/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | rrm.c | 282 const u8 *data, size_t data_len) in wpas_rrm_report_elem() 284 if (wpabuf_resize(buf, 5 + data_len)) in wpas_rrm_report_elem() 288 wpabuf_put_u8(*buf, 3 + data_len); in wpas_rrm_report_elem() 293 if (data_len) in wpas_rrm_report_elem() 294 wpabuf_put_data(*buf, data, data_len); in wpas_rrm_report_elem() 281 wpas_rrm_report_elem(struct wpabuf **buf, u8 token, u8 mode, u8 type, const u8 *data, size_t data_len) wpas_rrm_report_elem() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | rrm.c | 292 const u8 *data, size_t data_len) in wpas_rrm_report_elem() 294 if (wpabuf_resize(buf, 5 + data_len)) in wpas_rrm_report_elem() 298 wpabuf_put_u8(*buf, 3 + data_len); in wpas_rrm_report_elem() 303 if (data_len) in wpas_rrm_report_elem() 304 wpabuf_put_data(*buf, data, data_len); in wpas_rrm_report_elem() 291 wpas_rrm_report_elem(struct wpabuf **buf, u8 token, u8 mode, u8 type, const u8 *data, size_t data_len) wpas_rrm_report_elem() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth.c | 51 u8 *data, size_t data_len); 206 const u8 *data, size_t data_len, int encrypt) in wpa_auth_send_eapol() 210 return wpa_auth->cb->send_eapol(wpa_auth->cb_ctx, addr, data, data_len, in wpa_auth_send_eapol() 957 size_t data_len) in wpa_try_alt_snonce() 990 data, data_len) == 0) { in wpa_try_alt_snonce() 1041 u8 *data, size_t data_len) in wpa_receive() 1055 wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL data", data, data_len); in wpa_receive() 1060 if (data_len < sizeof(*hdr) + keyhdrlen) { in wpa_receive() 1080 if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) { in wpa_receive() 1084 data_len in wpa_receive() 205 wpa_auth_send_eapol(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *data, size_t data_len, int encrypt) wpa_auth_send_eapol() argument 956 wpa_try_alt_snonce(struct wpa_state_machine *sm, u8 *data, size_t data_len) wpa_try_alt_snonce() argument 1039 wpa_receive(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, u8 *data, size_t data_len) wpa_receive() argument 1770 wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, u8 *data, size_t data_len) wpa_verify_key_mic() argument [all...] |
H A D | wpa_auth_ft.c | 628 const u8 *data, size_t data_len) in wpa_ft_rrb_send() 634 data, data_len); in wpa_ft_rrb_send() 640 const u8 *data, size_t data_len) in wpa_ft_rrb_oui_send() 645 oui_suffix, MAC2STR_SEC(dst), (unsigned int) data_len); in wpa_ft_rrb_oui_send() 647 data_len); in wpa_ft_rrb_oui_send() 652 const u8 *dst, const u8 *data, size_t data_len) in wpa_ft_action_send() 657 data, data_len); in wpa_ft_action_send() 4549 const u8 *data, size_t data_len) in wpa_ft_rrb_rx() 4560 if (data_len < sizeof(*frame)) { in wpa_ft_rrb_rx() 4561 wpa_printf(MSG_DEBUG, "FT: Too short RRB frame (data_len in wpa_ft_rrb_rx() 627 wpa_ft_rrb_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) wpa_ft_rrb_send() argument 638 wpa_ft_rrb_oui_send(struct wpa_authenticator *wpa_auth, const u8 *dst, u8 oui_suffix, const u8 *data, size_t data_len) wpa_ft_rrb_oui_send() argument 651 wpa_ft_action_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) wpa_ft_action_send() argument 4548 wpa_ft_rrb_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) wpa_ft_rrb_rx() argument 4660 wpa_ft_rrb_oui_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *dst_addr, u8 oui_suffix, const u8 *data, size_t data_len) wpa_ft_rrb_oui_rx() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth.c | 42 u8 *data, size_t data_len); 165 const u8 *data, size_t data_len, int encrypt) in wpa_auth_send_eapol() 169 return wpa_auth->cb->send_eapol(wpa_auth->cb_ctx, addr, data, data_len, in wpa_auth_send_eapol() 881 size_t data_len) in wpa_try_alt_snonce() 913 data, data_len) == 0) { in wpa_try_alt_snonce() 952 u8 *data, size_t data_len) in