/external/libchrome/sandbox/linux/syscall_broker/ |
broker_client.cc | 84 ssize_t msg_len = base::UnixDomainSocket::SendRecvMsgWithFlags( local 87 if (msg_len <= 0) { 93 base::Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); local
|
broker_host.cc | 181 const ssize_t msg_len = base::UnixDomainSocket::RecvMsg( local 184 if (msg_len == 0 || (msg_len == -1 && errno == ECONNRESET)) { 191 if (msg_len < 0 || fds.size() != 1 || fds[0].get() < 0) { 198 base::Pickle pickle(buf, msg_len);
|
/external/srtp/crypto/test/ |
auth_driver.c | 74 auth_bits_per_second(auth_t *h, int msg_len); 171 int msg_len = (msg_len_octets + 1)/2; local 178 for (i=0; i < msg_len; i++)
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|
/external/boringssl/src/crypto/rsa/ |
padding.c | 245 const unsigned msg_len = from_len - zero_index; local 246 if (msg_len > to_len) { 253 if (msg_len > INT_MAX) { 258 memcpy(to, &from[zero_index], msg_len); 259 return (int)msg_len;
|
/external/boringssl/src/ssl/ |
d1_both.c | 214 size_t msg_len = frag->msg_header.msg_len; local 216 if (frag->reassembly == NULL || start > end || end > msg_len) { 221 assert(msg_len > 0); 236 for (i = 0; i < (msg_len >> 3); i++) { 241 if ((msg_len & 7) != 0 && 242 frag->reassembly[msg_len >> 3] != bit_range(0, msg_len & 7)) { 374 !CBB_add_u24(&cbb, ssl->d1->w_msg_hdr.msg_len) || 460 frag = dtls1_hm_fragment_new(msg_hdr->msg_len, 525 const size_t msg_len = msg_hdr.msg_len; local [all...] |
/external/libpcap/ |
pcap-netfilter-linux.c | 111 u_int32_t msg_len; local 204 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); 205 if (msg_len > len) 206 msg_len = len; 208 len -= msg_len; 209 buf += msg_len;
|
/system/bt/stack/gatt/ |
gatt_main.c | 1002 UINT16 msg_len; local [all...] |
gatt_sr.c | 747 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET); local 763 p_msg = (BT_HDR *)osi_calloc(msg_len); 942 size_t msg_len = sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET local [all...] |
/system/core/trusty/libtrusty/tipc-test/ |
tipc_test.c | 343 size_t msg_len; local 361 msg_len = msgsz; 363 msg_len = rand() % msgsz; 366 memset(tx_buf, i + 1, msg_len); 368 rc = write(echo_fd, tx_buf, msg_len); 369 if ((size_t)rc != msg_len) { 374 rc = read(echo_fd, rx_buf, msg_len); 380 if ((size_t)rc != msg_len) { 382 rc, msg_len); 406 size_t msg_len; local [all...] |
/external/tcpdump/ |
print-olsr.c | 93 uint8_t msg_len[2]; member in struct:olsr_msg4 103 uint8_t msg_len[2]; member in struct:olsr_msg6 273 u_int msg_type, msg_len, msg_tlen, hello_len; local 319 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len); 320 if ((msg_len >= sizeof (struct olsr_msg6)) 321 && (msg_len <= length)) 325 if (msg_type == 0 || msg_len == 0) { 337 msg_len, (msg_len_valid == 0) ? " (invalid)" : "")); 342 msg_tlen = msg_len - sizeof(struct olsr_msg6) [all...] |
print-ldp.c | 568 u_short pdu_len,msg_len,msg_type,msg_tlen; local 614 msg_len=EXTRACT_16BITS(ldp_msg_header->length); 617 if (msg_len < sizeof(struct ldp_msg_header)-4) { 625 msg_len, 636 msg_len, 641 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ 644 ND_TCHECK2(*tptr, msg_len); 683 msg_len); 685 tptr += msg_len+4; 686 tlen -= msg_len+4 [all...] |
/external/curl/lib/ |
smb.c | 407 const void *msg, size_t msg_len) 410 cmd, msg_len); local 412 msg, msg_len); 414 return smb_send(conn, sizeof(struct smb_header) + msg_len, 0);
|
/external/kernel-headers/original/uapi/linux/ |
tipc_config.h | 395 int msg_len; local 397 msg_len = TCM_LENGTH(data_len); 399 tcm_hdr->tcm_len = htonl(msg_len);
|
/external/libnfc-nci/src/nfc/include/ |
rw_api.h | 159 UINT16 msg_len; /* Length of the NDEF message */ member in struct:__anon16496 411 ** Parameters: msg_len: The length of the buffer 417 NFC_API extern tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg); 556 ** Parameters: msg_len: The length of the buffer 562 NFC_API extern tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg ); [all...] |
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_vs_emit.c | 1523 int msg_len; local [all...] |
/external/strace/ |
net.c | 633 uint32_t /* unsigned */ msg_len; member in struct:mmsghdr32 639 unsigned msg_len; member in struct:mmsghdr 686 mmsg->msg_len = mmsg32.msg_len; 718 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len) 724 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len); 725 tprintf(", %u}", mmsg.msg_len); 732 decode_mmsg(struct tcb *tcp, unsigned long msg_len) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 160 int msg_len; member in struct:omac1_test_vector 225 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || 231 if (tv->msg_len > 1) { 236 len[1] = tv->msg_len - 1; 247 len[0] = tv->msg_len - 2; 248 addr[1] = tv->msg + tv->msg_len - 2; 250 addr[2] = tv->msg + tv->msg_len - 1; [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 1230 size_t msg_len; local 1500 size_t i, msg_len; local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius.c | 670 size_t msg_len; local 678 msg_len = be_to_host16(hdr->length); 679 if (msg_len < sizeof(*hdr) || msg_len > len) { 684 if (msg_len < len) { 686 "RADIUS message", (unsigned long) len - msg_len); 693 msg->buf = wpabuf_alloc_copy(data, msg_len); [all...] |
/hardware/qcom/msm8996/kernel-headers/media/ |
msmb_pproc.h | 90 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
|
/hardware/qcom/msm8996/original-kernel-headers/media/ |
msmb_pproc.h | 73 uint32_t msg_len; member in struct:msm_cpp_frame_info_t 96 * kernel updates payload with msg_len and stripe_info 268 uint32_t msg_len; member in struct:msm_cpp_frame_info32_t 291 * kernel updates payload with msg_len and stripe_info
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
tipc_config.h | 406 int msg_len; local 408 msg_len = TCM_LENGTH(data_len); 410 tcm_hdr->tcm_len = htonl(msg_len);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
tipc_config.h | 381 int msg_len; local 383 msg_len = TCM_LENGTH(data_len); 385 tcm_hdr->tcm_len = htonl(msg_len);
|
/system/bt/stack/smp/ |
smp_keys.c | 1244 UINT8 msg_len = BT_OCTET32_LEN \/* U size *\/ + BT_OCTET32_LEN \/* V size *\/ + 1 \/* Z size *\/; local 1359 UINT8 msg_len = BT_OCTET32_LEN \/* U size *\/ + BT_OCTET32_LEN \/* V size *\/ local 1592 UINT8 msg_len = 1 \/* Counter size *\/ + 4 \/* keyID size *\/ + local 1832 UINT8 msg_len = BT_OCTET16_LEN \/* N1 size *\/ + BT_OCTET16_LEN \/* N2 size *\/ + local 2117 UINT8 msg_len = 4 \/* KeyID size *\/; local [all...] |