/external/wpa_supplicant_8/src/common/ |
D | dpp.c | 1539 size_t len[2], siv_len, attr_len; in dpp_auth_build_req() local 1543 attr_len = 2 * (4 + SHA256_MAC_LEN) + 4 + (pi ? wpabuf_len(pi) : 0) + in dpp_auth_build_req() 1546 attr_len += 4 + 2; in dpp_auth_build_req() 1548 attr_len += 5; in dpp_auth_build_req() 1552 attr_len += 5; in dpp_auth_build_req() 1554 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_REQ, attr_len); in dpp_auth_build_req() 1716 size_t len[2], siv_len, attr_len; in dpp_auth_build_resp() local 1723 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + in dpp_auth_build_resp() 1726 attr_len += 5; in dpp_auth_build_resp() 1730 attr_len += 5; in dpp_auth_build_resp() [all …]
|
D | dpp.h | 392 size_t attr_len); 395 const u8 *attr_start, size_t attr_len); 399 const u8 *attr_start, size_t attr_len); 416 size_t attr_len); 421 const u8 *attr_start, size_t attr_len);
|
D | ieee802_11_common.c | 1516 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len) in mbo_add_ie() argument 1522 if (len < 6 + attr_len) { in mbo_add_ie() 1525 len, attr_len); in mbo_add_ie() 1530 *buf++ = attr_len + 4; in mbo_add_ie() 1534 os_memcpy(buf, attr, attr_len); in mbo_add_ie() 1536 return 6 + attr_len; in mbo_add_ie()
|
D | ieee802_11_common.h | 206 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 1050 int attr_len = 2 + len; in eap_sim_msg_add_full() local 1057 pad_len = (4 - attr_len % 4) % 4; in eap_sim_msg_add_full() 1058 attr_len += pad_len; in eap_sim_msg_add_full() 1059 if (wpabuf_resize(&msg->buf, attr_len)) in eap_sim_msg_add_full() 1063 wpabuf_put_u8(msg->buf, attr_len / 4); in eap_sim_msg_add_full() 1074 int attr_len = 4 + len; in eap_sim_msg_add() local 1081 pad_len = (4 - attr_len % 4) % 4; in eap_sim_msg_add() 1082 attr_len += pad_len; in eap_sim_msg_add() 1083 if (wpabuf_resize(&msg->buf, attr_len)) in eap_sim_msg_add() 1087 wpabuf_put_u8(msg->buf, attr_len / 4); in eap_sim_msg_add()
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p_parse.c | 428 u16 attr_len; in p2p_parse_p2p_ie() local 436 attr_len = WPA_GET_LE16(pos); in p2p_parse_p2p_ie() 439 id, attr_len); in p2p_parse_p2p_ie() 440 if (attr_len > end - pos) { in p2p_parse_p2p_ie() 443 attr_len, (int) (end - pos)); in p2p_parse_p2p_ie() 447 if (p2p_parse_attribute(id, pos, attr_len, msg)) in p2p_parse_p2p_ie() 449 pos += attr_len; in p2p_parse_p2p_ie()
|
D | p2p_build.c | 479 size_t *total_len, u8 *attr_len) in p2p_buf_add_service_info() argument 589 WPA_PUT_LE16(attr_len, (u16) *total_len); in p2p_buf_add_service_info() 602 u8 *pos, *attr_len, *ie_len = NULL; in p2p_buf_add_service_instance() local 626 attr_len = wpabuf_put(tmp_buf, sizeof(u16)); in p2p_buf_add_service_instance() 627 WPA_PUT_LE16(attr_len, (u16) total_len); in p2p_buf_add_service_instance() 634 &ie_len, &pos, &total_len, attr_len); in p2p_buf_add_service_instance() 652 attr_len)) in p2p_buf_add_service_instance()
|
/external/curl/lib/ |
D | ldap.c | 571 size_t attr_len; in Curl_ldap() local 585 attr_len = strlen(attr); in Curl_ldap() 604 (char *) attr, attr_len); in Curl_ldap() 630 dlsize += attr_len + 3; in Curl_ldap() 632 if((attr_len > 7) && in Curl_ldap() 633 (strcmp(";binary", (char *) attr + (attr_len - 7)) == 0)) { in Curl_ldap()
|
/external/scapy/scapy/contrib/ |
D | bgp.py | 1070 attr_len = 0 1072 attr_len = struct.unpack("!H", remain[2:4])[0] 1073 current = remain[:4 + attr_len] 1074 remain = remain[4 + attr_len:] 1076 attr_len = orb(remain[2]) 1077 current = remain[:3 + attr_len] 1078 remain = remain[3 + attr_len:] 2063 if self.attr_len is None:
|
/external/scapy/scapy/layers/ |
D | radius.py | 1074 attr_len = orb(remain[1]) 1075 current = remain[:attr_len] 1076 remain = remain[attr_len:]
|
/external/libpcap/ |
D | pcap-netfilter-linux.c | 200 int attr_len = nlh->nlmsg_len - NLMSG_ALIGN(HDR_LENGTH); in netfilter_read_linux() local 202 while (NFA_OK(attr, attr_len)) { in netfilter_read_linux() 224 attr = NFA_NEXT(attr, attr_len); in netfilter_read_linux()
|
/external/e2fsprogs/lib/blkid/ |
D | probe.c | 691 int mft_record_size, attr_off, attr_len; in probe_ntfs() local 754 attr_len = blkid_le16(attr->len); in probe_ntfs() 759 attr_off += attr_len; in probe_ntfs() 762 (attr_len == 0)) in probe_ntfs()
|
/external/wpa_supplicant_8/src/ap/ |
D | wps_hostapd.c | 300 size_t attr_len) in hapd_new_ap_event() argument 302 size_t blen = attr_len * 2 + 1; in hapd_new_ap_event() 305 wpa_snprintf_hex(buf, blen, attr, attr_len); in hapd_new_ap_event()
|