/external/ipsec-tools/src/libipsec/ |
pfkey.c | [all...] |
/external/ipsec-tools/src/racoon/ |
pfkey.c | 209 "failed to recv from pfkey (%s)\n", [all...] |
/external/netperf/ |
netlib.c | 17 /* recv_request() recv a request from the remote */ [all...] |
/hardware/ril/libril/ |
ril.cpp | [all...] |
/external/v8/test/cctest/ |
test-debug.cc | [all...] |
/external/bluetooth/bluez/audio/ |
pcm_bluetooth.c | 862 nrecv = recv(data->stream.fd, data->buffer, data->link_mtu, [all...] |
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
rsn.c | 528 status = pRsn->pKeyParser->recv (pRsn->pKeyParser, (TI_UINT8*)&rsnOsKey, sizeof(rsnOsKey)); 879 status = pRsn->pKeyParser->recv (pRsn->pKeyParser, (TI_UINT8*)&pParam->content.rsnOsKey, sizeof(pParam->content.rsnOsKey)); 883 TRACE1(pRsn->hReport, REPORT_SEVERITY_WARNING, ": pRsn->pKeyParser->recv satus returned with status=%x. returning with NOK\n", status); [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/ |
rsn.c | 526 status = pRsn->pKeyParser->recv (pRsn->pKeyParser, (UINT8*)&rsnOsKey, sizeof(rsnOsKey)); 919 status = pRsn->pKeyParser->recv (pRsn->pKeyParser, (UINT8*)&pParam->content.rsnOsKey, sizeof(pParam->content.rsnOsKey)); [all...] |
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
rsn.c | 523 status = pRsn->pKeyParser->recv (pRsn->pKeyParser, (TI_UINT8*)&rsnOsKey, sizeof(rsnOsKey)); 850 status = pRsn->pKeyParser->recv (pRsn->pKeyParser, (TI_UINT8*)&pParam->content.rsnOsKey, sizeof(pParam->content.rsnOsKey)); 854 TRACE1(pRsn->hReport, REPORT_SEVERITY_WARNING, ": pRsn->pKeyParser->recv satus returned with status=%x. returning with NOK\n", status); [all...] |
/external/bluetooth/bluez/test/ |
ipctest.c | 159 if (recv(u->service_fd, rsp, length, 0) > 0) {
|
/external/bluetooth/hcidump/src/ |
hcidump.c | 270 len = recv(fd, buf, snap_len, MSG_DONTWAIT); 936 " -n, --recv-dump=host Receive dump on a host\n" 968 { "recv-dump", 1, 0, 'n' },
|
/external/libpcap/ |
pcap-linux.c | [all...] |
/external/ppp/pppd/plugins/rp-pppoe/ |
if.c | 686 if ((*size = recv(sock, pkt, sizeof(PPPoEPacket), 0)) < 0) { 687 sysErr("recv (receivePacket)");
|
/external/qemu/slirp/ |
slirp.c | 504 ret = recv(so->s, (char *)&ret, 0,0);
|
/external/wpa_supplicant/ |
radius_client.c | 526 len = recv(sock, buf, sizeof(buf), MSG_DONTWAIT); 528 perror("recv[RADIUS]");
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_privsep.c | 88 res = recv(drv->cmd_socket, reply, *reply_len, 0); 90 perror("recv");
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.c | 284 res = recv(sock, buf, sizeof(buf), 0); [all...] |
/frameworks/base/media/libstagefright/rtsp/ |
MyTransmitter.h | 437 ssize_t n = recv(mRTCPSocket, buffer->data(), buffer->size(), 0); 440 LOG(ERROR) << "recv returned " << n; 442 LOG(INFO) << "recv returned " << n << " bytes of data.";
|
/bionic/libc/ |
Android.mk | 48 unistd/recv.c \
|
/external/qemu/ |
net-android.c | [all...] |
net.c | [all...] |
qemu-char.c | [all...] |
/external/chromium/net/third_party/nss/ssl/ |
sslimpl.h | 271 int (*recv) (sslSocket *, unsigned char *, int, int); member in struct:sslSocketOpsStr 385 * SSL2: recv'd ciphertext records are put here, then decrypted in place. 386 * SSL3: recv'd ciphertext records are put in inbuf (see below), then 397 /* number of bytes to read in next call to ssl_DefRecv (recv) */ [all...] |
/external/chromium/third_party/libevent/test/ |
regress.c | 89 #define read(fd,buf,len) recv((fd),(buf),(len),0) [all...] |
/external/libxml2/ |
nanohttp.c | 546 ctxt->last = recv(ctxt->fd, ctxt->inptr, XML_NANO_HTTP_CHUNK, 0); 568 __xmlIOErr(XML_FROM_HTTP, 0, "recv failed\n"); [all...] |