HomeSort by relevance Sort by last modified time
    Searched refs:msglen (Results 26 - 50 of 59) sorted by null

12 3

  /system/core/adb/
file_sync_service.h 74 unsigned msglen; member in struct:__anon60748::__anon60753
file_sync_service.c 213 msg.status.msglen = 0;
264 msg.status.msglen = 0;
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_test.c 30 int keylen, msglen;
89 if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &len)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_test.c 29 int msglen;
111 if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_oaep_decode.c 23 @param msglen The length of the encoded data (octets)
33 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen,
59 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) {
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
SFTPv3Client.java 204 int msglen = len + 1; local
208 msglen += 4;
211 os.write(msglen >> 24);
212 os.write(msglen >> 16);
213 os.write(msglen >> 8);
214 os.write(msglen);
265 byte[] msglen = new byte[4];
267 readBytes(msglen, 0, 4);
269 int len = (((msglen[0] & 0xff) << 24) | ((msglen[1] & 0xff) << 16) | ((msglen[2] & 0xff) << 8) | (msglen[3] & 0xff))
    [all...]
  /external/qemu/android/
boot-properties.c 296 int msglen,
302 if (msglen == 4 && !memcmp(msg, "list", 4)) {
315 D("%s: ignoring unknown command: %.*s", __FUNCTION__, msglen, msg);
  /external/ipsec-tools/src/libipsec/
policy_parse.y 586 policy_parse(msg, msglen)
588 int msglen;
619 ipsec_set_policy(msg, msglen)
621 int msglen;
625 policy = policy_parse(msg, msglen);
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
TransportManager.java 717 int msglen; local
720 msglen = tc.receiveMessage(msg, 0, msg.length);
745 TypesReader tr = new TypesReader(msg, 0, msglen);
774 TypesReader tr = new TypesReader(msg, 0, msglen);
822 km.handleMessage(msg, msglen);
843 mh.handleMessage(msg, msglen);
KexManager.java 379 public synchronized void handleMessage(byte[] msg, int msglen) throws IOException
420 kip = new PacketKexInit(msg, 0, msglen);
526 PacketKexDhGexGroup dhgexgrp = new PacketKexDhGexGroup(msg, 0, msglen);
537 PacketKexDhGexReply dhgexrpl = new PacketKexDhGexReply(msg, 0, msglen);
593 PacketKexDHReply dhr = new PacketKexDHReply(msg, 0, msglen);
  /external/iproute2/lib/
libnetlink.c 197 int msglen = 0; local
217 msglen = status;
219 while (NLMSG_OK(h, msglen)) {
247 h = NLMSG_NEXT(h, msglen);
258 if (msglen) {
259 fprintf(stderr, "!!!Remnant of size %d\n", msglen);
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/
AuthenticationManager.java 414 public void handleMessage(byte[] msg, int msglen) throws IOException
424 byte[] tmp = new byte[msglen];
425 System.arraycopy(msg, 0, tmp, 0, msglen);
  /external/chromium_org/third_party/smhasher/src/
md5.cpp 329 unsigned char msglen[8]; local
335 PUT_ULONG_LE( low, msglen, 0 );
336 PUT_ULONG_LE( high, msglen, 4 );
342 md5_update( ctx, msglen, 8 );
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.c 132 size_t msglen; local
141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL);
145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
147 ETH_P_RSN_PREAUTH, msg, msglen);
  /bionic/libc/netbsd/nameser/
ns_parse.c 103 ns_initparse(const u_char *msg, int msglen, ns_msg *handle) {
104 const u_char *eom = msg + msglen;
  /external/dropbear/libtomcrypt/src/mac/pmac/
pmac_test.c 31 int msglen;
137 if ((err = pmac_memory(idx, tests[x].key, 16, tests[x].msg, tests[x].msglen, outtag, &len)) != CRYPT_OK) {
  /external/ppp/pppd/
eap.c 1050 int msglen; local
1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr;
1060 PUTSHORT(msglen, outp);
1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen);
1081 int msglen; local
1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE +
1092 PUTSHORT(msglen, outp);
1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen);
1117 int msglen; local
1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr
1148 int msglen; local
1176 int msglen; local
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_write.c 735 size_t msglen; local
739 msglen = 2000;
741 msglen += tls_client_cert_chain_der_len(conn);
743 msg = os_malloc(msglen);
748 end = msg + msglen;
tlsv1_server_write.c 667 size_t msglen; local
671 msglen = 1000 + tls_server_cert_chain_der_len(conn);
673 msg = os_malloc(msglen);
678 end = msg + msglen;
  /external/bluetooth/bluedroid/udrv/ulinux/
uipc.c 723 UINT16 msglen)
727 BTIF_TRACE_DEBUG2("UIPC_Send : ch_id:%d %d bytes", ch_id, msglen);
731 if (write(uipc_main.ch[ch_id].fd, p_buf, msglen) < 0)
  /external/wpa_supplicant_8/wpa_supplicant/
wpas_glue.c 125 size_t msglen; local
173 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL);
178 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen);
179 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen);
  /external/wpa_supplicant_8/src/eap_peer/
eap.c     [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
s3_clnt.c 2774 size_t msglen; local
    [all...]
  /external/openssl/ssl/
s3_clnt.c 2775 size_t msglen; local
    [all...]
  /external/chromium_org/net/android/
keystore_unittest.cc 90 int openssl_print_error_callback(const char* msg, size_t msglen, void* u) {
92 result->append(msg, msglen);

Completed in 396 milliseconds

12 3