/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius.c | 670 size_t msg_len; local 678 msg_len = be_to_host16(hdr->length); 679 if (msg_len < sizeof(*hdr) || msg_len > len) { 684 if (msg_len < len) { 686 "RADIUS message", (unsigned long) len - msg_len); 693 msg->buf = wpabuf_alloc_copy(data, msg_len);
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 80 const u8 *mka_msg, size_t msg_len); 706 size_t msg_len) 913 const u8 *mka_msg, size_t msg_len) 926 left_len = msg_len; 982 const u8 *peer_msg, size_t msg_len) 1040 const u8 *peer_msg, size_t msg_len) 1238 const u8 *mka_msg, size_t msg_len) 1517 const u8 *mka_msg, size_t msg_len) 1751 const u8 *mka_msg, size_t msg_len) 1761 left_len = msg_len; 705 ieee802_1x_mka_decode_basic_body(struct ieee802_1x_kay *kay, const u8 *mka_msg, size_t msg_len) argument 912 ieee802_1x_mka_i_in_peerlist(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 980 ieee802_1x_mka_decode_live_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1038 ieee802_1x_mka_decode_potential_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1236 ieee802_1x_mka_decode_sak_use_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1515 ieee802_1x_mka_decode_dist_sak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1750 ieee802_1x_mka_decode_icv_body(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1793 ieee802_1x_mka_decode_dist_cak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1817 ieee802_1x_mka_decode_kmd_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1840 ieee802_1x_mka_decode_announce_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument [all...] |
H A D | ieee802_1x_kay_i.h | 170 int (*icv_hash)(const u8 *ick, const u8 *msg, size_t msg_len, u8 *icv);
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 80 const u8 *mka_msg, size_t msg_len); 706 size_t msg_len) 913 const u8 *mka_msg, size_t msg_len) 926 left_len = msg_len; 982 const u8 *peer_msg, size_t msg_len) 1040 const u8 *peer_msg, size_t msg_len) 1238 const u8 *mka_msg, size_t msg_len) 1517 const u8 *mka_msg, size_t msg_len) 1751 const u8 *mka_msg, size_t msg_len) 1761 left_len = msg_len; 705 ieee802_1x_mka_decode_basic_body(struct ieee802_1x_kay *kay, const u8 *mka_msg, size_t msg_len) argument 912 ieee802_1x_mka_i_in_peerlist(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 980 ieee802_1x_mka_decode_live_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1038 ieee802_1x_mka_decode_potential_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1236 ieee802_1x_mka_decode_sak_use_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1515 ieee802_1x_mka_decode_dist_sak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1750 ieee802_1x_mka_decode_icv_body(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1793 ieee802_1x_mka_decode_dist_cak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1817 ieee802_1x_mka_decode_kmd_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1840 ieee802_1x_mka_decode_announce_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument [all...] |
H A D | ieee802_1x_kay_i.h | 170 int (*icv_hash)(const u8 *ick, const u8 *msg, size_t msg_len, u8 *icv);
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 80 const u8 *mka_msg, size_t msg_len); 706 size_t msg_len) 913 const u8 *mka_msg, size_t msg_len) 926 left_len = msg_len; 982 const u8 *peer_msg, size_t msg_len) 1040 const u8 *peer_msg, size_t msg_len) 1238 const u8 *mka_msg, size_t msg_len) 1517 const u8 *mka_msg, size_t msg_len) 1751 const u8 *mka_msg, size_t msg_len) 1761 left_len = msg_len; 705 ieee802_1x_mka_decode_basic_body(struct ieee802_1x_kay *kay, const u8 *mka_msg, size_t msg_len) argument 912 ieee802_1x_mka_i_in_peerlist(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 980 ieee802_1x_mka_decode_live_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1038 ieee802_1x_mka_decode_potential_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1236 ieee802_1x_mka_decode_sak_use_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1515 ieee802_1x_mka_decode_dist_sak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1750 ieee802_1x_mka_decode_icv_body(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1793 ieee802_1x_mka_decode_dist_cak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1817 ieee802_1x_mka_decode_kmd_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1840 ieee802_1x_mka_decode_announce_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument [all...] |
H A D | ieee802_1x_kay_i.h | 170 int (*icv_hash)(const u8 *ick, const u8 *msg, size_t msg_len, u8 *icv);
|
/external/tcpdump/ |
H A D | print-ppp.c | 905 int peerid_len, passwd_len, msg_len; local 977 msg_len = *p; /* Msg-Length */ 979 if (length - (p - p0) < msg_len) 982 for (i = 0; i< msg_len; i++) {
|
/external/libnfc-nci/src/nfc/ndef/ |
