/external/chromium_org/third_party/openssl/openssl/ssl/ |
dtls1.h | 143 unsigned long msg_len; member in struct:hm_header_st
|
/external/openssl/include/openssl/ |
dtls1.h | 143 unsigned long msg_len; member in struct:hm_header_st
|
/external/openssl/ssl/ |
dtls1.h | 143 unsigned long msg_len; member in struct:hm_header_st
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 39 size_t *msg_len, void **data_pos);
|
tdls.c | 217 const u8 *msg, size_t msg_len) 222 "dialog_token=%u status_code=%u msg_len=%u", 224 (unsigned int) msg_len); 227 status_code, msg, msg_len)) { 265 peer->sm_tmr.buf_len = msg_len; 267 peer->sm_tmr.buf = os_malloc(msg_len); 270 os_memcpy(peer->sm_tmr.buf, msg, msg_len); [all...] |
wpa.c | 34 * @msg_len: Length of message 39 u8 *msg, size_t msg_len, u8 *key_mic) 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 67 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 68 wpa_sm_ether_send(sm, dest, proto, msg, msg_len); [all...] |
/hardware/qcom/msm8x74/kernel-headers/media/ |
msmb_pproc.h | 121 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
|
/external/chromium/net/http/ |
http_auth_gssapi_posix.cc | 125 int msg_len = (msg.length > kMaxMsgLength) ? local 128 if (msg_len > 0 && msg.value != NULL) { 129 rv += base::StringPrintf(" %.*s", msg_len,
|
/external/chromium_org/net/http/ |
http_auth_gssapi_posix.cc | 122 int msg_len = (msg.length > kMaxMsgLength) ? local 125 if (msg_len > 0 && msg.value != NULL) { 126 rv += base::StringPrintf(" %.*s", msg_len,
|
/external/kernel-headers/original/linux/ |
audit.h | 538 extern void __audit_mq_sendrecv(mqd_t mqdes, size_t msg_len, unsigned int msg_prio, const struct timespec *abs_timeout); 584 static inline void audit_mq_sendrecv(mqd_t mqdes, size_t msg_len, unsigned int msg_prio, const struct timespec *abs_timeout) 587 __audit_mq_sendrecv(mqdes, msg_len, msg_prio, abs_timeout);
|
socket.h | 77 unsigned msg_len; member in struct:mmsghdr
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 80 u16 data_len, size_t *msg_len, void **data_pos) 87 *msg_len = sizeof(*hdr) + data_len; 88 hdr = os_malloc(*msg_len);
|
/external/openssh/ |
umac.c | 778 UINT32 msg_len; /* Total length of data passed */ member in struct:uhash_ctx [all...] |
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/i965/ |
brw_vs_emit.c | 1523 int msg_len; local [all...] |
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_vs_emit.c | 1523 int msg_len; local [all...] |
/external/libnfc-nci/src/nfc/ndef/ |
ndef_utils.c | 79 tNDEF_STATUS NDEF_MsgValidate (UINT8 *p_msg, UINT32 msg_len, BOOLEAN b_allow_chunks) 82 UINT8 *p_end = p_msg + msg_len; 88 if ( (p_msg == NULL) || (msg_len < 3) ) [all...] |
/external/libnfc-nci/src/nfc/include/ |
ndef_utils.h | 101 EXPORT_NDEF_API extern tNDEF_STATUS NDEF_MsgValidate (UINT8 *p_msg, UINT32 msg_len, BOOLEAN b_allow_chunks);
|
/external/tcpdump/ |
print-ppp.c | 880 int peerid_len, passwd_len, msg_len; local 952 msg_len = *p; /* Msg-Length */ 954 if (length - (p - p0) < msg_len) 957 for (i = 0; i< msg_len; i++) { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.h | 297 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len);
|
/sdk/apps/SdkController/src/com/android/tools/sdkcontroller/lib/ |
Channel.java | 429 public boolean sendMessage(int msg_type, byte[] msg, int msg_len) { 433 sendMessage(socket, msg_type, msg, msg_len);
|
/external/libnfc-nci/src/nfa/int/ |
nfa_hci_int.h | 395 UINT16 msg_len; /* For segmentation - length of the combined message */ member in struct:__anon20745
|
/external/valgrind/main/coregrind/m_syswrap/ |
syswrap-linux.c | [all...] |
/external/strace/ |
net.c | 1448 unsigned msg_len; member in struct:mmsghdr [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3con.c | [all...] |
/external/bluetooth/bluedroid/stack/gatt/ |
gatt_cl.c | 750 GATT_TRACE_ERROR4("gatt_process_read_by_type_rsp: Discard response op_code=%d vale_len=%d > (MTU-2=%d or msg_len-1=%d)", [all...] |