/bionic/libc/kernel/uapi/scsi/ |
scsi_netlink.h | 34 uint16_t msglen; member in struct:scsi_nl_hdr 57 #define INIT_SCSI_NL_HDR(hdr, t, mtype, mlen) { (hdr)->version = SCSI_NL_VERSION; (hdr)->transport = t; (hdr)->magic = SCSI_NL_MAGIC; (hdr)->msgtype = mtype; (hdr)->msglen = mlen; }
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
internal_logging.cc | 99 int msglen = state.p_ - state.buf_; local 101 (*log_message_writer)(state.buf_, msglen); 114 (*log_message_writer)(state.buf_, msglen);
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
internal_logging.cc | 98 int msglen = state.p_ - state.buf_; local 100 (*log_message_writer)(state.buf_, msglen); 113 (*log_message_writer)(state.buf_, msglen);
|
/external/kernel-headers/original/uapi/scsi/ |
scsi_netlink.h | 47 uint16_t msglen; member in struct:scsi_nl_hdr 119 (hdr)->msglen = mlen; \
|
/external/chromium_org/third_party/smhasher/src/ |
md5.cpp | 329 unsigned char msglen[8]; local 335 PUT_ULONG_LE( low, msglen, 0 ); 336 PUT_ULONG_LE( high, msglen, 4 ); 342 md5_update( ctx, msglen, 8 );
|
/external/chromium_org/tools/ipc_fuzzer/message_lib/ |
message_file_reader.cc | 117 size_t msglen = message_tail - begin; local 118 if (msglen > INT_MAX) { 124 IPC::Message const_message(begin, msglen); 127 file_data_.remove_prefix(msglen);
|
/external/libpcap/ |
pcap-libdlpi.c | 307 size_t msglen; local 327 msglen = p->bufsize; 331 &msglen, -1, NULL); 346 len = msglen;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 134 size_t msglen; local 143 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 147 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 149 ETH_P_RSN_PREAUTH, msg, msglen);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 806 size_t msglen; local 810 msglen = 1000 + tls_server_cert_chain_der_len(conn); 812 msg = os_malloc(msglen); 817 end = msg + msglen;
|
tlsv1_client_write.c | 735 size_t msglen; local 739 msglen = 2000; 741 msglen += tls_client_cert_chain_der_len(conn); 743 msg = os_malloc(msglen); 748 end = msg + msglen;
|
/system/core/adb/ |
file_sync_service.h | 74 unsigned msglen; member in struct:__anon63394::__anon63399
|
/external/chromium_org/components/nacl/loader/ |
nacl_helper_linux.cc | 277 const ssize_t msglen = UnixDomainSocket::RecvMsg(zygote_ipc_fd, local 286 if (msglen == 0 || (msglen == -1 && errno == ECONNRESET)) { 290 if (msglen < 0) { 295 Pickle read_pickle(buf, msglen);
|
/external/iproute2/lib/ |
libnetlink.c | 197 int msglen = 0; local 217 msglen = status; 219 while (NLMSG_OK(h, msglen)) { 247 h = NLMSG_NEXT(h, msglen); 258 if (msglen) { 259 fprintf(stderr, "!!!Remnant of size %d\n", msglen);
|
/external/pdfium/core/src/fdrm/crypto/ |
fx_crypt.cpp | 233 FX_BYTE msglen[8];
local 234 PUT_FX_DWORD( ctx->total[0], msglen, 0 );
235 PUT_FX_DWORD( ctx->total[1], msglen, 4 );
239 CRYPT_MD5Update( ctx, msglen, 8 );
|
fx_crypt_sha.cpp | 361 FX_BYTE msglen[8];
local 365 PUT_FX_DWORD( high, msglen, 0 );
366 PUT_FX_DWORD( low, msglen, 4 );
370 CRYPT_SHA256Update( ctx, msglen, 8 );
662 FX_BYTE msglen[16];
local 663 FXSYS_memset32(msglen, 0, 16);
668 PUT_FX_64DWORD( high, msglen, 0 );
669 PUT_FX_64DWORD( low, msglen, 8 );
673 CRYPT_SHA384Update( ctx, msglen, 16 );
712 FX_BYTE msglen[16]; local [all...] |
/external/ppp/pppd/ |
upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); 516 u_char msglen; local [all...] |
eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr 1148 int msglen; local 1176 int msglen; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 126 size_t msglen; local 192 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL); 197 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen); 198 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen);
|
/external/openssl/ssl/ |
s3_clnt.c | 3063 size_t msglen; local [all...] |
/external/mdnsresponder/mDNSShared/ |
dnsextd.c | 422 mDNSu16 msglen = 0; local 430 nread = my_recv( sock, &msglen, sizeof( msglen ), closed ); 435 msglen = ntohs( msglen ); 436 require_action_quiet( nread == sizeof( msglen ), exit, err = mStatus_UnknownErr; Log( "Could not read length field of message") ); 440 require_action_quiet( msglen <= sizeof( storage->msg ), exit, err = mStatus_UnknownErr; Log( "RecvPacket: provided buffer too small." ) ); 447 if ( msglen > sizeof(DNSMessage)) 449 allocsize = sizeof(PktMsg) - sizeof(DNSMessage) + msglen; 461 pkt->len = msglen; [all...] |
/external/mdnsresponder/mDNSCore/ |
DNSCommon.c | 2633 mDNSu16 msglen = (mDNSu16)(end - (mDNSu8 *)msg); local [all...] |