/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha1.h | 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 19 const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
|
H A D | rc4.c | 17 u8 *data, size_t data_len) in rc4_skip() 46 for (k = 0; k < data_len; k++) { in rc4_skip() 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) rc4_skip() argument
|
H A D | sha1.c | 100 * @data_len: Length of the data area 104 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 107 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1()
|
H A D | sha256.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) in hmac_sha256() 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument
|
H A D | sha384.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) in hmac_sha384() 103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha384() 100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument
|
H A D | sha512.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) in hmac_sha512() 103 return hmac_sha512_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha512() 100 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument
|
H A D | crypto_wolfssl.c | 193 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 196 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 210 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 213 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1() 228 size_t data_len, u8 *mac) in hmac_sha256() 230 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 247 size_t data_len, u8 *mac) in hmac_sha384() 249 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha384() 266 size_t data_len, u8 *mac) in hmac_sha512() 268 return hmac_sha512_vector(key, key_len, 1, &data, &data_len, ma in hmac_sha512() 227 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 246 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 265 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 374 aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) aes_128_cbc_encrypt() argument 393 aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) aes_128_cbc_decrypt() argument 440 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) rc4_skip() argument 1000 omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) omac1_aes_128() argument 1006 omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, u8 *mac) omac1_aes_256() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | offchannel.h | 19 const u8 *data, size_t data_len, 31 size_t data_len, enum offchannel_send_action_result result);
|
H A D | ibss_rsn.c | 86 u16 data_len, size_t *msg_len, void **data_pos) in supp_alloc_eapol() 90 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", in supp_alloc_eapol() 91 __func__, type, data_len); in supp_alloc_eapol() 93 *msg_len = sizeof(*hdr) + data_len; in supp_alloc_eapol() 100 hdr->length = host_to_be16(data_len); in supp_alloc_eapol() 103 os_memcpy(hdr + 1, data, data_len); in supp_alloc_eapol() 105 os_memset(hdr + 1, 0, data_len); in supp_alloc_eapol() 302 size_t data_len, int encrypt) in auth_send_eapol() 307 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR_SEC " data_len=%lu " in auth_send_eapol() 309 __func__, MAC2STR_SEC(addr), (unsigned long) data_len, encryp in auth_send_eapol() 85 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) supp_alloc_eapol() argument 301 auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, size_t data_len, int encrypt) auth_send_eapol() argument [all...] |
/third_party/ffmpeg/libavcodec/ |
H A D | vaapi_encode_mpeg2.c | 69 char *data, size_t *data_len, in vaapi_encode_mpeg2_write_fragment() 81 if (*data_len < 8 * frag->data_size - frag->data_bit_padding) { in vaapi_encode_mpeg2_write_fragment() 83 "%zu < %zu.\n", *data_len, in vaapi_encode_mpeg2_write_fragment() 89 *data_len = 8 * frag->data_size - frag->data_bit_padding; in vaapi_encode_mpeg2_write_fragment() 111 char *data, size_t *data_len) in vaapi_encode_mpeg2_write_sequence_header() 137 err = vaapi_encode_mpeg2_write_fragment(avctx, data, data_len, frag); in vaapi_encode_mpeg2_write_sequence_header() 145 char *data, size_t *data_len) in vaapi_encode_mpeg2_write_picture_header() 161 err = vaapi_encode_mpeg2_write_fragment(avctx, data, data_len, frag); in vaapi_encode_mpeg2_write_picture_header() 68 vaapi_encode_mpeg2_write_fragment(AVCodecContext *avctx, char *data, size_t *data_len, CodedBitstreamFragment *frag) vaapi_encode_mpeg2_write_fragment() argument 110 vaapi_encode_mpeg2_write_sequence_header(AVCodecContext *avctx, char *data, size_t *data_len) vaapi_encode_mpeg2_write_sequence_header() argument 143 vaapi_encode_mpeg2_write_picture_header(AVCodecContext *avctx, VAAPIEncodePicture *pic, char *data, size_t *data_len) vaapi_encode_mpeg2_write_picture_header() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth.h | 306 size_t data_len, int encrypt); 312 size_t data_len); 314 size_t data_len); 341 const u8 *data, size_t data_len); 389 u8 *data, size_t data_len); 471 const u8 *data, size_t data_len); 474 size_t data_len); 562 const u8 *data, size_t data_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | rc4.c | 17 u8 *data, size_t data_len) in rc4_skip() 46 for (k = 0; k < data_len; k++) { in rc4_skip() 16 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) rc4_skip() argument
|
H A D | sha1.c | 100 * @data_len: Length of the data area 104 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 107 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1()
