/external/chromium_org/third_party/tcmalloc/chromium/src/ |
internal_logging.cc | 99 int msglen = state.p_ - state.buf_; local 101 (*log_message_writer)(state.buf_, msglen); 114 (*log_message_writer)(state.buf_, msglen);
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
internal_logging.cc | 98 int msglen = state.p_ - state.buf_; local 100 (*log_message_writer)(state.buf_, msglen); 113 (*log_message_writer)(state.buf_, msglen);
|
/external/chromium_org/chrome/nacl/ |
nacl_helper_linux.cc | 264 const ssize_t msglen = UnixDomainSocket::RecvMsg(kNaClZygoteDescriptor, local 273 if (msglen == 0 || (msglen == -1 && errno == ECONNRESET)) { 276 } else if (msglen < 0) { 279 } else if (msglen == sizeof(kNaClForkRequest) - 1 && 280 memcmp(buf, kNaClForkRequest, msglen) == 0) { 290 << base::GetDoubleQuotedJson(std::string(buf, buf + msglen));
|
/external/chromium_org/third_party/smhasher/src/ |
md5.cpp | 329 unsigned char msglen[8]; local 335 PUT_ULONG_LE( low, msglen, 0 ); 336 PUT_ULONG_LE( high, msglen, 4 ); 342 md5_update( ctx, msglen, 8 );
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 132 size_t msglen; local 141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 147 ETH_P_RSN_PREAUTH, msg, msglen);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 667 size_t msglen; local 671 msglen = 1000 + tls_server_cert_chain_der_len(conn); 673 msg = os_malloc(msglen); 678 end = msg + msglen;
|
tlsv1_client_write.c | 735 size_t msglen; local 739 msglen = 2000; 741 msglen += tls_client_cert_chain_der_len(conn); 743 msg = os_malloc(msglen); 748 end = msg + msglen;
|
/system/core/adb/ |
file_sync_service.h | 74 unsigned msglen; member in struct:__anon62557::__anon62562
|
/external/iproute2/lib/ |
libnetlink.c | 197 int msglen = 0; local 217 msglen = status; 219 while (NLMSG_OK(h, msglen)) { 247 h = NLMSG_NEXT(h, msglen); 258 if (msglen) { 259 fprintf(stderr, "!!!Remnant of size %d\n", msglen);
|
/external/ppp/pppd/ |
upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); 516 u_char msglen; local [all...] |
eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr 1148 int msglen; local 1176 int msglen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 125 size_t msglen; local 173 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL); 178 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen); 179 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
TransportManager.java | 717 int msglen; local 720 msglen = tc.receiveMessage(msg, 0, msg.length); 745 TypesReader tr = new TypesReader(msg, 0, msglen); 774 TypesReader tr = new TypesReader(msg, 0, msglen); 822 km.handleMessage(msg, msglen); 843 mh.handleMessage(msg, msglen);
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s3_clnt.c | 2774 size_t msglen; local [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
SFTPv3Client.java | 204 int msglen = len + 1; local 208 msglen += 4; 211 os.write(msglen >> 24); 212 os.write(msglen >> 16); 213 os.write(msglen >> 8); 214 os.write(msglen); 265 byte[] msglen = new byte[4]; 267 readBytes(msglen, 0, 4); 269 int len = (((msglen[0] & 0xff) << 24) | ((msglen[1] & 0xff) << 16) | ((msglen[2] & 0xff) << 8) | (msglen[3] & 0xff)) [all...] |
/external/openssl/ssl/ |
s3_clnt.c | 2775 size_t msglen; local [all...] |
/external/mdnsresponder/mDNSShared/ |
dnsextd.c | 422 mDNSu16 msglen = 0; local 430 nread = my_recv( sock, &msglen, sizeof( msglen ), closed ); 435 msglen = ntohs( msglen ); 436 require_action_quiet( nread == sizeof( msglen ), exit, err = mStatus_UnknownErr; Log( "Could not read length field of message") ); 440 require_action_quiet( msglen <= sizeof( storage->msg ), exit, err = mStatus_UnknownErr; Log( "RecvPacket: provided buffer too small." ) ); 447 if ( msglen > sizeof(DNSMessage)) 449 allocsize = sizeof(PktMsg) - sizeof(DNSMessage) + msglen; 461 pkt->len = msglen; [all...] |
/external/mdnsresponder/mDNSCore/ |
DNSCommon.c | 2633 mDNSu16 msglen = (mDNSu16)(end - (mDNSu8 *)msg); local [all...] |