/toolchain/binutils/binutils-2.25/gas/testsuite/gas/mn10300/ |
pr997.s | 4 msglen = .-msg-1 define 5 msglen=msglen & 0xff
|
/external/ltp/testcases/kernel/syscalls/recvmsg/ |
recvmsg02.c | 39 static const unsigned msglen = ARRAY_SIZE(msg) - 1; variable 78 R = sendto(sdw, msg, msglen, 0, (struct sockaddr*)&addr_r, addrlen_r);
|
/external/ltp/utils/sctp/func_tests/ |
test_recvmsg.c | 69 int error, msglen, i; local 138 for (i = 0, msglen = 30000; i < 15; i++, msglen-=2000) { 142 test_check_msg_data(&inmessage, error, msglen,
|
/bionic/libc/kernel/uapi/scsi/ |
scsi_netlink.h | 34 uint16_t msglen; member in struct:scsi_nl_hdr 57 #define INIT_SCSI_NL_HDR(hdr,t,mtype,mlen) { (hdr)->version = SCSI_NL_VERSION; (hdr)->transport = t; (hdr)->magic = SCSI_NL_MAGIC; (hdr)->msgtype = mtype; (hdr)->msglen = mlen; }
|
/external/kernel-headers/original/uapi/scsi/ |
scsi_netlink.h | 47 uint16_t msglen; member in struct:scsi_nl_hdr 119 (hdr)->msglen = mlen; \
|
/external/libpcap/ |
pcap-libdlpi.c | 319 size_t msglen; local 339 msglen = p->bufsize; 343 &msglen, -1, NULL); 358 len = msglen;
|
/external/ltp/testcases/network/stress/ns-tools/ |
ns-mcast_receiver.c | 372 ssize_t msglen; /* the length of message */ local 408 msglen = recvfrom(sd, msgbuf, msgbuf_size, MSG_DONTWAIT, 410 if (msglen < 0) { 414 fprintf(stderr, "received %zd byte message\n", msglen);
|
ns-udpserver.c | 145 ssize_t msglen; /* the length of message */ local 168 if ((msglen = recvfrom(sock_fd, msgbuf, msgbuf_size, 0, 172 msgbuf[msglen] = '\0'; 178 if (sendto(sock_fd, msgbuf, msglen, 0, 180 sizeof(client_addr)) != msglen)
|
/external/pdfium/core/fdrm/crypto/ |
fx_crypt.cpp | 230 uint8_t msglen[8]; local 231 PUT_UINT32(ctx->total[0], msglen, 0); 232 PUT_UINT32(ctx->total[1], msglen, 4); 236 CRYPT_MD5Update(ctx, msglen, 8);
|
fx_crypt_sha.cpp | 334 uint8_t msglen[8]; local 337 PUT_UINT32(high, msglen, 0); 338 PUT_UINT32(low, msglen, 4); 342 CRYPT_SHA256Update(ctx, msglen, 8); 577 uint8_t msglen[16]; local 578 FXSYS_memset(msglen, 0, 16); 582 PUT_UINT64(high, msglen, 0); 583 PUT_UINT64(low, msglen, 8); 587 CRYPT_SHA384Update(ctx, msglen, 16); 629 uint8_t msglen[16] local [all...] |
/external/syslinux/core/lwip/src/netif/ppp/ |
pap.c | 396 int msglen; local 442 retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen); 446 upap_sresp(u, retcode, id, msg, msglen); 468 u_char msglen; local 486 GETCHAR(msglen, inp); 487 if (msglen > 0) { 489 if (len < msglen) { 494 PRINTMSG(msg, msglen); 510 u_char msglen; local 527 GETCHAR(msglen, inp) [all...] |
chap.c | 749 int outlen, msglen; local 757 msglen = (int)strlen(msg); 759 outlen = CHAP_HEADERLEN + msglen; 767 BCOPY(msg, outp, msglen);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 135 size_t msglen; local 144 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 150 ETH_P_RSN_PREAUTH, msg, msglen);
|
/system/core/adb/ |
file_sync_service.h | 78 uint32_t msglen; member in struct:syncmsg::__anon106723
|
/external/ppp/pppd/ |
upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); 515 u_char msglen; local [all...] |
eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr 1148 int msglen; local 1176 int msglen; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 873 size_t msglen; local 877 msglen = 2000; 879 msglen += tls_client_cert_chain_der_len(conn); 881 msg = os_malloc(msglen); 886 end = msg + msglen;
|
tlsv1_server_write.c | 930 size_t msglen; local 951 msglen = 1000 + tls_server_cert_chain_der_len(conn) + ocsp_resp_len; 953 msg = os_malloc(msglen); 960 end = msg + msglen;
|
/external/iproute2/lib/ |
libnetlink.c | 234 int msglen = 0; local 257 msglen = status; 259 while (NLMSG_OK(h, msglen)) { 300 h = NLMSG_NEXT(h, msglen); 315 if (msglen) { 316 fprintf(stderr, "!!!Remnant of size %d\n", msglen);
|
/external/libcups/cups/ |
snmp.c | 1087 msglen, /* Length of entire message */ local 1138 msglen = 2 + asn1_size_integer(packet->version) + 1141 total = 1 + asn1_size_length(msglen) + msglen; 1156 asn1_set_length(&bufptr, msglen); [all...] |
/external/syslinux/gpxe/src/net/udp/ |
tftp.c | 430 size_t msglen; local 436 msglen = sizeof ( *err ) + strlen ( errmsg ) + 1 /* NUL */; 437 iobuf = xfer_alloc_iob ( &tftp->socket, msglen ); 442 err = iob_put ( iobuf, msglen ); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 142 size_t msglen; local 208 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL); 213 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen); 214 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen); [all...] |
/external/curl/tests/server/ |
rtspd.c | 935 size_t msglen; local 948 msglen = strlen(msgbuf); 951 msglen, msgbuf); [all...] |
sws.c | 1071 size_t msglen; local 1083 msglen = strlen(msgbuf); 1089 msglen, msgbuf) [all...] |
/external/mdnsresponder/mDNSShared/ |
dnsextd.c | 422 mDNSu16 msglen = 0; local 430 nread = my_recv( sock, &msglen, sizeof( msglen ), closed ); 435 msglen = ntohs( msglen ); 436 require_action_quiet( nread == sizeof( msglen ), exit, err = mStatus_UnknownErr; Log( "Could not read length field of message") ); 440 require_action_quiet( msglen <= sizeof( storage->msg ), exit, err = mStatus_UnknownErr; Log( "RecvPacket: provided buffer too small." ) ); 447 if ( msglen > sizeof(DNSMessage)) 449 allocsize = sizeof(PktMsg) - sizeof(DNSMessage) + msglen; 461 pkt->len = msglen; [all...] |