H A D | ndef_utils.c | 79 tNDEF_STATUS NDEF_MsgValidate (UINT8 *p_msg, UINT32 msg_len, BOOLEAN b_allow_chunks) argument 82 UINT8 *p_end = p_msg + msg_len; 88 if ( (p_msg == NULL) || (msg_len < 3) )
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 80 u16 data_len, size_t *msg_len, void **data_pos) 87 *msg_len = sizeof(*hdr) + data_len; 88 hdr = os_malloc(*msg_len); 79 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_module_tests.c | 160 int msg_len; member in struct:omac1_test_vector 225 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || 231 if (tv->msg_len > 1) { 236 len[1] = tv->msg_len - 1; 247 len[0] = tv->msg_len - 2; 248 addr[1] = tv->msg + tv->msg_len - 2; 250 addr[2] = tv->msg + tv->msg_len - 1;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_module_tests.c | 160 int msg_len; member in struct:omac1_test_vector 225 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || 231 if (tv->msg_len > 1) { 236 len[1] = tv->msg_len - 1; 247 len[0] = tv->msg_len - 2; 248 addr[1] = tv->msg + tv->msg_len - 2; 250 addr[2] = tv->msg + tv->msg_len - 1;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_module_tests.c | 160 int msg_len; member in struct:omac1_test_vector 225 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || 231 if (tv->msg_len > 1) { 236 len[1] = tv->msg_len - 1; 247 len[0] = tv->msg_len - 2; 248 addr[1] = tv->msg + tv->msg_len - 2; 250 addr[2] = tv->msg + tv->msg_len - 1;
|
/external/libnfc-nci/src/nfc/tags/ |
H A D | rw_t1t_ndef.c | 50 static tNFC_STATUS rw_t1t_send_ndef_byte (UINT8 data, UINT8 block, UINT8 index, UINT8 msg_len); 1631 static tNFC_STATUS rw_t1t_send_ndef_byte (UINT8 data, UINT8 block, UINT8 index, UINT8 msg_len) argument 1643 if (p_t1t->work_offset == p_t1t->new_ndef_msg_len + msg_len) 2588 ** Parameters: msg_len: The length of the buffer 2594 tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg) argument 2625 if (msg_len > p_t1t->max_ndef_msg_len) 2632 p_t1t->new_ndef_msg_len = msg_len;
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
H A D | brw_vs_emit.c | 1523 int msg_len; local 1687 msg_len = 1 + slot; 1688 msg_len = align_interleaved_urb_mlen(brw, msg_len); 1690 assert (msg_len <= BRW_MAX_MRF - 1); 1698 msg_len,
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 235 int initiator, const u8 *msg, size_t msg_len) 241 "msg_len=%u", 243 peer_capab, initiator, (unsigned int) msg_len); 247 msg_len)) { 286 peer->sm_tmr.buf_len = msg_len; 288 peer->sm_tmr.buf = os_malloc(msg_len); 291 os_memcpy(peer->sm_tmr.buf, msg, msg_len); 233 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument
|
H A D | wpa.h | 40 size_t *msg_len, void **data_pos);
|
H A D | wpa.c | 39 * @msg_len: Length of message 45 u8 *msg, size_t msg_len, u8 *key_mic) 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 77 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 78 ret = wpa_sm_ether_send(sm, dest, proto, msg, msg_len); 43 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 235 int initiator, const u8 *msg, size_t msg_len) 241 "msg_len=%u", 243 peer_capab, initiator, (unsigned int) msg_len); 247 msg_len)) { 286 peer->sm_tmr.buf_len = msg_len; 288 peer->sm_tmr.buf = os_malloc(msg_len); 291 os_memcpy(peer->sm_tmr.buf, msg, msg_len); 233 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument
|
H A D | wpa.h | 40 size_t *msg_len, void **data_pos);
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 235 int initiator, const u8 *msg, size_t msg_len) 241 "msg_len=%u", 243 peer_capab, initiator, (unsigned int) msg_len); 247 msg_len)) { 286 peer->sm_tmr.buf_len = msg_len; 288 peer->sm_tmr.buf = os_malloc(msg_len); 291 os_memcpy(peer->sm_tmr.buf, msg, msg_len); 233 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument
|
H A D | wpa.h | 40 size_t *msg_len, void **data_pos);
|
/external/compiler-rt/include/sanitizer/ |
H A D | linux_syscall_hooks.h | 1368 #define __sanitizer_syscall_pre_mq_timedsend(mqdes, msg_ptr, msg_len, \ 1371 (long)(msg_len), (long)(msg_prio), \ 1373 #define __sanitizer_syscall_post_mq_timedsend(res, mqdes, msg_ptr, msg_len, \ 1376 res, (long)(mqdes), (long)(msg_ptr), (long)(msg_len), (long)(msg_prio), \ 1378 #define __sanitizer_syscall_pre_mq_timedreceive(mqdes, msg_ptr, msg_len, \ 1381 (long)(mqdes), (long)(msg_ptr), (long)(msg_len), (long)(msg_prio), \ 1383 #define __sanitizer_syscall_post_mq_timedreceive(res, mqdes, msg_ptr, msg_len, \ 1386 res, (long)(mqdes), (long)(msg_ptr), (long)(msg_len), (long)(msg_prio), \ 2773 long msg_len, long msg_prio, 2776 long msg_ptr, long msg_len, [all...] |
/external/libnfc-nci/src/nfa/int/ |
H A D | nfa_hci_int.h | 395 UINT16 msg_len; /* For segmentation - length of the combined message */ member in struct:__anon10243
|
/external/toybox/generated/ |
H A D | globals.h | 861 unsigned msg_len; member in struct:traceroute_data
|