/prebuilts/clang/host/darwin-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/ |
linux_syscall_hooks.h | [all...] |
/prebuilts/clang/host/linux-x86/3.8/lib/clang/3.8/include/sanitizer/ |
linux_syscall_hooks.h | [all...] |
/prebuilts/clang/host/linux-x86/clang-2629532/lib64/clang/3.8/include/sanitizer/ |
linux_syscall_hooks.h | [all...] |
/prebuilts/clang/host/linux-x86/clang-2658975/lib64/clang/3.8/include/sanitizer/ |
linux_syscall_hooks.h | [all...] |
/prebuilts/clang/host/linux-x86/clang-2690385/lib64/clang/3.8/include/sanitizer/ |
linux_syscall_hooks.h | [all...] |
/prebuilts/clang/linux-x86/host/3.6/lib/clang/3.6/include/sanitizer/ |
linux_syscall_hooks.h | [all...] |
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_vs_emit.c | 1523 int msg_len; local [all...] |
/external/libnfc-nci/src/nfc/ndef/ |
ndef_utils.c | 79 tNDEF_STATUS NDEF_MsgValidate (UINT8 *p_msg, UINT32 msg_len, BOOLEAN b_allow_chunks) 82 UINT8 *p_end = p_msg + msg_len; 88 if ( (p_msg == NULL) || (msg_len < 3) ) [all...] |
/external/libnfc-nci/src/nfc/include/ |
ndef_utils.h | 101 EXPORT_NDEF_API extern tNDEF_STATUS NDEF_MsgValidate (UINT8 *p_msg, UINT32 msg_len, BOOLEAN b_allow_chunks);
|
/external/tcpdump/ |
print-ppp.c | 905 int peerid_len, passwd_len, msg_len; local 977 msg_len = *p; /* Msg-Length */ 979 if (length - (p - p0) < msg_len) 982 for (i = 0; i< msg_len; i++) { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.h | 323 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 40 size_t *msg_len, void **data_pos);
|
tdls.c | 235 int initiator, const u8 *msg, size_t msg_len) 241 "msg_len=%u", 243 peer_capab, initiator, (unsigned int) msg_len); 247 msg_len)) { 286 peer->sm_tmr.buf_len = msg_len; 288 peer->sm_tmr.buf = os_malloc(msg_len); 291 os_memcpy(peer->sm_tmr.buf, msg, msg_len); [all...] |
wpa.c | 39 * @msg_len: Length of message 45 u8 *msg, size_t msg_len, u8 *key_mic) 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 77 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 78 ret = wpa_sm_ether_send(sm, dest, proto, msg, msg_len); [all...] |
/hardware/qcom/msm8994/kernel-headers/media/ |
msmb_pproc.h | 206 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
|
/hardware/qcom/msm8x84/kernel-headers/media/ |
msmb_pproc.h | 160 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
|
/external/boringssl/src/crypto/err/ |
err.c | 577 static int print_errors_to_file(const char* msg, size_t msg_len, void* ctx) { 578 assert(msg[msg_len] == '\0');
|
/sdk/apps/SdkController/src/com/android/tools/sdkcontroller/lib/ |
Channel.java | 429 public boolean sendMessage(int msg_type, byte[] msg, int msg_len) { 433 sendMessage(socket, msg_type, msg, msg_len);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 160 int msg_len; member in struct:omac1_test_vector 225 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || 231 if (tv->msg_len > 1) { 236 len[1] = tv->msg_len - 1; 247 len[0] = tv->msg_len - 2; 248 addr[1] = tv->msg + tv->msg_len - 2; 250 addr[2] = tv->msg + tv->msg_len - 1; [all...] |
/external/libnfc-nci/src/nfa/int/ |
nfa_hci_int.h | 395 UINT16 msg_len; /* For segmentation - length of the combined message */ member in struct:__anon16366
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/bits/ |
socket.h | 275 unsigned int msg_len; /* Number of received bytes for the entry. */ member in struct:mmsghdr
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/bits/ |
socket.h | 275 unsigned int msg_len; /* Number of received bytes for the entry. */ member in struct:mmsghdr
|
/system/bt/stack/smp/ |
smp_int.h | 377 extern void smp_aes_cmac_rfc4493_chk (UINT8 *key, UINT8 *msg, UINT8 msg_len,
|
/hardware/qcom/msm8996/original-kernel-headers/linux/ |
msm_ipa.h | 1361 uint16_t msg_len; member in struct:ipa_msg_meta [all...] |
/external/toybox/generated/ |
globals.h | 861 unsigned msg_len; member in struct:traceroute_data
|