HomeSort by relevance Sort by last modified time
    Searched full:msg_len (Results 1 - 25 of 138) sorted by null

1 2 3 4 5 6

  /hardware/libhardware_legacy/include/hardware_legacy/
uevent.h 27 int uevent_add_native_handler(void (*handler)(void *data, const char *msg, int msg_len),
29 int uevent_remove_native_handler(void (*handler)(void *data, const char *msg, int msg_len));
  /external/chromium-trace/catapult/third_party/typ/typ/
printer.py 30 msg_len = len(msg)
31 if elide and self.cols and msg_len > self.cols - 5:
  /external/boringssl/src/ssl/
d1_both.c 214 size_t msg_len = frag->msg_header.msg_len; local
216 if (frag->reassembly == NULL || start > end || end > msg_len) {
221 assert(msg_len > 0);
236 for (i = 0; i < (msg_len >> 3); i++) {
241 if ((msg_len & 7) != 0 &&
242 frag->reassembly[msg_len >> 3] != bit_range(0, msg_len & 7)) {
374 !CBB_add_u24(&cbb, ssl->d1->w_msg_hdr.msg_len) ||
460 frag = dtls1_hm_fragment_new(msg_hdr->msg_len,
525 const size_t msg_len = msg_hdr.msg_len; local
    [all...]
  /hardware/libhardware_legacy/uevent/
uevent.c 35 void (*handler)(void *data, const char *msg, int msg_len);
103 int uevent_add_native_handler(void (*handler)(void *data, const char *msg, int msg_len),
121 int uevent_remove_native_handler(void (*handler)(void *data, const char *msg, int msg_len))
  /system/core/trusty/libtrusty/tipc-test/
tipc_test.c 343 size_t msg_len; local
361 msg_len = msgsz;
363 msg_len = rand() % msgsz;
366 memset(tx_buf, i + 1, msg_len);
368 rc = write(echo_fd, tx_buf, msg_len);
369 if ((size_t)rc != msg_len) {
374 rc = read(echo_fd, rx_buf, msg_len);
380 if ((size_t)rc != msg_len) {
382 rc, msg_len);
406 size_t msg_len; local
    [all...]
  /external/boringssl/src/crypto/cmac/
cmac_test.cc 32 const uint8_t *msg, size_t msg_len, const uint8_t *expected) {
35 if (!AES_CMAC(out, key, key_len, msg, msg_len)) {
52 for (unsigned chunk_size = 1; chunk_size <= msg_len; chunk_size++) {
59 while (done < msg_len) {
60 size_t todo = std::min(msg_len - done, static_cast<size_t>(chunk_size));
  /external/libchrome/sandbox/linux/syscall_broker/
broker_host.cc 181 const ssize_t msg_len = base::UnixDomainSocket::RecvMsg( local
184 if (msg_len == 0 || (msg_len == -1 && errno == ECONNRESET)) {
191 if (msg_len < 0 || fds.size() != 1 || fds[0].get() < 0) {
198 base::Pickle pickle(buf, msg_len);
broker_client.cc 84 ssize_t msg_len = base::UnixDomainSocket::SendRecvMsgWithFlags( local
87 if (msg_len <= 0) {
93 base::Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); local
  /system/core/libcutils/
debugger.c 32 static int send_request(int sock_fd, void* msg_ptr, size_t msg_len) {
34 if (TEMP_FAILURE_RETRY(write(sock_fd, msg_ptr, msg_len)) != (ssize_t) msg_len) {
  /external/tcpdump/
print-olsr.c 93 uint8_t msg_len[2]; member in struct:olsr_msg4
103 uint8_t msg_len[2]; member in struct:olsr_msg6
273 u_int msg_type, msg_len, msg_tlen, hello_len; local
319 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len);
320 if ((msg_len >= sizeof (struct olsr_msg6))
321 && (msg_len <= length))
325 if (msg_type == 0 || msg_len == 0) {
337 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""));
342 msg_tlen = msg_len - sizeof(struct olsr_msg6)
    [all...]
print-ldp.c 568 u_short pdu_len,msg_len,msg_type,msg_tlen; local
614 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
617 if (msg_len < sizeof(struct ldp_msg_header)-4) {
625 msg_len,
636 msg_len,
641 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */
644 ND_TCHECK2(*tptr, msg_len);
683 msg_len);
685 tptr += msg_len+4;