wpa_receive() 966 wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL data", data, data_len); in wpa_receive() 971 if (data_len < sizeof(*hdr) + keyhdrlen) { in wpa_receive() 991 if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) { in wpa_receive() 995 (unsigned long) (data_len in wpa_receive() 164 wpa_auth_send_eapol(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *data, size_t data_len, int encrypt) wpa_auth_send_eapol() argument 880 wpa_try_alt_snonce(struct wpa_state_machine *sm, u8 *data, size_t data_len) wpa_try_alt_snonce() argument 950 wpa_receive(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, u8 *data, size_t data_len) wpa_receive() argument 1688 wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, u8 *data, size_t data_len) wpa_verify_key_mic() argument [all...] |
H A D | wpa_auth_ft.c | 627 const u8 *data, size_t data_len) in wpa_ft_rrb_send() 633 data, data_len); in wpa_ft_rrb_send() 639 const u8 *data, size_t data_len) in wpa_ft_rrb_oui_send() 644 oui_suffix, MAC2STR(dst), (unsigned int) data_len); in wpa_ft_rrb_oui_send() 646 data_len); in wpa_ft_rrb_oui_send() 651 const u8 *dst, const u8 *data, size_t data_len) in wpa_ft_action_send() 656 data, data_len); in wpa_ft_action_send() 4317 const u8 *data, size_t data_len) in wpa_ft_rrb_rx() 4328 if (data_len < sizeof(*frame)) { in wpa_ft_rrb_rx() 4329 wpa_printf(MSG_DEBUG, "FT: Too short RRB frame (data_len in wpa_ft_rrb_rx() 626 wpa_ft_rrb_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) wpa_ft_rrb_send() argument 637 wpa_ft_rrb_oui_send(struct wpa_authenticator *wpa_auth, const u8 *dst, u8 oui_suffix, const u8 *data, size_t data_len) wpa_ft_rrb_oui_send() argument 650 wpa_ft_action_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) wpa_ft_action_send() argument 4316 wpa_ft_rrb_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) wpa_ft_rrb_rx() argument 4434 wpa_ft_rrb_oui_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *dst_addr, u8 oui_suffix, const u8 *data, size_t data_len) wpa_ft_rrb_oui_rx() argument [all...] |
/third_party/ffmpeg/libavdevice/ |
H A D | decklink_dec.cpp | 451 unsigned int data_len; in get_metadata() local 458 data = vanc_to_cc(avctx, buf, width, data_len); in get_metadata() 460 if (av_packet_add_side_data(pkt, AV_PKT_DATA_A53_CC, data, data_len) < 0) in get_metadata() 633 uint32_t data_len = size - 3; in handle_klv() local 634 total_size += data_len; in handle_klv() 637 packet.data.resize(data_len); in handle_klv() 638 memcpy(packet.data.data(), data + 3, data_len); in handle_klv()
|
/third_party/backends/backend/ |
H A D | epson2-commands.h | 62 size_t * data_len);
|
H A D | hs2p-scsi.h | 456 SANE_Byte data_len; /* Mode Data Length NOT USED so must be 0 */ member 1036 SANE_Byte data_len[2]; /* Window Data Length indicates byte len of data which follows less its own 2 bytes */ member
|
H A D | epson2-commands.c | 1019 size_t * data_len) in esci_request_extended_status() 1087 if (data_len) in esci_request_extended_status() 1088 *data_len = buf_len; in esci_request_extended_status() 1018 esci_request_extended_status(SANE_Handle handle, unsigned char **data, size_t * data_len) esci_request_extended_status() argument
|
/third_party/mbedtls/library/ |
H A D | hmac_drbg.c | 99 const unsigned char *data, size_t data_len) in mbedtls_hmac_drbg_seed_buf() 122 if ((ret = mbedtls_hmac_drbg_update(ctx, data, data_len)) != 0) { in mbedtls_hmac_drbg_seed_buf() 97 mbedtls_hmac_drbg_seed_buf(mbedtls_hmac_drbg_context *ctx, const mbedtls_md_info_t *md_info, const unsigned char *data, size_t data_len) mbedtls_hmac_drbg_seed_buf() argument
|
