HomeSort by relevance Sort by last modified time
    Searched full:msg_len (Results 1 - 25 of 81) sorted by null

1 2 3 4

  /external/openssh/
msg.c 68 u_int msg_len; local
77 msg_len = get_u32(buf);
78 if (msg_len > 256 * 1024) {
79 error("ssh_msg_recv: read: bad msg_len %u", msg_len);
83 buffer_append_space(m, msg_len);
84 if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
ssh-pkcs11-helper.c 209 u_int msg_len; local
219 msg_len = get_u32(cp);
220 if (msg_len > MAX_MSG_LENGTH) {
221 error("bad message len %d", msg_len);
224 if (buf_len < msg_len + 4)
252 if (msg_len < consumed) {
253 error("msg_len %d < consumed %d", msg_len, consumed);
256 if (msg_len > consumed)
257 buffer_consume(&iqueue, msg_len - consumed)
    [all...]
  /hardware/libhardware_legacy/include/hardware_legacy/
uevent.h 27 int uevent_add_native_handler(void (*handler)(void *data, const char *msg, int msg_len),
29 int uevent_remove_native_handler(void (*handler)(void *data, const char *msg, int msg_len));
  /external/chromium_org/third_party/openssl/openssl/ssl/
d1_both.c 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
272 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)
413 unsigned long msg_len; local
481 size_t frag_off,frag_len,msg_len; local
    [all...]
  /external/openssl/ssl/
d1_both.c 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
272 (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)
413 unsigned long msg_len; local
481 size_t frag_off,frag_len,msg_len; local
    [all...]
  /hardware/libhardware_legacy/uevent/
uevent.c 34 void (*handler)(void *data, const char *msg, int msg_len);
102 int uevent_add_native_handler(void (*handler)(void *data, const char *msg, int msg_len),
120 int uevent_remove_native_handler(void (*handler)(void *data, const char *msg, int msg_len))
  /external/dropbear/
svr-authpam.c 57 unsigned int msg_len = 0; local
84 msg_len = strlen(compare_message);
85 for (i = 0; i < msg_len; i++) {
91 if (msg_len > 2
92 && compare_message[msg_len-2] == ':'
93 && compare_message[msg_len-1] == ' ') {
94 compare_message[msg_len-1] = '\0';
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
  /external/wpa_supplicant_8/wpa_supplicant/
preauth_test.c 49 size_t *msg_len, void **data_pos)
53 *msg_len = sizeof(*hdr) + data_len;
54 hdr = os_malloc(*msg_len);
76 size_t *msg_len, void **data_pos)
78 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
  /external/bluetooth/bluedroid/hci/src/
hci_mct.c 727 uint16_t msg_len, len; local
766 msg_len = byte;
767 p_cb->rcv_len = msg_len;
772 len = msg_len + p_cb->preload_count + BT_HC_HDR_SIZE;
794 if (msg_len == 0)
810 if (msg_len)
907 uint16_t msg_len, len; local
945 msg_len = p_cb->preload_buffer[3];
946 msg_len = (msg_len << 8) + p_cb->preload_buffer[2]
    [all...]
hci_h4.c 754 uint16_t msg_len, len; local
801 msg_len = p_cb->preload_buffer[3];
802 msg_len = (msg_len << 8) + p_cb->preload_buffer[2];
804 if (msg_len && (p_cb->preload_count == 4))
833 msg_len = byte;
834 p_cb->rcv_len = msg_len;
839 len = msg_len + p_cb->preload_count + BT_HC_HDR_SIZE;
864 if (msg_len == 0)
879 if (msg_len)
    [all...]
  /external/chromium_org/sandbox/linux/services/
broker_process.cc 247 ssize_t msg_len = UnixDomainSocket::SendRecvMsgWithFlags(ipc_socketpair_, local
253 if (msg_len <= 0) {
259 Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); local
299 const ssize_t msg_len = UnixDomainSocket::RecvMsg(ipc_socketpair_, buf, local
302 if (msg_len == 0 || (msg_len == -1 && errno == ECONNRESET)) {
309 if (msg_len < 0 || fds.size() != 1 || fds.at(0) < 0) {
316 Pickle pickle(buf, msg_len);
  /external/tcpdump/
print-olsr.c 94 u_int8_t msg_len[2]; member in struct:olsr_msg
217 u_int msg_type, msg_len, msg_tlen, hello_len, prefix; local
255 msg_len = EXTRACT_16BITS(ptr.msg->msg_len);
258 if (msg_type == 0 || msg_len == 0) {
270 msg_len);
272 msg_tlen = msg_len - sizeof(struct olsr_msg);
383 tptr += msg_len;
print-ldp.c 503 u_short pdu_len,msg_len,msg_type,msg_tlen; local
544 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
553 msg_len,
557 if (msg_len == 0) /* infinite loop protection */
561 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */
564 if (!TTEST2(*tptr, msg_len))
604 msg_len);
606 tptr += msg_len+4;
607 tlen -= msg_len+4;
  /external/srtp/crypto/test/
auth_driver.c 74 auth_bits_per_second(auth_t *h, int msg_len);
171 int msg_len = (msg_len_octets + 1)/2; local
178 for (i=0; i < msg_len; i++)
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_poll.py 30 MSG_LEN = len(MSG)
61 buf = os.read(rd, MSG_LEN)
62 self.assertEqual(len(buf), MSG_LEN)
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_poll.py 30 MSG_LEN = len(MSG)
61 buf = os.read(rd, MSG_LEN)
62 self.assertEqual(len(buf), MSG_LEN)
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_i.h 189 size_t *msg_len, void **data_pos)
193 msg_len, data_pos);
303 u8 *msg, size_t msg_len, u8 *key_mic);
  /external/wpa_supplicant_8/wpa_supplicant/tests/
test_wpa.c 95 u16 data_len, size_t *msg_len, void **data_pos)
102 *msg_len = sizeof(*hdr) + data_len;
103 hdr = os_malloc(*msg_len);
  /device/asus/deb/original-kernel-headers/media/
msmb_pproc.h 101 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
  /device/asus/flo/original-kernel-headers/media/
msmb_pproc.h 101 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
  /external/libnfc-nci/src/nfa/hci/
nfa_hci_utils.c 320 tNFA_STATUS nfa_hciu_send_msg (UINT8 pipe_id, UINT8 type, UINT8 instruction, UINT16 msg_len, UINT8 *p_msg)
333 pipe_id, nfa_hciu_get_type_inst_names (pipe_id, type, instruction, buff), msg_len);
336 pipe_id, type, instruction, msg_len);
342 while ((first_pkt == TRUE) || (msg_len != 0))
354 if (msg_len > data_len)
360 data_len = msg_len;
379 msg_len -= data_len;
380 if (msg_len > 0)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/dvb/
frontend.h 92 __u8 msg_len; /* valid values are 3...6 */ member in struct:dvb_diseqc_master_cmd
98 __u8 msg_len; /* valid values are 0...4, 0 means no msg */ member in struct:dvb_diseqc_slave_reply
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/dvb/
frontend.h 92 __u8 msg_len; /* valid values are 3...6 */ member in struct:dvb_diseqc_master_cmd
98 __u8 msg_len; /* valid values are 0...4, 0 means no msg */ member in struct:dvb_diseqc_slave_reply

Completed in 873 milliseconds

1 2 3 4