686 tlen -= msg_len+4
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
  /external/wpa_supplicant_8/wpa_supplicant/
preauth_test.c 46 size_t *msg_len, void **data_pos)
50 *msg_len = sizeof(*hdr) + data_len;
51 hdr = os_malloc(*msg_len);
73 size_t *msg_len, void **data_pos)
75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
  /hardware/qcom/msm8994/original-kernel-headers/media/
msmb_pproc.h 202 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
225 * kernel updates payload with msg_len and stripe_info
398 uint32_t msg_len; member in struct:msm_cpp_frame_info32_t
421 * kernel updates payload with msg_len and stripe_info
  /hardware/qcom/msm8996/original-kernel-headers/media/
msmb_pproc.h 73 uint32_t msg_len; member in struct:msm_cpp_frame_info_t
96 * kernel updates payload with msg_len and stripe_info
268 uint32_t msg_len; member in struct:msm_cpp_frame_info32_t
291 * kernel updates payload with msg_len and stripe_info
  /external/srtp/crypto/test/
auth_driver.c 74 auth_bits_per_second(auth_t *h, int msg_len);
171 int msg_len = (msg_len_octets + 1)/2; local
178 for (i=0; i < msg_len; i++)
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_poll.py 30 MSG_LEN = len(MSG)
61 buf = os.read(rd, MSG_LEN)
62 self.assertEqual(len(buf), MSG_LEN)
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_poll.py 30 MSG_LEN = len(MSG)
61 buf = os.read(rd, MSG_LEN)
62 self.assertEqual(len(buf), MSG_LEN)
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_poll.py 30 MSG_LEN = len(MSG)
61 buf = os.read(rd, MSG_LEN)
62 self.assertEqual(len(buf), MSG_LEN)
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_poll.py 30 MSG_LEN = len(MSG)
61 buf = os.read(rd, MSG_LEN)
62 self.assertEqual(len(buf), MSG_LEN)
  /external/toybox/toys/pending/
traceroute.c 66 unsigned msg_len;
127 send_icmp4->icmp_cksum = in_cksum((uint16_t *) send_icmp4, TT.msg_len);
135 len = TT.msg_len;
156 if (sendto(TT.snd_sock, out, TT.msg_len, 0,
505 TT.msg_len = pack_size = ICMP_HD_SIZE4; //udp payload is also 8bytes
507 TT.msg_len = atolx_range(toys.optargs[1], pack_size, 32768);//max packet size
559 if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len,
560 sizeof(TT.msg_len)) < 0) perror_exit("SO_SNDBUF failed ");
576 TT.packet = xzalloc(TT.msg_len);
638 xprintf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len);
    [all...]
  /external/libpcap/
pcap-netfilter-linux.c 111 u_int32_t msg_len; local
204 msg_len = NLMSG_ALIGN(nlh->nlmsg_len);
205 if (msg_len > len)
206 msg_len = len;
208 len -= msg_len;
209 buf += msg_len;
  /external/strace/
net.c 633 uint32_t /* unsigned */ msg_len; member in struct:mmsghdr32
639 unsigned msg_len; member in struct:mmsghdr
686 mmsg->msg_len = mmsg32.msg_len;
718 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len)
724 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len);
725 tprintf(", %u}", mmsg.msg_len);
732 decode_mmsg(struct tcb *tcp, unsigned long msg_len)
    [all...]
  /bionic/tests/
sys_socket_test.cpp 153 msgs[i].msg_len = sizeof(struct msghdr);
195 msgs[i].msg_len = sizeof(struct msghdr);
  /external/boringssl/src/crypto/rsa/
rsa.c 384 size_t msg_len) {
389 if (msg_len != SSL_SIG_LENGTH) {
411 signed_msg_len = prefix_len + msg_len;
424 memcpy(signed_msg + prefix_len, msg, msg_len);
474 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len,
484 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa);
492 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) {
509 &signed_msg_is_alloced, hash_nid, msg, msg_len)) {

Completed in 626 milliseconds

1 2 3 4 5 6