/toolchain/binutils/binutils-2.25/gas/testsuite/gas/mn10300/ |
pr997.s | 4 msglen = .-msg-1 define 5 msglen=msglen & 0xff
|
pr997.l | 10 4.*msglen = .-msg-1 11 5.*msglen=msglen & 0xff 18 .*/pr997.s:4.*\*ABS\*:0+0d msglen
|
/hardware/libhardware/include/hardware/ |
qemud.h | 105 qemud_channel_send(int fd, const void* msg, int msglen) 109 if (msglen < 0) 110 msglen = strlen((const char*)msg); 112 if (msglen == 0) 115 snprintf(header, sizeof header, "%04x", msglen); 121 if (qemud_fd_write(fd, msg, msglen) != msglen) {
|
/bionic/libc/kernel/uapi/scsi/ |
scsi_netlink.h | 34 uint16_t msglen; member in struct:scsi_nl_hdr 57 #define INIT_SCSI_NL_HDR(hdr,t,mtype,mlen) { (hdr)->version = SCSI_NL_VERSION; (hdr)->transport = t; (hdr)->magic = SCSI_NL_MAGIC; (hdr)->msgtype = mtype; (hdr)->msglen = mlen; }
|
/external/kernel-headers/original/uapi/scsi/ |
scsi_netlink.h | 47 uint16_t msglen; member in struct:scsi_nl_hdr 119 (hdr)->msglen = mlen; \
|
/external/ppp/pppd/ |
upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); 515 u_char msglen; local [all...] |
eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr 1148 int msglen; local 1176 int msglen; local [all...] |
/system/bt/udrv/include/ |
uipc.h | 95 BOOLEAN UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen);
|
/bionic/libc/dns/nameser/ |
ns_print.c | 60 static int addname(const u_char *msg, size_t msglen, 108 ns_sprintrrf(const u_char *msg, size_t msglen, 174 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 201 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 205 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 276 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 294 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 298 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 383 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)); 402 T(addname(msg, msglen, &rdata, origin, &buf, &buflen)) [all...] |
ns_parse.c | 105 ns_initparse(const u_char *msg, int msglen, ns_msg *handle) { 106 const u_char *eom = msg + msglen;
|
/external/libnfc-nci/src/udrv/include/ |
uipc.h | 127 UDRV_API extern BOOLEAN UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen);
|
/system/core/adb/ |
file_sync_service.h | 62 uint32_t msglen; member in struct:syncmsg::__anon73081
|
file_sync_service.cpp | 218 msg.status.msglen = 0; 295 msg.status.msglen = 0;
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
_version133.py | 381 msglen = len(message) 382 mbits = msglen * 8 385 blocks = msglen / nbytes 387 if msglen % nbytes > 0:
|
_version200.py | 459 msglen = len(message) 460 mbits = msglen * 8 464 blocks = msglen / nbytes 466 if msglen % nbytes > 0:
|
/external/libpcap/ |
pcap-libdlpi.c | 319 size_t msglen; local 339 msglen = p->bufsize; 343 &msglen, -1, NULL); 358 len = msglen;
|
/external/pdfium/core/src/fdrm/crypto/ |
fx_crypt_sha.cpp | 340 uint8_t msglen[8]; local 343 PUT_FX_DWORD(high, msglen, 0); 344 PUT_FX_DWORD(low, msglen, 4); 348 CRYPT_SHA256Update(ctx, msglen, 8); 580 uint8_t msglen[16]; local 581 FXSYS_memset(msglen, 0, 16); 585 PUT_FX_64DWORD(high, msglen, 0); 586 PUT_FX_64DWORD(low, msglen, 8); 590 CRYPT_SHA384Update(ctx, msglen, 16); 627 uint8_t msglen[16] local [all...] |
fx_crypt.cpp | 228 uint8_t msglen[8]; local 229 PUT_FX_DWORD(ctx->total[0], msglen, 0); 230 PUT_FX_DWORD(ctx->total[1], msglen, 4); 234 CRYPT_MD5Update(ctx, msglen, 8);
|
/external/ipsec-tools/src/libipsec/ |
policy_parse.y | 586 policy_parse(msg, msglen) 588 int msglen; 619 ipsec_set_policy(msg, msglen) 621 int msglen; 625 policy = policy_parse(msg, msglen);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 135 size_t msglen; local 144 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 150 ETH_P_RSN_PREAUTH, msg, msglen);
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
srv.h | 299 int __cdecl srv_log(SRV_SERVER *server,WINBOOL datestamp,char *msg,int msglen); 310 int __cdecl srv_wsendmsg(SRV_PROC *srvproc,__LONG32 msgnum,BYTE msgclass,WCHAR *message,int msglen); 311 int __cdecl srv_sendmsg(SRV_PROC *srvproc,int msgtype,__LONG32 msgnum,BYTE msgclass,BYTE state,char *rpcname,int rpcnamelen,USHORT linenum,char *message,int msglen);
|
/external/iproute2/lib/ |
libnetlink.c | 234 int msglen = 0; local 257 msglen = status; 259 while (NLMSG_OK(h, msglen)) { 300 h = NLMSG_NEXT(h, msglen); 315 if (msglen) { 316 fprintf(stderr, "!!!Remnant of size %d\n", msglen);
|
/external/toybox/toys/pending/ |
ip.c | 1468 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); local 1599 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); local 1622 int msglen = recv(sockfd, toybuf, sizeof(toybuf), 0); local 1730 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); local 2222 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); local 2684 int msglen = recv(TT.sockfd, TT.gbuf, MESG_LEN, 0); local [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 873 size_t msglen; local 877 msglen = 2000; 879 msglen += tls_client_cert_chain_der_len(conn); 881 msg = os_malloc(msglen); 886 end = msg + msglen;
|
/system/bt/udrv/ulinux/ |
uipc.c | 693 UINT16 msglen) 697 BTIF_TRACE_DEBUG("UIPC_Send : ch_id:%d %d bytes", ch_id, msglen); 702 OSI_NO_INTR(ret = write(uipc_main.ch[ch_id].fd, p_buf, msglen));
|