/external/bsdiff/ |
H A D | test_utils.h | 70 uint64_t extra_len = 0; member in struct:test_utils::BsdiffPatchFile
|
/external/boringssl/src/ssl/ |
H A D | ssl_aead_ctx.c | 268 size_t extra_len = 0; local 280 extra_len = aead->variable_nonce_len; 298 *out_len += extra_len;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.h | 47 struct wpa_eapol_key *key, size_t extra_len, 71 struct wpa_eapol_key *key, size_t extra_len, 70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
|
H A D | peerkey.c | 180 const struct wpa_eapol_key *key, size_t extra_len, int ver) 197 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 515 const struct wpa_eapol_key *key, size_t extra_len, int ver) 527 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 594 const struct wpa_eapol_key *key, size_t extra_len) 609 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 1138 struct wpa_eapol_key *key, size_t extra_len, 1143 wpa_supplicant_process_smk_error(sm, src_addr, key, extra_len); 1146 wpa_supplicant_process_smk_m2(sm, src_addr, key, extra_len, 1150 wpa_supplicant_process_smk_m45(sm, src_addr, key, extra_len, 178 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 513 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 592 wpa_supplicant_process_smk_error( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len) argument 1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.h | 47 struct wpa_eapol_key *key, size_t extra_len, 71 struct wpa_eapol_key *key, size_t extra_len, 70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
|
H A D | peerkey.c | 180 const struct wpa_eapol_key *key, size_t extra_len, int ver) 197 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 515 const struct wpa_eapol_key *key, size_t extra_len, int ver) 527 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 594 const struct wpa_eapol_key *key, size_t extra_len) 609 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 1138 struct wpa_eapol_key *key, size_t extra_len, 1143 wpa_supplicant_process_smk_error(sm, src_addr, key, extra_len); 1146 wpa_supplicant_process_smk_m2(sm, src_addr, key, extra_len, 1150 wpa_supplicant_process_smk_m45(sm, src_addr, key, extra_len, 178 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 513 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 592 wpa_supplicant_process_smk_error( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len) argument 1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 47 struct wpa_eapol_key *key, size_t extra_len, 71 struct wpa_eapol_key *key, size_t extra_len, 70 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
|
H A D | peerkey.c | 180 const struct wpa_eapol_key *key, size_t extra_len, int ver) 197 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 515 const struct wpa_eapol_key *key, size_t extra_len, int ver) 527 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 594 const struct wpa_eapol_key *key, size_t extra_len) 609 if (wpa_supplicant_parse_ies((const u8 *) (key + 1), extra_len, &kde) < 1138 struct wpa_eapol_key *key, size_t extra_len, 1143 wpa_supplicant_process_smk_error(sm, src_addr, key, extra_len); 1146 wpa_supplicant_process_smk_m2(sm, src_addr, key, extra_len, 1150 wpa_supplicant_process_smk_m45(sm, src_addr, key, extra_len, 178 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 513 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 592 wpa_supplicant_process_smk_error( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len) argument 1137 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument [all...] |
/external/curl/lib/ |
H A D | content_encoding.c | 224 ssize_t extra_len; local 229 extra_len = (data[1] << 8) | data[0]; 231 if(len < (extra_len+2)) 234 len -= (extra_len + 2); 235 data += (extra_len + 2);
|
/external/opencv3/3rdparty/zlib/ |
H A D | zlib.h | 118 uInt extra_len; /* extra field length (valid if extra != Z_NULL) */ member in struct:gz_header_s 755 a zero byte, and that if extra is not Z_NULL, that extra_len bytes are 980 extra_len contains the actual extra field length, and extra contains the 981 extra field, or that field truncated if extra_max is less than extra_len.