|
H A D | sha256.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) in hmac_sha256() 103 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 100 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument
|
H A D | sha384.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) in hmac_sha384() 103 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha384() 100 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument
|
H A D | sha512.c | 96 * @data_len: Length of the data area 101 size_t data_len, u8 *mac) in hmac_sha512() 103 return hmac_sha512_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha512() 100 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument
|
H A D | crypto_wolfssl.c | 193 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 196 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 210 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 213 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1() 228 size_t data_len, u8 *mac) in hmac_sha256() 230 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 247 size_t data_len, u8 *mac) in hmac_sha384() 249 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha384() 266 size_t data_len, u8 *mac) in hmac_sha512() 268 return hmac_sha512_vector(key, key_len, 1, &data, &data_len, ma in hmac_sha512() 227 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 246 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 265 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 374 aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) aes_128_cbc_encrypt() argument 393 aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) aes_128_cbc_decrypt() argument 440 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) rc4_skip() argument 996 omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac) omac1_aes_128() argument 1002 omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, u8 *mac) omac1_aes_256() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | dpp_hostapd.h | 19 const u8 *data, size_t data_len, int ok); 23 const u8 *data, size_t data_len);
|
/third_party/node/deps/cares/src/lib/ |
H A D | ares__buf.h | 61 * \param[in] data_len Size of buffer provided, must be > 0 65 ares__buf_t *ares__buf_create_const(const unsigned char *data, size_t data_len); 79 * \param[in] data_len Length of data to copy to buffer object. 83 size_t data_len); 180 * \param[in] data_len Length of data to hexdump 455 * \param[in] data_len Length of data to compare. 459 const unsigned char *data, size_t data_len);
|
/third_party/rust/crates/bindgen/bindgen-tests/tests/expectations/tests/ |
H A D | layout_kni_mbuf.rs | 26 ///< Total pkt len: sum of all segment data_len. 29 pub data_len: u16, 160 ::std::ptr::addr_of!((*ptr).data_len) as usize - ptr as usize in bindgen_test_layout_rte_kni_mbuf() 167 stringify!(data_len) in bindgen_test_layout_rte_kni_mbuf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs8.c | 128 size_t data_len; in pkcs8_enc_key_import() local 178 passwd, &data_len); in pkcs8_enc_key_import() 181 key = pkcs8_key_import(data, data_len); in pkcs8_enc_key_import()
|
/third_party/pulseaudio/src/pulsecore/ |
H A D | database-simple.c | 136 uint32_t data_len = 0; in read_data() local 143 if ((items = read_uint(f, &data_len)) <= 0) in read_data() 146 if (data_len > 0) { in read_data() 147 *data = pa_xmalloc0(data_len); in read_data() 148 items = fread(*data, data_len, 1, f); in read_data() 156 *length = data_len; in read_data()
|
/third_party/libsnd/src/ |
H A D | sd2.c | 512 int k, str_offset, rsrc_id, data_offset = 0, data_len = 0 ; in parse_str_rsrc() local 520 for (k = 0 ; data_offset + data_len < rsrc->rsrc_len ; k++) in parse_str_rsrc() 541 data_len = read_rsrc_int (rsrc, data_offset) ; in parse_str_rsrc() 542 if (data_len < 0 || data_len > rsrc->rsrc_len) in parse_str_rsrc() 543 { psf_log_printf (psf, "Exiting parser on data length of %d.\n", data_len) ; in parse_str_rsrc() 550 psf_log_printf (psf, " 0x%04x %4d %4d %3d '%s'\n", data_offset, rsrc_id, data_len, slen, value) ; in parse_str_rsrc()
|
/third_party/pulseaudio/src/modules/rtp/ |
H A D | rtp-gstreamer.c | 603 uint64_t data_len = 0; in pa_rtp_recv() local 642 data_len += info.size; in pa_rtp_recv() 656 buf_list = gst_adapter_take_buffer_list(adapter, data_len); in pa_rtp_recv() 659 pa_assert(pa_mempool_block_size_max(pool) >= data_len); in pa_rtp_recv() 661 chunk->memblock = pa_memblock_new(pool, data_len); in pa_rtp_recv() 663 chunk->length = data_len; in pa_rtp_recv() 695 uint32_t expected = c->last_timestamp + (uint32_t) (data_len / pa_rtp_context_get_frame_size(c)); in pa_rtp_recv()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 57 size_t data_len, u8 *hash) in ikev2_integ_hash() 65 if (hmac_sha1(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash() 72 if (hmac_md5(key, key_len, data, data_len, tmphash) < 0) in ikev2_integ_hash() 114 const u8 *data, size_t data_len, in ikev2_prf_plus() 133 len[1] = data_len; in ikev2_prf_plus() 632 const u8 *skeyseed, const u8 *data, size_t data_len, in ikev2_derive_sk_keys() 655 data, data_len, keybuf, keybuf_len)) { in ikev2_derive_sk_keys() 56 ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *hash) ikev2_integ_hash() argument 113 ikev2_prf_plus(int alg, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *out, size_t out_len) ikev2_prf_plus() argument 629 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) ikev2_derive_sk_keys() argument
|