/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
MessageHandler.java | 17 public void handleMessage(byte[] msg, int msglen) throws IOException;
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_v1_5_decode.c | 23 * @param msglen The length of the encoded data (octets) 33 unsigned long msglen, 50 if ((msglen > modulus_len) || (modulus_len < 11)) { 90 if (*outlen < (msglen - (2 + ps_len + 1))) { 91 *outlen = msglen - (2 + ps_len + 1); 96 *outlen = (msglen - (2 + ps_len + 1));
|
pkcs_1_v1_5_encode.c | 23 * \param msglen The length of the data to encode (octets) 34 unsigned long msglen, 61 if ((msglen + 11) > modulus_len) { 73 ps_len = modulus_len - msglen - 3; 99 XMEMCPY(&out[2 + ps_len + 1], msg, msglen);
|
pkcs_1_oaep_encode.c | 23 @param msglen The length of the data to encode (octets) 34 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, 62 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { 99 y = modulus_len - msglen - 2*hLen - 2; 106 /* message (length = msglen) */ 107 XMEMCPY(DB+x, msg, msglen); 108 x += msglen;
|
/hardware/libhardware/include/hardware/ |
qemud.h | 105 qemud_channel_send(int fd, const void* msg, int msglen) 109 if (msglen < 0) 110 msglen = strlen((const char*)msg); 112 if (msglen == 0) 115 snprintf(header, sizeof header, "%04x", msglen); 121 if (qemud_fd_write(fd, msg, msglen) != msglen) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 28 unsigned long msglen, 37 unsigned long msglen, 45 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, 51 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen,
|
/external/qemu/android/ |
hw-qemud.h | 73 typedef void (*QemudClientRecv) ( void* opaque, uint8_t* msg, int msglen, QemudClient* client ); 107 extern void qemud_client_send ( QemudClient* client, const uint8_t* msg, int msglen ); 147 int msglen );
|
adb-server.c | 151 _adb_host_append_message(AdbHost* adb_host, const void* msg, int msglen) 153 printf("Append %d bytes to ADB host buffer.\n", msglen); 157 adb_host->pending_send_buffer = (uint8_t*)malloc(msglen); 158 adb_host->pending_send_buffer_size = msglen; 159 } else if ((adb_host->pending_send_data_size + msglen) > 163 adb_host->pending_send_data_size + msglen); 165 adb_host->pending_send_data_size + msglen; 170 adb_host->pending_send_data_size + msglen); 177 msg, msglen); 513 adb_server_on_guest_message(void* opaque, const uint8_t* msg, int msglen) [all...] |
adb-qemud.c | 180 * msg, msglen - Message received from the ADB guest. 184 _adb_client_recv(void* opaque, uint8_t* msg, int msglen, QemudClient* client) 189 adb_client, adb_client->opaque, msglen, QB(msg, msglen)); 193 adb_server_on_guest_message(adb_client->opaque, msg, msglen); 205 if ((msglen + adb_client->msg_cur) > sizeof(adb_client->msg_buffer)) { 211 memcpy(adb_client->msg_buffer + adb_client->msg_cur, msg, msglen); 212 adb_client->msg_cur += msglen; 249 QB(msg, msglen), adb_client->state); 324 * msg, msglen - Message received from the ADB guest [all...] |
hw-qemud.c | 223 typedef void (*QemudSerialReceive)( void* opaque, int channel, uint8_t* msg, int msglen); 522 int msglen ) 526 int avail, len = msglen; 528 if (msglen <= 0 || channel < 0) 532 __FUNCTION__, channel, msglen, 533 quote_bytes((const void*)msg, msglen)); 564 int2hex(frame, FRAME_HEADER_SIZE, msglen); 717 qemud_client_recv( void* opaque, uint8_t* msg, int msglen ) 724 c->clie_recv( c->clie_opaque, msg, msglen, c ); 735 if (msglen > FRAME_HEADER_SIZE & [all...] |
hw-control.c | 57 int msglen, 60 hw_control_do_query(opaque, msg, msglen);
|
hw-sensors.c | 252 _hwSensorClient_recv( void* opaque, uint8_t* msg, int msglen, 257 _hwSensorClient_receive(cl, msg, msglen); 272 _hwSensorClient_send( HwSensorClient* cl, const uint8_t* msg, int msglen ) 274 D("%s: '%s'", __FUNCTION__, quote_bytes((const void*)msg, msglen)); 275 qemud_client_send(cl->client, msg, msglen); 360 _hwSensorClient_receive( HwSensorClient* cl, uint8_t* msg, int msglen ) 364 D("%s: '%.*s'", __FUNCTION__, msglen, msg); 370 if (msglen == 12 && !memcmp(msg, "list-sensors", 12)) { 388 if (msglen == 4 && !memcmp(msg, "wake", 4)) { 396 if (msglen > 10 && !memcmp(msg, "set-delay:", 10)) [all...] |
/external/ppp/pppd/ |
upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); 516 u_char msglen; local [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/channel/ |
ChannelManager.java | 783 public void msgChannelExtendedData(byte[] msg, int msglen) throws IOException 785 if (msglen <= 13) 786 throw new IOException("SSH_MSG_CHANNEL_EXTENDED_DATA message has wrong size (" + msglen + ")"); 800 if (len != (msglen - 13)) 801 throw new IOException("SSH_MSG_CHANNEL_EXTENDED_DATA message has wrong len (calculated " + (msglen - 13) 1061 public void msgChannelData(byte[] msg, int msglen) throws IOException 1063 if (msglen <= 9) 1064 throw new IOException("SSH_MSG_CHANNEL_DATA message has wrong size (" + msglen + ")"); 1074 if (len != (msglen - 9)) 1075 throw new IOException("SSH_MSG_CHANNEL_DATA message has wrong len (calculated " + (msglen - 9) + ", got [all...] |
/external/chromium_org/third_party/libxslt/libexslt/ |
crypto.c | 146 const char *msg, unsigned int msglen, 157 if (!CryptHashData (hHash, (const BYTE *) msg, msglen, 0)) { 176 * @msglen: length of text to be hashed 185 unsigned long msglen, 197 algorithm, msg, msglen, 209 const unsigned char *msg, int msglen, 217 if (msglen > destlen) { 241 dwDataLen = msglen; 242 memcpy (dest, msg, msglen); 243 if (!CryptEncrypt (hKey, 0, TRUE, 0, dest, &dwDataLen, msglen)) { [all...] |
/external/chromium_org/tools/ipc_fuzzer/message_lib/ |
message_file_reader.cc | 117 size_t msglen = message_tail - begin; local 118 if (msglen > INT_MAX) { 124 IPC::Message const_message(begin, msglen); 127 file_data_.remove_prefix(msglen);
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_test.c | 33 msglen; 231 tests[x].plaintext, tests[x].msglen, outct, outtag, &len)) != CRYPT_OK) { 234 if (XMEMCMP(outct, tests[x].ciphertext, tests[x].msglen) || XMEMCMP(outtag, tests[x].tag, len)) { 238 for (y = 0; y < (unsigned long)tests[x].msglen; ) { 240 if (y < (unsigned long)(tests[x].msglen-1)) printf(", "); 256 outct, tests[x].msglen, outct, outtag, len, &res)) != CRYPT_OK) { 259 if ((res != 1) || XMEMCMP(outct, tests[x].plaintext, tests[x].msglen)) { 263 for (y = 0; y < (unsigned long)tests[x].msglen; ) { 265 if (y < (unsigned long)(tests[x].msglen-1)) printf(", ");
|
/external/chromium_org/components/nacl/loader/ |
nacl_helper_linux.cc | 231 const ssize_t msglen = UnixDomainSocket::RecvMsg(zygote_ipc_fd, local 240 if (msglen == 0 || (msglen == -1 && errno == ECONNRESET)) { 244 if (msglen < 0) { 249 Pickle read_pickle(buf, msglen);
|
/bionic/libc/netbsd/nameser/ |
ns_print.c | 65 static int addname(const u_char *msg, size_t msglen, 107 * ns_sprintrrf(msg, msglen, name, class, type, ttl, rdata, rdlen, 114 ns_sprintrrf(const u_char *msg, size_t msglen, 180 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 207 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 211 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 281 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 299 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 303 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 387 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)) [all...] |
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
internal_logging.cc | 99 int msglen = state.p_ - state.buf_; local 101 (*log_message_writer)(state.buf_, msglen); 114 (*log_message_writer)(state.buf_, msglen);
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
internal_logging.cc | 98 int msglen = state.p_ - state.buf_; local 100 (*log_message_writer)(state.buf_, msglen); 113 (*log_message_writer)(state.buf_, msglen);
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_test.c | 26 int keylen, msglen; 66 if ((err = ctr_encrypt(tests[x].pt, buf, tests[x].msglen, &ctr)) != CRYPT_OK) { 70 if (XMEMCMP(buf, tests[x].ct, tests[x].msglen)) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_test.c | 29 int msglen; 61 if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
|
/external/bluetooth/bluedroid/udrv/include/ |
uipc.h | 117 UDRV_API extern BOOLEAN UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen);
|
/external/libnfc-nci/src/udrv/include/ |
uipc.h | 127 UDRV_API extern BOOLEAN UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen);
|