/external/syslinux/core/fs/ntfs/ |
H A D | ntfs.c | 46 static int parse_data_run(const void *stream, uint32_t *offset, uint8_t *attr_len, struct mapping_chunk *chunk); 201 uint8_t *attr_len = NULL; local 220 attr_len = (uint8_t *)attr + attr->len; 223 err = parse_data_run(stream, &attr_offset, attr_len, &chunk); 338 uint8_t *attr_len, struct mapping_chunk *chunk) 350 (void)attr_len; 357 if (buf > attr_len || !*buf) { 411 uint8_t *attr_len; local 449 attr_len = (uint8_t *)attr + attr->len; 452 err = parse_data_run(stream, &offset, attr_len, 337 parse_data_run(const void *stream, uint32_t *offset, uint8_t *attr_len, struct mapping_chunk *chunk) argument 617 uint8_t *attr_len; local 737 uint8_t *attr_len; local 1035 uint8_t *attr_len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | dpp.h | 228 const u8 *attr_start, size_t attr_len); 232 const u8 *attr_start, size_t attr_len); 239 size_t attr_len);
|
H A D | dpp.c | 1344 size_t len[2], siv_len, attr_len; local 1397 attr_len = 2 * (4 + SHA256_MAC_LEN) + 4 + wpabuf_len(pi) + 1399 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_REQ, attr_len); 1876 size_t len[2], siv_len, attr_len; local 1941 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + 1943 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_RESP, attr_len); 2055 size_t len[2], siv_len, attr_len; local 2061 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + 4 + sizeof(wrapped_data); 2062 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_RESP, attr_len); 2160 size_t attr_len; local 2371 size_t len[2], attr_len; local 2444 dpp_auth_resp_rx_status(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, const u8 *wrapped_data, u16 wrapped_data_len, enum dpp_status_error status) argument 2531 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) argument 2795 dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) argument 3393 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, size_t attr_len) argument 5000 size_t attr_len; local 5150 size_t attr_len; local [all...] |
H A D | ieee802_11_common.c | 1470 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len) argument 1476 if (len < 6 + attr_len) { 1478 "MBO: Not enough room in buffer for MBO IE: buf len = %zu, attr_len = %zu", 1479 len, attr_len); 1484 *buf++ = attr_len + 4; 1488 os_memcpy(buf, attr, attr_len); 1490 return 6 + attr_len;
|
H A D | ieee802_11_common.h | 181 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len);
|
/external/wpa_supplicant_8/src/common/ |
H A D | dpp.h | 228 const u8 *attr_start, size_t attr_len); 232 const u8 *attr_start, size_t attr_len); 239 size_t attr_len);
|
H A D | dpp.c | 1344 size_t len[2], siv_len, attr_len; local 1397 attr_len = 2 * (4 + SHA256_MAC_LEN) + 4 + wpabuf_len(pi) + 1399 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_REQ, attr_len); 1876 size_t len[2], siv_len, attr_len; local 1941 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + 1943 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_RESP, attr_len); 2055 size_t len[2], siv_len, attr_len; local 2061 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + 4 + sizeof(wrapped_data); 2062 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_RESP, attr_len); 2160 size_t attr_len; local 2371 size_t len[2], attr_len; local 2444 dpp_auth_resp_rx_status(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, const u8 *wrapped_data, u16 wrapped_data_len, enum dpp_status_error status) argument 2531 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) argument 2795 dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) argument 3393 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, size_t attr_len) argument 5000 size_t attr_len; local 5150 size_t attr_len; local [all...] |
H A D | ieee802_11_common.c | 1470 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len) argument 1476 if (len < 6 + attr_len) { 1478 "MBO: Not enough room in buffer for MBO IE: buf len = %zu, attr_len = %zu", 1479 len, attr_len); 1484 *buf++ = attr_len + 4; 1488 os_memcpy(buf, attr, attr_len); 1490 return 6 + attr_len;
|
H A D | ieee802_11_common.h | 181 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | dpp.h | 228 const u8 *attr_start, size_t attr_len); 232 const u8 *attr_start, size_t attr_len); 239 size_t attr_len);
|
H A D | dpp.c | 1344 size_t len[2], siv_len, attr_len; local 1397 attr_len = 2 * (4 + SHA256_MAC_LEN) + 4 + wpabuf_len(pi) + 1399 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_REQ, attr_len); 1876 size_t len[2], siv_len, attr_len; local 1941 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + 1943 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_RESP, attr_len); 2055 size_t len[2], siv_len, attr_len; local 2061 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + 4 + sizeof(wrapped_data); 2062 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_RESP, attr_len); 2160 size_t attr_len; local 2371 size_t len[2], attr_len; local 2444 dpp_auth_resp_rx_status(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, const u8 *wrapped_data, u16 wrapped_data_len, enum dpp_status_error status) argument 2531 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) argument 2795 dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) argument 3393 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, size_t attr_len) argument 5000 size_t attr_len; local 5150 size_t attr_len; local [all...] |
