/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.c | 623 u8 *payload, size_t payload_len) 630 payload_len) < 0) { 621 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 588 const u8 *payload, size_t payload_len) 596 if (payload_len < sizeof(struct eap_pwd_id)) { 612 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 617 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 660 const u8 *payload, size_t payload_len) 673 if (payload_len != 2 * prime_len + order_len) { 676 (unsigned int) payload_len, 787 const u8 *payload, size_t payload_len) 796 if (payload_len != SHA256_MAC_LEN) { 799 (unsigned int) payload_len, SHA256_MAC_LE 586 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 659 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 786 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument [all...] |
H A D | ikev2.c | 689 u8 *payload, size_t payload_len) 696 payload_len) < 0) { 687 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.c | 623 u8 *payload, size_t payload_len) 630 payload_len) < 0) { 621 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 588 const u8 *payload, size_t payload_len) 596 if (payload_len < sizeof(struct eap_pwd_id)) { 612 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 617 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 660 const u8 *payload, size_t payload_len) 673 if (payload_len != 2 * prime_len + order_len) { 676 (unsigned int) payload_len, 787 const u8 *payload, size_t payload_len) 796 if (payload_len != SHA256_MAC_LEN) { 799 (unsigned int) payload_len, SHA256_MAC_LE 586 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 659 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 786 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument [all...] |
H A D | ikev2.c | 689 u8 *payload, size_t payload_len) 696 payload_len) < 0) { 687 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/syslinux/gpxe/src/net/ |
H A D | tls.c | 973 size_t payload_len = tls_uint24 ( handshake->length ); local 974 void *end = ( payload + payload_len ); 986 rc = tls_new_server_hello ( tls, payload, payload_len ); 989 rc = tls_new_certificate ( tls, payload, payload_len ); 992 rc = tls_new_server_hello_done ( tls, payload, payload_len ); 995 rc = tls_new_finished ( tls, payload, payload_len );
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | hs20_supplicant.c | 173 void hs20_put_anqp_req(u32 stypes, const u8 *payload, size_t payload_len, argument 188 wpabuf_put_data(buf, payload, payload_len); 193 wpabuf_put_data(buf, payload, payload_len); 210 size_t payload_len) 214 buf = gas_anqp_build_initial_req(0, 100 + payload_len); 218 hs20_put_anqp_req(stypes, payload, payload_len, buf); 225 const u8 *payload, size_t payload_len, int inmem) 248 buf = hs20_build_anqp_req(stypes, payload, payload_len); 266 icon_entry->file_name = os_malloc(payload_len + 1); 271 os_memcpy(icon_entry->file_name, payload, payload_len); 209 hs20_build_anqp_req(u32 stypes, const u8 *payload, size_t payload_len) argument 224 hs20_anqp_send_req(struct wpa_supplicant *wpa_s, const u8 *dst, u32 stypes, const u8 *payload, size_t payload_len, int inmem) argument [all...] |
/external/syslinux/gpxe/src/drivers/infiniband/ |
H A D | linda.c | 1184 size_t payload_len; local 1240 &payload_len, &av ) ) != 0 ) { 1286 iob_put ( iobuf, payload_len );
|
/external/webrtc/webrtc/modules/audio_coding/neteq/ |
H A D | neteq_unittest.cc | 305 size_t* payload_len); 508 size_t* payload_len) { 515 *payload_len = 1; // Only noise level, no spectral parameters. 747 size_t payload_len; local 749 PopulateCng(seq_no, timestamp, &rtp_info, payload, &payload_len); 752 rtc::ArrayView<const uint8_t>(payload, payload_len), 0)); 796 size_t payload_len; local 798 PopulateCng(seq_no, timestamp, &rtp_info, payload, &payload_len); 801 rtc::ArrayView<const uint8_t>(payload, payload_len), 0)); 1544 size_t payload_len; local 504 PopulateCng(int frame_index, int timestamp, WebRtcRTPHeader* rtp_info, uint8_t* payload, size_t* payload_len) argument 1610 size_t payload_len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | dpp.c | 3786 u16 payload_len) 3794 root = json_parse((const char *) payload, payload_len); 3950 size_t payload_len; member in struct:dpp_signed_connector_info 4022 end - pos, &info->payload_len); 4030 info->payload, info->payload_len); 4154 if (dpp_parse_connector(auth, info.payload, info.payload_len) < 0) { 4697 root = json_parse((const char *) info.payload, info.payload_len); 3784 dpp_parse_connector(struct dpp_authentication *auth, const unsigned char *payload, u16 payload_len) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 1338 size_t payload_len, id_len; local 1348 payload_len = WPA_GET_BE24(pos); 1351 if ((size_t) (end - pos) < payload_len) 1353 end = pos + payload_len; 1379 size_t payload_len; local 1393 payload_len = WPA_GET_BE24(pos); 1396 if ((size_t) (end - pos) < payload_len) 1398 end = pos + payload_len; 1442 size_t payload_len = WPA_GET_BE16(pos + 1); local 1443 if (payload_len [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | dpp.c | 3786 u16 payload_len) 3794 root = json_parse((const char *) payload, payload_len); 3950 size_t payload_len; member in struct:dpp_signed_connector_info 4022 end - pos, &info->payload_len); 4030 info->payload, info->payload_len); 4154 if (dpp_parse_connector(auth, info.payload, info.payload_len) < 0) { 4697 root = json_parse((const char *) info.payload, info.payload_len); 3784 dpp_parse_connector(struct dpp_authentication *auth, const unsigned char *payload, u16 payload_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 1338 size_t payload_len, id_len; local 1348 payload_len = WPA_GET_BE24(pos); 1351 if ((size_t) (end - pos) < payload_len) 1353 end = pos + payload_len; 1379 size_t payload_len; local 1393 payload_len = WPA_GET_BE24(pos); 1396 if ((size_t) (end - pos) < payload_len) 1398 end = pos + payload_len; 1442 size_t payload_len = WPA_GET_BE16(pos + 1); local 1443 if (payload_len [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | dpp.c | 3786 u16 payload_len) 3794 root = json_parse((const char *) payload, payload_len); 3950 size_t payload_len; member in struct:dpp_signed_connector_info 4022 end - pos, &info->payload_len); 4030 info->payload, info->payload_len); 4154 if (dpp_parse_connector(auth, info.payload, info.payload_len) < 0) { 4697 root = json_parse((const char *) info.payload, info.payload_len); 3784 dpp_parse_connector(struct dpp_authentication *auth, const unsigned char *payload, u16 payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 1338 size_t payload_len, id_len; local 1348 payload_len = WPA_GET_BE24(pos); 1351 if ((size_t) (end - pos) < payload_len) 1353 end = pos + payload_len; 1379 size_t payload_len; local 1393 payload_len = WPA_GET_BE24(pos); 1396 if ((size_t) (end - pos) < payload_len) 1398 end = pos + payload_len; 1442 size_t payload_len = WPA_GET_BE16(pos + 1); local 1443 if (payload_len [all...] |
/external/webrtc/webrtc/examples/androidapp/third_party/autobanh/ |
H A D | autobanh.jar | META-INF/MANIFEST.MF de/tavendo/autobahn/ByteBufferInputStream.class ByteBufferInputStream.java package de.tavendo ... |