/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/dvb/ |
frontend.h | 92 __u8 msg_len; /* valid values are 3...6 */ member in struct:dvb_diseqc_master_cmd 98 __u8 msg_len; /* valid values are 0...4, 0 means no msg */ member in struct:dvb_diseqc_slave_reply
|
/external/libnfc-nci/src/nfa/hci/ |
nfa_hci_main.c | 732 nfa_hci_cb.msg_len = 0; 768 pkt_len = nfa_hci_cb.msg_len; [all...] |
/external/openssh/ |
sftp-server.c | 1275 u_int msg_len; local 1285 msg_len = get_u32(cp); 1286 if (msg_len > SFTP_MAX_MSG_LENGTH) { 1291 if (buf_len < msg_len + 4) 1367 if (msg_len < consumed) { 1368 error("msg_len %d < consumed %d", msg_len, consumed); 1371 if (msg_len > consumed) 1372 buffer_consume(&iqueue, msg_len - consumed); [all...] |
monitor_wrap.c | 147 u_int msg_len; local 156 msg_len = get_u32(buf); 157 if (msg_len > 256 * 1024) 158 fatal("%s: read: bad msg_len %d", __func__, msg_len); 160 buffer_append_space(m, msg_len); 161 if (atomicio(read, sock, buffer_ptr(m), msg_len) != msg_len) [all...] |
ssh-agent.c | 801 u_int msg_len, type; local 807 msg_len = get_u32(cp); 808 if (msg_len > 256 * 1024) { 812 if (buffer_len(&e->input) < msg_len + 4) 818 buffer_append(&e->request, buffer_ptr(&e->input), msg_len); 819 buffer_consume(&e->input, msg_len); [all...] |
sftp-client.c | 125 u_int msg_len; local 136 msg_len = buffer_get_int(m); 137 if (msg_len > SFTP_MAX_MSG_LENGTH) 138 fatal("Received message too long %u", msg_len); 140 buffer_append_space(m, msg_len); 141 if (atomicio6(read, conn->fd_in, buffer_ptr(m), msg_len, 143 != msg_len) { [all...] |
/external/chromium_org/components/nacl/zygote/ |
nacl_fork_delegate_linux.cc | 94 const ssize_t msg_len = local 97 if (msg_len <= 0) { 101 *reply_size = msg_len;
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_srvr.c | 872 unsigned int msg_len; local 894 msg_len = p - msg; 897 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len); 1475 unsigned int msg_len; local 1555 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local 1608 unsigned int hlen, msg_len; local 1702 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local [all...] |
/external/openssl/ssl/ |
d1_srvr.c | 872 unsigned int msg_len; local 894 msg_len = p - msg; 897 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len); 1475 unsigned int msg_len; local 1555 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local 1608 unsigned int hlen, msg_len; local 1702 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local [all...] |
/hardware/qcom/msm8x74/original-kernel-headers/media/ |
msmb_pproc.h | 107 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
|
/external/chromium_org/net/third_party/nss/ssl/ |
dtlscon.c | 165 * Note that this code uses msg_len for two purposes: 252 ss->ssl3.hs.msg_len = message_length; 266 rv = ssl3_HandleHandshakeMessage(ss, buf.buf, ss->ssl3.hs.msg_len); 352 ss->ssl3.hs.msg_len = message_length; 359 if (message_length != ss->ssl3.hs.msg_len) { 399 offset < ss->ssl3.hs.msg_len; offset++) { 412 if (ss->ssl3.hs.recvdHighWater == ss->ssl3.hs.msg_len) { 417 ss->ssl3.hs.msg_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 61 size_t *msg_len, void **data_pos) 65 *msg_len = sizeof(*hdr) + data_len; 66 hdr = os_malloc(*msg_len); 367 size_t *msg_len, void **data_pos) 369 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 901 size_t msg_len; local 908 &msg_len); 922 pos, msg_len); 1174 size_t i, msg_len; local [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
tipc_config.h | 398 int msg_len; local 400 msg_len = TCM_LENGTH(data_len); 402 tcm_hdr->tcm_len = htonl(msg_len);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
tipc_config.h | 398 int msg_len; local 400 msg_len = TCM_LENGTH(data_len); 402 tcm_hdr->tcm_len = htonl(msg_len);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
tipc_config.h | 398 int msg_len; local 400 msg_len = TCM_LENGTH(data_len); 402 tcm_hdr->tcm_len = htonl(msg_len);
|
/external/bluetooth/bluedroid/stack/gatt/ |
gatt_sr.c | 763 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET); local 779 if ((p_msg = (BT_HDR *)GKI_getbuf(msg_len)) == NULL) 786 memset(p_msg, 0, msg_len); 970 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET), local [all...] |
gatt_main.c | 877 UINT16 msg_len; local 882 msg_len = p_buf->len - 1; 899 gatt_server_handle_client_req (p_tcb, op_code, msg_len, p); 901 gatt_client_handle_server_rsp (p_tcb, op_code, msg_len, p); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 213 len[0] = msg_len; 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 400 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, 408 len[0] = msg_len; 414 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
|
/external/opencv/cxcore/src/ |
cxerror.cpp | 181 size_t msg_len = strlen(err_msg ? err_msg : "") + 1024; 182 char* message = (char*)alloca(msg_len);
|
/device/asus/deb/kernel-headers/media/ |
msmb_pproc.h | 115 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
|
/device/asus/flo/kernel-headers/media/ |
msmb_pproc.h | 115 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 628 size_t msg_len; local 636 msg_len = be_to_host16(hdr->length); 637 if (msg_len < sizeof(*hdr) || msg_len > len) { 642 if (msg_len < len) { 644 "RADIUS message", (unsigned long) len - msg_len); 651 msg->buf = wpabuf_alloc_copy(data, msg_len); [all...] |
/external/libnfc-nci/src/nfc/include/ |
rw_api.h | 151 UINT16 msg_len; /* Length of the NDEF message */ member in struct:__anon20875 403 ** Parameters: msg_len: The length of the buffer 409 NFC_API extern tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg); 548 ** Parameters: msg_len: The length of the buffer 554 NFC_API extern tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg ); [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
dtls1.h | 143 unsigned long msg_len; member in struct:hm_header_st
|