_str, id_len, payload, payload_len); 169 UINT32 payload_len; local 176 payload_len = 3 + (UINT8)strlen (p_carrier_data_ref_str); 180 payload_len += 1 + (UINT8)strlen (p_aux_data_ref_str[xx]); 186 NULL, 0, NULL, payload_len); 194 p = NDEF_RecGetPayload (p_rec, &payload_len); 263 UINT32 payload_len; local 272 payload_len 301 UINT8 payload_len, id_len; local 535 NDEF_MsgAddMediaWifiWsc(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, char *p_id_str, UINT8 *p_payload, UINT32 payload_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sake.c | 146 size_t payload_len) 158 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 189 size_t payload_len) 207 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 289 size_t payload_len) 303 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const u8 *payload, size_t payload_len) argument 184 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const u8 *payload, size_t payload_len) argument 283 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_eke.c | 225 size_t payload_len) 241 if (payload_len < 2 + 4) { 248 end = payload + payload_len; 359 size_t payload_len) 387 end = payload + payload_len; 504 size_t payload_len) 525 end = payload + payload_len; 631 size_t payload_len) 635 if (payload_len < 4) { 221 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 500 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 627 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_gpsk.c | 279 size_t payload_len) 292 end = payload + payload_len; 588 size_t payload_len) 600 end = payload + payload_len; 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument
|
H A D | eap_pwd.c | 220 const u8 *payload, size_t payload_len) 234 if (payload_len < sizeof(struct eap_pwd_id)) { 271 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 277 data->id_server_len = payload_len - sizeof(struct eap_pwd_id); 352 const u8 *payload, size_t payload_len) 368 if (payload_len != 2 * prime_len + order_len) { 371 (unsigned int) payload_len, 565 const u8 *payload, size_t payload_len) 579 if (payload_len != SHA256_MAC_LEN) { 582 (unsigned int) payload_len, SHA256_MAC_LE 217 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 349 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 562 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
H A D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls_common.c | 21 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 30 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 32 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sake.c | 146 size_t payload_len) 158 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 189 size_t payload_len) 207 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 289 size_t payload_len) 303 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const u8 *payload, size_t payload_len) argument 184 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const u8 *payload, size_t payload_len) argument 283 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_eke.c | 225 size_t payload_len) 241 if (payload_len < 2 + 4) { 248 end = payload + payload_len; 359 size_t payload_len) 387 end = payload + payload_len; 504 size_t payload_len) 525 end = payload + payload_len; 631 size_t payload_len) 635 if (payload_len < 4) { 221 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 500 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 627 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tls_common.c | 21 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 30 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 32 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 146 size_t payload_len) 158 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 189 size_t payload_len) 207 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 289 size_t payload_len) 303 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 141 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const u8 *payload, size_t payload_len) argument 184 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const u8 *payload, size_t payload_len) argument 283 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, u8 id, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tls_common.c | 21 struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 30 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 32 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
/external/kernel-headers/original/uapi/linux/ |
H A D | ipv6.h | 122 __be16 payload_len; member in struct:ipv6hdr
|