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 166 const u8 *mac, const u8 *extra, size_t extra_len) 185 len[1] = extra_len; 193 extra, extra_len); 206 const u8 *extra, size_t extra_len) 215 len[1] = extra_len; 221 extra, extra_len); 361 const u8 *mac, const u8 *extra, size_t extra_len) 380 len[1] = extra_len; 388 extra, extra_len); 401 u8 *mac, const u8 *extra, size_t extra_len) 165 eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 205 eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument 1025 msg->mac, extra, extra_len); local 1032 extra, extra_len); local [all...] |
H A D | eap_sim_common.h | 87 const u8 *mac, const u8 *extra, size_t extra_len); 89 const u8 *extra, size_t extra_len); 100 size_t extra_len); 102 u8 *mac, const u8 *extra, size_t extra_len); 128 size_t extra_len) 216 const u8 *extra, size_t extra_len); 125 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_aka.c | 901 size_t extra_len) 905 extra_len); 906 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 898 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_upnp_web.c | 313 size_t extra_len = 0; local 332 extra_len = 3000; 334 extra_len += os_strlen(iface->wps->friendly_name); 336 extra_len += os_strlen(iface->wps->manufacturer_url); 338 extra_len += os_strlen(iface->wps->model_description); 340 extra_len += os_strlen(iface->wps->model_url); 342 extra_len += os_strlen(iface->wps->upc); 346 extra_len = os_strlen(wps_scpd_xml); 368 buf = wpabuf_alloc(1000 + extra_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 166 const u8 *mac, const u8 *extra, size_t extra_len) 185 len[1] = extra_len; 193 extra, extra_len); 206 const u8 *extra, size_t extra_len) 215 len[1] = extra_len; 221 extra, extra_len); 361 const u8 *mac, const u8 *extra, size_t extra_len) 380 len[1] = extra_len; 388 extra, extra_len); 401 u8 *mac, const u8 *extra, size_t extra_len) 165 eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 205 eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument 1025 msg->mac, extra, extra_len); local 1032 extra, extra_len); local [all...] |
H A D | eap_sim_common.h | 87 const u8 *mac, const u8 *extra, size_t extra_len); 89 const u8 *extra, size_t extra_len); 100 size_t extra_len); 102 u8 *mac, const u8 *extra, size_t extra_len); 128 size_t extra_len) 216 const u8 *extra, size_t extra_len); 125 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_aka.c | 901 size_t extra_len) 905 extra_len); 906 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 898 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp_web.c | 313 size_t extra_len = 0; local 332 extra_len = 3000; 334 extra_len += os_strlen(iface->wps->friendly_name); 336 extra_len += os_strlen(iface->wps->manufacturer_url); 338 extra_len += os_strlen(iface->wps->model_description); 340 extra_len += os_strlen(iface->wps->model_url); 342 extra_len += os_strlen(iface->wps->upc); 346 extra_len = os_strlen(wps_scpd_xml); 368 buf = wpabuf_alloc(1000 + extra_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 166 const u8 *mac, const u8 *extra, size_t extra_len) 185 len[1] = extra_len; 193 extra, extra_len); 206 const u8 *extra, size_t extra_len) 215 len[1] = extra_len; 221 extra, extra_len); 361 const u8 *mac, const u8 *extra, size_t extra_len) 380 len[1] = extra_len; 388 extra, extra_len); 401 u8 *mac, const u8 *extra, size_t extra_len) 165 eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 205 eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 400 eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, const u8 *extra, size_t extra_len) argument 1007 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument 1025 msg->mac, extra, extra_len); local 1032 extra, extra_len); local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 901 size_t extra_len) 905 extra_len); 906 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 898 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_upnp_web.c | 313 size_t extra_len = 0; local 332 extra_len = 3000; 334 extra_len += os_strlen(iface->wps->friendly_name); 336 extra_len += os_strlen(iface->wps->manufacturer_url); 338 extra_len += os_strlen(iface->wps->model_description); 340 extra_len += os_strlen(iface->wps->model_url); 342 extra_len += os_strlen(iface->wps->upc); 346 extra_len = os_strlen(wps_scpd_xml); 368 buf = wpabuf_alloc(1000 + extra_len);
|
/external/zlib/src/ |
H A D | zlib.h | 118 uInt extra_len; /* extra field length (valid if extra != Z_NULL) */ member in struct:gz_header_s 755 a zero byte, and that if extra is not Z_NULL, that extra_len bytes are 980 extra_len contains the actual extra field length, and extra contains the 981 extra field, or that field truncated if extra_max is less than extra_len.
|
/external/zlib/ |
H A D | zlib.h | 118 uInt extra_len; /* extra field length (valid if extra != Z_NULL) */ member in struct:gz_header_s 755 a zero byte, and that if extra is not Z_NULL, that extra_len bytes are 980 extra_len contains the actual extra field length, and extra contains the 981 extra field, or that field truncated if extra_max is less than extra_len.
|
/external/pdfium/third_party/zlib_v128/ |
H A D | zlib.h | 187 uInt extra_len; /* extra field length (valid if extra != Z_NULL) */ member in struct:gz_header_s 824 a zero byte, and that if extra is not Z_NULL, that extra_len bytes are 1049 extra_len contains the actual extra field length, and extra contains the 1050 extra field, or that field truncated if extra_max is less than extra_len.
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 787 size_t extra_len) 791 extra_len); 792 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 784 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|