Home
last modified time | relevance | path

Searched refs:data_len (Results 251 - 275 of 404) sorted by relevance

1...<<11121314151617

/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Drrm.c282 const u8 *data, size_t data_len) in wpas_rrm_report_elem()
284 if (wpabuf_resize(buf, 5 + data_len)) in wpas_rrm_report_elem()
288 wpabuf_put_u8(*buf, 3 + data_len); in wpas_rrm_report_elem()
293 if (data_len) in wpas_rrm_report_elem()
294 wpabuf_put_data(*buf, data, data_len); in wpas_rrm_report_elem()
281 wpas_rrm_report_elem(struct wpabuf **buf, u8 token, u8 mode, u8 type, const u8 *data, size_t data_len) wpas_rrm_report_elem() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Drrm.c292 const u8 *data, size_t data_len) in wpas_rrm_report_elem()
294 if (wpabuf_resize(buf, 5 + data_len)) in wpas_rrm_report_elem()
298 wpabuf_put_u8(*buf, 3 + data_len); in wpas_rrm_report_elem()
303 if (data_len) in wpas_rrm_report_elem()
304 wpabuf_put_data(*buf, data, data_len); in wpas_rrm_report_elem()
291 wpas_rrm_report_elem(struct wpabuf **buf, u8 token, u8 mode, u8 type, const u8 *data, size_t data_len) wpas_rrm_report_elem() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dwpa_auth.c51 u8 *data, size_t data_len);
206 const u8 *data, size_t data_len, int encrypt) in wpa_auth_send_eapol()
210 return wpa_auth->cb->send_eapol(wpa_auth->cb_ctx, addr, data, data_len, in wpa_auth_send_eapol()
957 size_t data_len) in wpa_try_alt_snonce()
990 data, data_len) == 0) { in wpa_try_alt_snonce()
1041 u8 *data, size_t data_len) in wpa_receive()
1055 wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL data", data, data_len); in wpa_receive()
1060 if (data_len < sizeof(*hdr) + keyhdrlen) { in wpa_receive()
1080 if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) { in wpa_receive()
1084 data_len in wpa_receive()
205 wpa_auth_send_eapol(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *data, size_t data_len, int encrypt) wpa_auth_send_eapol() argument
956 wpa_try_alt_snonce(struct wpa_state_machine *sm, u8 *data, size_t data_len) wpa_try_alt_snonce() argument
1039 wpa_receive(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, u8 *data, size_t data_len) wpa_receive() argument
1770 wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, u8 *data, size_t data_len) wpa_verify_key_mic() argument
[all...]
H A Dwpa_auth_ft.c628 const u8 *data, size_t data_len) in wpa_ft_rrb_send()
634 data, data_len); in wpa_ft_rrb_send()
640 const u8 *data, size_t data_len) in wpa_ft_rrb_oui_send()
645 oui_suffix, MAC2STR_SEC(dst), (unsigned int) data_len); in wpa_ft_rrb_oui_send()
647 data_len); in wpa_ft_rrb_oui_send()
652 const u8 *dst, const u8 *data, size_t data_len) in wpa_ft_action_send()
657 data, data_len); in wpa_ft_action_send()
4549 const u8 *data, size_t data_len) in wpa_ft_rrb_rx()
4560 if (data_len < sizeof(*frame)) { in wpa_ft_rrb_rx()
4561 wpa_printf(MSG_DEBUG, "FT: Too short RRB frame (data_len in wpa_ft_rrb_rx()
627 wpa_ft_rrb_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) wpa_ft_rrb_send() argument
638 wpa_ft_rrb_oui_send(struct wpa_authenticator *wpa_auth, const u8 *dst, u8 oui_suffix, const u8 *data, size_t data_len) wpa_ft_rrb_oui_send() argument
651 wpa_ft_action_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) wpa_ft_action_send() argument
4548 wpa_ft_rrb_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) wpa_ft_rrb_rx() argument
4660 wpa_ft_rrb_oui_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *dst_addr, u8 oui_suffix, const u8 *data, size_t data_len) wpa_ft_rrb_oui_rx() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dwpa_auth.c42 u8 *data, size_t data_len);
165 const u8 *data, size_t data_len, int encrypt) in wpa_auth_send_eapol()
169 return wpa_auth->cb->send_eapol(wpa_auth->cb_ctx, addr, data, data_len, in wpa_auth_send_eapol()
881 size_t data_len) in wpa_try_alt_snonce()
913 data, data_len) == 0) { in wpa_try_alt_snonce()
