/system/core/adb/ |
file_sync_service.h | 74 unsigned msglen; member in struct:__anon60748::__anon60753
|
file_sync_service.c | 213 msg.status.msglen = 0; 264 msg.status.msglen = 0;
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_test.c | 30 int keylen, msglen; 89 if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &len)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_test.c | 29 int msglen; 111 if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_oaep_decode.c | 23 @param msglen The length of the encoded data (octets) 33 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen, 59 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) {
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
SFTPv3Client.java | 204 int msglen = len + 1; local 208 msglen += 4; 211 os.write(msglen >> 24); 212 os.write(msglen >> 16); 213 os.write(msglen >> 8); 214 os.write(msglen); 265 byte[] msglen = new byte[4]; 267 readBytes(msglen, 0, 4); 269 int len = (((msglen[0] & 0xff) << 24) | ((msglen[1] & 0xff) << 16) | ((msglen[2] & 0xff) << 8) | (msglen[3] & 0xff)) [all...] |
/external/qemu/android/ |
boot-properties.c | 296 int msglen, 302 if (msglen == 4 && !memcmp(msg, "list", 4)) { 315 D("%s: ignoring unknown command: %.*s", __FUNCTION__, msglen, msg);
|
/external/ipsec-tools/src/libipsec/ |
policy_parse.y | 586 policy_parse(msg, msglen) 588 int msglen; 619 ipsec_set_policy(msg, msglen) 621 int msglen; 625 policy = policy_parse(msg, msglen);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
TransportManager.java | 717 int msglen; local 720 msglen = tc.receiveMessage(msg, 0, msg.length); 745 TypesReader tr = new TypesReader(msg, 0, msglen); 774 TypesReader tr = new TypesReader(msg, 0, msglen); 822 km.handleMessage(msg, msglen); 843 mh.handleMessage(msg, msglen);
|
KexManager.java | 379 public synchronized void handleMessage(byte[] msg, int msglen) throws IOException 420 kip = new PacketKexInit(msg, 0, msglen); 526 PacketKexDhGexGroup dhgexgrp = new PacketKexDhGexGroup(msg, 0, msglen); 537 PacketKexDhGexReply dhgexrpl = new PacketKexDhGexReply(msg, 0, msglen); 593 PacketKexDHReply dhr = new PacketKexDHReply(msg, 0, msglen);
|
/external/iproute2/lib/ |
libnetlink.c | 197 int msglen = 0; local 217 msglen = status; 219 while (NLMSG_OK(h, msglen)) { 247 h = NLMSG_NEXT(h, msglen); 258 if (msglen) { 259 fprintf(stderr, "!!!Remnant of size %d\n", msglen);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
AuthenticationManager.java | 414 public void handleMessage(byte[] msg, int msglen) throws IOException 424 byte[] tmp = new byte[msglen]; 425 System.arraycopy(msg, 0, tmp, 0, msglen);
|
/external/chromium_org/third_party/smhasher/src/ |
md5.cpp | 329 unsigned char msglen[8]; local 335 PUT_ULONG_LE( low, msglen, 0 ); 336 PUT_ULONG_LE( high, msglen, 4 ); 342 md5_update( ctx, msglen, 8 );
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 132 size_t msglen; local 141 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 145 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 147 ETH_P_RSN_PREAUTH, msg, msglen);
|
/bionic/libc/netbsd/nameser/ |
ns_parse.c | 103 ns_initparse(const u_char *msg, int msglen, ns_msg *handle) { 104 const u_char *eom = msg + msglen;
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_test.c | 31 int msglen; 137 if ((err = pmac_memory(idx, tests[x].key, 16, tests[x].msg, tests[x].msglen, outtag, &len)) != CRYPT_OK) {
|
/external/ppp/pppd/ |
eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr 1148 int msglen; local 1176 int msglen; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 735 size_t msglen; local 739 msglen = 2000; 741 msglen += tls_client_cert_chain_der_len(conn); 743 msg = os_malloc(msglen); 748 end = msg + msglen;
|
tlsv1_server_write.c | 667 size_t msglen; local 671 msglen = 1000 + tls_server_cert_chain_der_len(conn); 673 msg = os_malloc(msglen); 678 end = msg + msglen;
|
/external/bluetooth/bluedroid/udrv/ulinux/ |
uipc.c | 723 UINT16 msglen) 727 BTIF_TRACE_DEBUG2("UIPC_Send : ch_id:%d %d bytes", ch_id, msglen); 731 if (write(uipc_main.ch[ch_id].fd, p_buf, msglen) < 0)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 125 size_t msglen; local 173 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL); 178 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen); 179 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
s3_clnt.c | 2774 size_t msglen; local [all...] |
/external/openssl/ssl/ |
s3_clnt.c | 2775 size_t msglen; local [all...] |
/external/chromium_org/net/android/ |
keystore_unittest.cc | 90 int openssl_print_error_callback(const char* msg, size_t msglen, void* u) { 92 result->append(msg, msglen);
|