HomeSort by relevance Sort by last modified time
    Searched full:msg_len (Results 26 - 50 of 81) sorted by null

12 3 4

  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/dvb/
frontend.h 92 __u8 msg_len; /* valid values are 3...6 */ member in struct:dvb_diseqc_master_cmd
98 __u8 msg_len; /* valid values are 0...4, 0 means no msg */ member in struct:dvb_diseqc_slave_reply
  /external/libnfc-nci/src/nfa/hci/
nfa_hci_main.c 732 nfa_hci_cb.msg_len = 0;
768 pkt_len = nfa_hci_cb.msg_len;
    [all...]
  /external/openssh/
sftp-server.c 1275 u_int msg_len; local
1285 msg_len = get_u32(cp);
1286 if (msg_len > SFTP_MAX_MSG_LENGTH) {
1291 if (buf_len < msg_len + 4)
1367 if (msg_len < consumed) {
1368 error("msg_len %d < consumed %d", msg_len, consumed);
1371 if (msg_len > consumed)
1372 buffer_consume(&iqueue, msg_len - consumed);
    [all...]
monitor_wrap.c 147 u_int msg_len; local
156 msg_len = get_u32(buf);
157 if (msg_len > 256 * 1024)
158 fatal("%s: read: bad msg_len %d", __func__, msg_len);
160 buffer_append_space(m, msg_len);
161 if (atomicio(read, sock, buffer_ptr(m), msg_len) != msg_len)
    [all...]
ssh-agent.c 801 u_int msg_len, type; local
807 msg_len = get_u32(cp);
808 if (msg_len > 256 * 1024) {
812 if (buffer_len(&e->input) < msg_len + 4)
818 buffer_append(&e->request, buffer_ptr(&e->input), msg_len);
819 buffer_consume(&e->input, msg_len);
    [all...]
sftp-client.c 125 u_int msg_len; local
136 msg_len = buffer_get_int(m);
137 if (msg_len > SFTP_MAX_MSG_LENGTH)
138 fatal("Received message too long %u", msg_len);
140 buffer_append_space(m, msg_len);
141 if (atomicio6(read, conn->fd_in, buffer_ptr(m), msg_len,
143 != msg_len) {
    [all...]
  /external/chromium_org/components/nacl/zygote/
nacl_fork_delegate_linux.cc 94 const ssize_t msg_len = local
97 if (msg_len <= 0) {
101 *reply_size = msg_len;
  /external/chromium_org/third_party/openssl/openssl/ssl/
d1_srvr.c 872 unsigned int msg_len; local
894 msg_len = p - msg;
897 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len);
1475 unsigned int msg_len; local
1555 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local
1608 unsigned int hlen, msg_len; local
1702 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local
    [all...]
  /external/openssl/ssl/
d1_srvr.c 872 unsigned int msg_len; local
894 msg_len = p - msg;
897 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len);
1475 unsigned int msg_len; local
1555 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local
1608 unsigned int hlen, msg_len; local
1702 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local
    [all...]
  /hardware/qcom/msm8x74/original-kernel-headers/media/
msmb_pproc.h 107 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
  /external/chromium_org/net/third_party/nss/ssl/
dtlscon.c 165 * Note that this code uses msg_len for two purposes:
252 ss->ssl3.hs.msg_len = message_length;
266 rv = ssl3_HandleHandshakeMessage(ss, buf.buf, ss->ssl3.hs.msg_len);
352 ss->ssl3.hs.msg_len = message_length;
359 if (message_length != ss->ssl3.hs.msg_len) {
399 offset < ss->ssl3.hs.msg_len; offset++) {
412 if (ss->ssl3.hs.recvdHighWater == ss->ssl3.hs.msg_len) {
417 ss->ssl3.hs.msg_len);
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 61 size_t *msg_len, void **data_pos)
65 *msg_len = sizeof(*hdr) + data_len;
66 hdr = os_malloc(*msg_len);
367 size_t *msg_len, void **data_pos)
369 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
  /external/wpa_supplicant_8/src/eap_peer/
eap.c 901 size_t msg_len; local
908 &msg_len);
922 pos, msg_len);
1174 size_t i, msg_len; local
    [all...]
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
tipc_config.h 398 int msg_len; local
400 msg_len = TCM_LENGTH(data_len);
402 tcm_hdr->tcm_len = htonl(msg_len);
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
tipc_config.h 398 int msg_len; local
400 msg_len = TCM_LENGTH(data_len);
402 tcm_hdr->tcm_len = htonl(msg_len);
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
tipc_config.h 398 int msg_len; local
400 msg_len = TCM_LENGTH(data_len);
402 tcm_hdr->tcm_len = htonl(msg_len);
  /external/bluetooth/bluedroid/stack/gatt/
gatt_sr.c 763 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET); local
779 if ((p_msg = (BT_HDR *)GKI_getbuf(msg_len)) == NULL)
786 memset(p_msg, 0, msg_len);
970 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET), local
    [all...]
gatt_main.c 877 UINT16 msg_len; local
882 msg_len = p_buf->len - 1;
899 gatt_server_handle_client_req (p_tcb, op_code, msg_len, p);
901 gatt_client_handle_server_rsp (p_tcb, op_code, msg_len, p);
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.c 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
213 len[0] = msg_len;
219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len);
400 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
408 len[0] = msg_len;
414 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
  /external/opencv/cxcore/src/
cxerror.cpp 181 size_t msg_len = strlen(err_msg ? err_msg : "") + 1024;
182 char* message = (char*)alloca(msg_len);
  /device/asus/deb/kernel-headers/media/
msmb_pproc.h 115 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
  /device/asus/flo/kernel-headers/media/
msmb_pproc.h 115 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
  /external/wpa_supplicant_8/src/radius/
radius.c 628 size_t msg_len; local
636 msg_len = be_to_host16(hdr->length);
637 if (msg_len < sizeof(*hdr) || msg_len > len) {
642 if (msg_len < len) {
644 "RADIUS message", (unsigned long) len - msg_len);
651 msg->buf = wpabuf_alloc_copy(data, msg_len);
    [all...]
  /external/libnfc-nci/src/nfc/include/
rw_api.h 151 UINT16 msg_len; /* Length of the NDEF message */ member in struct:__anon20875
403 ** Parameters: msg_len: The length of the buffer
409 NFC_API extern tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg);
548 ** Parameters: msg_len: The length of the buffer
554 NFC_API extern tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg );
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
dtls1.h 143 unsigned long msg_len; member in struct:hm_header_st

Completed in 934 milliseconds

12 3 4