H A D | ieee802_11_common.c | 1470 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len) argument 1476 if (len < 6 + attr_len) { 1478 "MBO: Not enough room in buffer for MBO IE: buf len = %zu, attr_len = %zu", 1479 len, attr_len); 1484 *buf++ = attr_len + 4; 1488 os_memcpy(buf, attr, attr_len); 1490 return 6 + attr_len;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 646 "attr_len=%lu)", 1050 int attr_len = 2 + len; local 1057 pad_len = (4 - attr_len % 4) % 4; 1058 attr_len += pad_len; 1059 if (wpabuf_resize(&msg->buf, attr_len)) 1063 wpabuf_put_u8(msg->buf, attr_len / 4); 1074 int attr_len = 4 + len; local 1081 pad_len = (4 - attr_len % 4) % 4; 1082 attr_len += pad_len; 1083 if (wpabuf_resize(&msg->buf, attr_len)) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 646 "attr_len=%lu)", 1050 int attr_len = 2 + len; local 1057 pad_len = (4 - attr_len % 4) % 4; 1058 attr_len += pad_len; 1059 if (wpabuf_resize(&msg->buf, attr_len)) 1063 wpabuf_put_u8(msg->buf, attr_len / 4); 1074 int attr_len = 4 + len; local 1081 pad_len = (4 - attr_len % 4) % 4; 1082 attr_len += pad_len; 1083 if (wpabuf_resize(&msg->buf, attr_len)) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 646 "attr_len=%lu)", 1050 int attr_len = 2 + len; local 1057 pad_len = (4 - attr_len % 4) % 4; 1058 attr_len += pad_len; 1059 if (wpabuf_resize(&msg->buf, attr_len)) 1063 wpabuf_put_u8(msg->buf, attr_len / 4); 1074 int attr_len = 4 + len; local 1081 pad_len = (4 - attr_len % 4) % 4; 1082 attr_len += pad_len; 1083 if (wpabuf_resize(&msg->buf, attr_len)) [all...] |
/external/scapy/scapy/layers/ |
H A D | radius.py | 1074 attr_len = orb(remain[1]) 1075 current = remain[:attr_len] 1076 remain = remain[attr_len:]
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_build.c | 479 size_t *total_len, u8 *attr_len) 589 WPA_PUT_LE16(attr_len, (u16) *total_len); 602 u8 *pos, *attr_len, *ie_len = NULL; local 626 attr_len = wpabuf_put(tmp_buf, sizeof(u16)); 627 WPA_PUT_LE16(attr_len, (u16) total_len); 634 &ie_len, &pos, &total_len, attr_len); 652 attr_len)) 476 p2p_buf_add_service_info(struct wpabuf *buf, struct p2p_data *p2p, u32 adv_id, u16 config_methods, const char *svc_name, u8 **ie_len, u8 **pos, size_t *total_len, u8 *attr_len) argument
|
H A D | p2p_parse.c | 428 u16 attr_len; local 436 attr_len = WPA_GET_LE16(pos); 439 id, attr_len); 440 if (attr_len > end - pos) { 443 attr_len, (int) (end - pos)); 447 if (p2p_parse_attribute(id, pos, attr_len, msg)) 449 pos += attr_len;
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_build.c | 479 size_t *total_len, u8 *attr_len) 589 WPA_PUT_LE16(attr_len, (u16) *total_len); 602 u8 *pos, *attr_len, *ie_len = NULL; local 626 attr_len = wpabuf_put(tmp_buf, sizeof(u16)); 627 WPA_PUT_LE16(attr_len, (u16) total_len); 634 &ie_len, &pos, &total_len, attr_len); 652 attr_len)) 476 p2p_buf_add_service_info(struct wpabuf *buf, struct p2p_data *p2p, u32 adv_id, u16 config_methods, const char *svc_name, u8 **ie_len, u8 **pos, size_t *total_len, u8 *attr_len) argument
|
H A D | p2p_parse.c | 428 u16 attr_len; local 436 attr_len = WPA_GET_LE16(pos); 439 id, attr_len); 440 if (attr_len > end - pos) { 443 attr_len, (int) (end - pos)); 447 if (p2p_parse_attribute(id, pos, attr_len, msg)) 449 pos += attr_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_build.c | 479 size_t *total_len, u8 *attr_len) 589 WPA_PUT_LE16(attr_len, (u16) *total_len); 602 u8 *pos, *attr_len, *ie_len = NULL; local 626 attr_len = wpabuf_put(tmp_buf, sizeof(u16)); 627 WPA_PUT_LE16(attr_len, (u16) total_len); 634 &ie_len, &pos, &total_len, attr_len); 652 attr_len)) 476 p2p_buf_add_service_info(struct wpabuf *buf, struct p2p_data *p2p, u32 adv_id, u16 config_methods, const char *svc_name, u8 **ie_len, u8 **pos, size_t *total_len, u8 *attr_len) argument
|
H A D | p2p_parse.c | 428 u16 attr_len; local 436 attr_len = WPA_GET_LE16(pos); 439 id, attr_len); 440 if (attr_len > end - pos) { 443 attr_len, (int) (end - pos)); 447 if (p2p_parse_attribute(id, pos, attr_len, msg)) 449 pos += attr_len;
|
/external/scapy/scapy/contrib/ |
H A D | bgp.py | 1070 attr_len = 0 1072 attr_len = struct.unpack("!H", remain[2:4])[0] 1073 current = remain[:4 + attr_len] 1074 remain = remain[4 + attr_len:] 1076 attr_len = orb(remain[2]) 1077 current = remain[:3 + attr_len] 1078 remain = remain[3 + attr_len:] 2029 ByteField("attr_len", None), 2063 if self.attr_len is None:
|
/external/curl/lib/ |
H A D | ldap.c | 574 size_t attr_len; local 588 attr_len = strlen(attr); 607 (char *) attr, attr_len); 633 dlsize += attr_len + 3; 635 if((attr_len > 7) && 636 (strcmp(";binary", (char *) attr + (attr_len - 7)) == 0)) {
|
/external/libpcap/ |
H A D | pcap-netfilter-linux.c | 147 int attr_len = nlh->nlmsg_len - NLMSG_ALIGN(HDR_LENGTH); local 149 while (NFA_OK(attr, attr_len)) { 171 attr = NFA_NEXT(attr, attr_len);
|