952 u8 *data, size_t data_len) in wpa_receive()
966 wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL data", data, data_len); in wpa_receive()
971 if (data_len < sizeof(*hdr) + keyhdrlen) { in wpa_receive()
991 if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) { in wpa_receive()
995 (unsigned long) (data_len in wpa_receive()
164 wpa_auth_send_eapol(struct wpa_authenticator *wpa_auth, const u8 *addr, const u8 *data, size_t data_len, int encrypt) wpa_auth_send_eapol() argument
880 wpa_try_alt_snonce(struct wpa_state_machine *sm, u8 *data, size_t data_len) wpa_try_alt_snonce() argument
950 wpa_receive(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, u8 *data, size_t data_len) wpa_receive() argument
1688 wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK, u8 *data, size_t data_len) wpa_verify_key_mic() argument
[all...]
H A Dwpa_auth_ft.c627 const u8 *data, size_t data_len) in wpa_ft_rrb_send()
633 data, data_len); in wpa_ft_rrb_send()
639 const u8 *data, size_t data_len) in wpa_ft_rrb_oui_send()
644 oui_suffix, MAC2STR(dst), (unsigned int) data_len); in wpa_ft_rrb_oui_send()
646 data_len); in wpa_ft_rrb_oui_send()
651 const u8 *dst, const u8 *data, size_t data_len) in wpa_ft_action_send()
656 data, data_len); in wpa_ft_action_send()
4317 const u8 *data, size_t data_len) in wpa_ft_rrb_rx()
4328 if (data_len < sizeof(*frame)) { in wpa_ft_rrb_rx()
4329 wpa_printf(MSG_DEBUG, "FT: Too short RRB frame (data_len in wpa_ft_rrb_rx()
626 wpa_ft_rrb_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) wpa_ft_rrb_send() argument
637 wpa_ft_rrb_oui_send(struct wpa_authenticator *wpa_auth, const u8 *dst, u8 oui_suffix, const u8 *data, size_t data_len) wpa_ft_rrb_oui_send() argument
650 wpa_ft_action_send(struct wpa_authenticator *wpa_auth, const u8 *dst, const u8 *data, size_t data_len) wpa_ft_action_send() argument
4316 wpa_ft_rrb_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *data, size_t data_len) wpa_ft_rrb_rx() argument
4434 wpa_ft_rrb_oui_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *dst_addr, u8 oui_suffix, const u8 *data, size_t data_len) wpa_ft_rrb_oui_rx() argument
[all...]
/third_party/ffmpeg/libavdevice/
H A Ddecklink_dec.cpp451 unsigned int data_len; in get_metadata() local
458 data = vanc_to_cc(avctx, buf, width, data_len); in get_metadata()
460 if (av_packet_add_side_data(pkt, AV_PKT_DATA_A53_CC, data, data_len) < 0) in get_metadata()
633 uint32_t data_len = size - 3; in handle_klv() local
634 total_size += data_len; in handle_klv()
637 packet.data.resize(data_len); in handle_klv()
638 memcpy(packet.data.data(), data + 3, data_len); in handle_klv()
/third_party/backends/backend/
H A Depson2-commands.h62 size_t * data_len);
H A Dhs2p-scsi.h456 SANE_Byte data_len; /* Mode Data Length NOT USED so must be 0 */ member
1036 SANE_Byte data_len[2]; /* Window Data Length indicates byte len of data which follows less its own 2 bytes */ member
H A Depson2-commands.c1019 size_t * data_len) in esci_request_extended_status()
1087 if (data_len) in esci_request_extended_status()
1088 *data_len = buf_len; in esci_request_extended_status()
1018 esci_request_extended_status(SANE_Handle handle, unsigned char **data, size_t * data_len) esci_request_extended_status() argument
/third_party/mbedtls/library/
H A Dhmac_drbg.c99 const unsigned char *data, size_t data_len) in mbedtls_hmac_drbg_seed_buf()
122 if ((ret = mbedtls_hmac_drbg_update(ctx, data, data_len)) != 0) { in mbedtls_hmac_drbg_seed_buf()
97 mbedtls_hmac_drbg_seed_buf(mbedtls_hmac_drbg_context *ctx, const mbedtls_md_info_t *md_info, const unsigned char *data, size_t data_len) mbedtls_hmac_drbg_seed_buf() argument
H A Dssl_tls12_server.c3730 size_t data_len = (size_t) (*p++); in ssl_parse_client_key_exchange() local
3746 if (data_len < 1 || data_len > buf_len) { in ssl_parse_client_key_exchange()
3749 data_len, buf_len)); in ssl_parse_client_key_exchange()
