Home
last modified time | relevance | path

Searched refs:tlen (Results 1 – 8 of 8) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/utils/
Dcommon.c329 size_t tlen; in wpa_config_parse_string() local
334 tlen = pos - value; in wpa_config_parse_string()
335 tstr = dup_binstr(value, tlen); in wpa_config_parse_string()
339 str = os_malloc(tlen + 1); in wpa_config_parse_string()
345 *len = printf_decode((u8 *) str, tlen + 1, tstr); in wpa_config_parse_string()
351 size_t tlen, hlen = os_strlen(value); in wpa_config_parse_string() local
367 tlen = hlen / 2; in wpa_config_parse_string()
368 str = os_malloc(tlen + 1); in wpa_config_parse_string()
371 if (hexstr2bin(value, str, tlen)) { in wpa_config_parse_string()
375 str[tlen] = '\0'; in wpa_config_parse_string()
[all …]
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dsmp_cmac.c133 static BOOLEAN cmac_aes_k_calculate(BT_OCTET16 key, UINT8 *p_signature, UINT16 tlen) in cmac_aes_k_calculate() argument
155 p_mac = output.param_buf + (BT_OCTET16_LEN - tlen); in cmac_aes_k_calculate()
156 memcpy(p_signature, p_mac, tlen); in cmac_aes_k_calculate()
158 SMP_TRACE_DEBUG("tlen = %d p_mac = %p", tlen, p_mac); in cmac_aes_k_calculate()
281 UINT16 tlen, UINT8 *p_signature) in aes_cipher_msg_auth_code() argument
312 ret = cmac_aes_k_calculate(key, p_signature, tlen); in aes_cipher_msg_auth_code()
325 void test_cmac_cback(UINT8 *p_mac, UINT16 tlen)
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/
Desp_wps.c577 int tlen = 0; in wps_process_wps_mX_req() local
588 wpa_printf(MSG_DEBUG, "wps process mX req: len %d, tlen %d", len, tlen); in wps_process_wps_mX_req()
609 tlen = ((be_tot_len & 0xff) << 8) | ((be_tot_len >> 8) & 0xff); in wps_process_wps_mX_req()
613 tlen = frag_len; in wps_process_wps_mX_req()
617 if (tlen > 50000) { in wps_process_wps_mX_req()
621 …ag_len: %d, tot_len: %d, be_tot_len:%d", sm->current_identifier, flag, frag_len, tlen, be_tot_len); in wps_process_wps_mX_req()
622 if (ESP_OK != wps_enrollee_process_msg_frag(&wps_buf, tlen, tbuf, frag_len, flag)) { in wps_process_wps_mX_req()
639 wps_buf = wpabuf_alloc_copy(tbuf, tlen); in wps_process_wps_mX_req()
/hal_espressif-latest/components/bt/host/bluedroid/stack/include/stack/
Dsmp_api.h285 typedef void (tCMAC_CMPL_CBACK)(UINT8 *p_mac, UINT16 tlen, UINT32 sign_counter);
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae.c1762 size_t scalar_elem_len, tlen; in sae_parse_commit_token() local
1776 tlen = end - (*pos + scalar_elem_len); in sae_parse_commit_token()
1778 if (tlen < SHA256_MAC_LEN) { in sae_parse_commit_token()
1781 (unsigned int) tlen); in sae_parse_commit_token()
1785 wpa_hexdump(MSG_DEBUG, "SAE: Anti-Clogging Token", *pos, tlen); in sae_parse_commit_token()
1789 *token_len = tlen; in sae_parse_commit_token()
1790 *pos += tlen; in sae_parse_commit_token()
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Deap_fast.c1341 int tlen; in eap_fast_get_a_id() local
1343 tlen = be_to_host16(hdr->len); in eap_fast_get_a_id()
1345 sizeof(*hdr) + tlen <= len) { in eap_fast_get_a_id()
1349 *id_len = tlen; in eap_fast_get_a_id()
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/include/
Dsmp_int.h540 UINT16 tlen, UINT8 *p_signature);
/hal_espressif-latest/components/bt/host/bluedroid/stack/btm/
Dbtm_ble.c48 UINT16 tlen, UINT8 *p_signature);