H A D | ssl_tls12_server.c | 3730 size_t data_len = (size_t) (*p++); in ssl_parse_client_key_exchange() local 3746 if (data_len < 1 || data_len > buf_len) { in ssl_parse_client_key_exchange() 3749 data_len, buf_len)); in ssl_parse_client_key_exchange() 3754 if (data_len > sizeof(handshake->xxdh_psa_peerkey)) { in ssl_parse_client_key_exchange() 3757 data_len, in ssl_parse_client_key_exchange() 3761 memcpy(handshake->xxdh_psa_peerkey, p, data_len); in ssl_parse_client_key_exchange() 3762 handshake->xxdh_psa_peerkey_len = data_len; in ssl_parse_client_key_exchange()
|
/third_party/node/deps/cares/src/lib/ |
H A D | ares_private.h | 453 void *data, size_t data_len, int flags, 457 void *data, size_t data_len);
|
/third_party/python/Lib/test/ |
H A D | test_telnetlib.py | 318 data_len = len(b''.join(data)) 326 self.assertEqual(data_len, len(txt + cmd))
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa_i.h | 239 const void *data, u16 data_len, in wpa_sm_alloc_eapol() 243 return sm->ctx->alloc_eapol(sm->ctx->ctx, type, data, data_len, in wpa_sm_alloc_eapol() 238 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) wpa_sm_alloc_eapol() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | json.c | 220 struct json_token * json_parse(const char *data, size_t data_len) in json_parse() argument 230 end = data + data_len; in json_parse()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | gas_server.c | 437 size_t data_len, int ack) in gas_server_tx_status() 443 if (data_len < 24 + 3) in gas_server_tx_status() 436 gas_server_tx_status(struct gas_server *gas, const u8 *dst, const u8 *data, size_t data_len, int ack) gas_server_tx_status() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa_i.h | 302 const void *data, u16 data_len, in wpa_sm_alloc_eapol() 306 return sm->ctx->alloc_eapol(sm->ctx->ctx, type, data, data_len, in wpa_sm_alloc_eapol() 301 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) wpa_sm_alloc_eapol() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | pkcs5.c | 568 const char *passwd, size_t *data_len) in pkcs5_decrypt() 626 *data_len = enc_data_len - pad; in pkcs5_decrypt() 566 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | json.c | 220 struct json_token * json_parse(const char *data, size_t data_len) in json_parse() argument 230 end = data + data_len; in json_parse()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | gas_server.c | 384 size_t data_len, int ack) in gas_server_tx_status() 390 if (data_len < 24 + 3) in gas_server_tx_status() 383 gas_server_tx_status(struct gas_server *gas, const u8 *dst, const u8 *data, size_t data_len, int ack) gas_server_tx_status() argument
|
/third_party/backends/sanei/ |
H A D | sanei_scsi.c | 686 PSRBlock->u.cmd.data_len = 5; /* # of bytes transferred */ in open_aspi() 709 PSRBlock->u.cmd.data_len = 5 + len; /* # of bytes transferred */ in open_aspi() 3260 size_t data_len; in sanei_scsi_cmd2() local 3285 data_len = *dst_size; in sanei_scsi_cmd2() 3291 data_len = src_size; in sanei_scsi_cmd2() 3297 data_len = 0; in sanei_scsi_cmd2() 3306 /* dxfer_len */ data_len, in sanei_scsi_cmd2() 3798 sc->data_len = *dst_size; in sanei_scsi_cmd2() 3802 sc->data_len = src_size; in sanei_scsi_cmd2() 4296 PSRBlock->u.cmd.data_len in sanei_scsi_cmd2() [all...] |
/third_party/icu/icu4c/source/common/ |
H A D | lstmbe.cpp | 407 int32_t data_len = 0; 408 const int32_t* data = ures_getIntVector(dataRes.getAlias(), &data_len, &status); 444 U_ASSERT(data_len == mat1_size + mat2_size + mat3_size + mat4_size + mat5_size +
|
/third_party/node/deps/icu-small/source/common/ |
H A D | lstmbe.cpp | 407 int32_t data_len = 0; 408 const int32_t* data = ures_getIntVector(dataRes.getAlias(), &data_len, &status); 444 U_ASSERT(data_len == mat1_size + mat2_size + mat3_size + mat4_size + mat5_size +
|
/third_party/lwip/src/netif/ |
H A D | lowpan6.c | 427 u16_t data_len; in lowpan6_frag() local 440 data_len = (max_data_len - 4) & 0xf8; in lowpan6_frag() 441 frag_len = data_len + lowpan6_header_len; in lowpan6_frag()
|