3754 if (data_len > sizeof(handshake->xxdh_psa_peerkey)) { in ssl_parse_client_key_exchange()
3757 data_len, in ssl_parse_client_key_exchange()
3761 memcpy(handshake->xxdh_psa_peerkey, p, data_len); in ssl_parse_client_key_exchange()
3762 handshake->xxdh_psa_peerkey_len = data_len; in ssl_parse_client_key_exchange()
/third_party/node/deps/cares/src/lib/
H A Dares_private.h453 void *data, size_t data_len, int flags,
457 void *data, size_t data_len);
/third_party/python/Lib/test/
H A Dtest_telnetlib.py318 data_len = len(b''.join(data))
326 self.assertEqual(data_len, len(txt + cmd))
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dwpa_i.h239 const void *data, u16 data_len, in wpa_sm_alloc_eapol()
243 return sm->ctx->alloc_eapol(sm->ctx->ctx, type, data, data_len, in wpa_sm_alloc_eapol()
238 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) wpa_sm_alloc_eapol() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
H A Djson.c220 struct json_token * json_parse(const char *data, size_t data_len) in json_parse() argument
230 end = data + data_len; in json_parse()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dgas_server.c437 size_t data_len, int ack) in gas_server_tx_status()
443 if (data_len < 24 + 3) in gas_server_tx_status()
436 gas_server_tx_status(struct gas_server *gas, const u8 *dst, const u8 *data, size_t data_len, int ack) gas_server_tx_status() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dwpa_i.h302 const void *data, u16 data_len, in wpa_sm_alloc_eapol()
306 return sm->ctx->alloc_eapol(sm->ctx->ctx, type, data, data_len, in wpa_sm_alloc_eapol()
301 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) wpa_sm_alloc_eapol() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dpkcs5.c568 const char *passwd, size_t *data_len) in pkcs5_decrypt()
626 *data_len = enc_data_len - pad; in pkcs5_decrypt()
566 pkcs5_decrypt(const u8 *enc_alg, size_t enc_alg_len, const u8 *enc_data, size_t enc_data_len, const char *passwd, size_t *data_len) pkcs5_decrypt() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
H A Djson.c220 struct json_token * json_parse(const char *data, size_t data_len) in json_parse() argument
230 end = data + data_len; in json_parse()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Dgas_server.c384 size_t data_len, int ack) in gas_server_tx_status()
390 if (data_len < 24 + 3) in gas_server_tx_status()
383 gas_server_tx_status(struct gas_server *gas, const u8 *dst, const u8 *data, size_t data_len, int ack) gas_server_tx_status() argument
/third_party/backends/sanei/
H A Dsanei_scsi.c686 PSRBlock->u.cmd.data_len = 5; /* # of bytes transferred */ in open_aspi()
709 PSRBlock->u.cmd.data_len = 5 + len; /* # of bytes transferred */ in open_aspi()
3260 size_t data_len; in sanei_scsi_cmd2() local
3285 data_len = *dst_size; in sanei_scsi_cmd2()
3291 data_len = src_size; in sanei_scsi_cmd2()
3297 data_len = 0; in sanei_scsi_cmd2()
3306 /* dxfer_len */ data_len, in sanei_scsi_cmd2()
3798 sc->data_len = *dst_size; in sanei_scsi_cmd2()
3802 sc->data_len = src_size; in sanei_scsi_cmd2()
4296 PSRBlock->u.cmd.data_len in sanei_scsi_cmd2()
[all...]
/third_party/icu/icu4c/source/common/
H A Dlstmbe.cpp407 int32_t data_len = 0;
408 const int32_t* data = ures_getIntVector(dataRes.getAlias(), &data_len, &status);
444 U_ASSERT(data_len == mat1_size + mat2_size + mat3_size + mat4_size + mat5_size +
/third_party/node/deps/icu-small/source/common/
H A Dlstmbe.cpp407 int32_t data_len = 0;
408 const int32_t* data = ures_getIntVector(dataRes.getAlias(), &data_len, &status);
444 U_ASSERT(data_len == mat1_size + mat2_size + mat3_size + mat4_size + mat5_size +
/third_party/lwip/src/netif/
H A Dlowpan6.c427 u16_t data_len; in lowpan6_frag() local
440 data_len = (max_data_len - 4) & 0xf8; in lowpan6_frag()
441 frag_len = data_len + lowpan6_header_len; in lowpan6_frag()

Completed in 48 milliseconds

1...<<11121314151617