/toolchain/binutils/binutils-2.27/gas/testsuite/gas/mn10300/ |
pr997.s | 4 msglen = .-msg-1 define 5 msglen=msglen & 0xff
|
/external/ltp/testcases/kernel/syscalls/recvmsg/ |
recvmsg02.c | 39 static const unsigned msglen = ARRAY_SIZE(msg) - 1; variable 78 R = sendto(sdw, msg, msglen, 0, (struct sockaddr*)&addr_r, addrlen_r);
|
/external/ltp/utils/sctp/func_tests/ |
test_recvmsg.c | 69 int error, msglen, i; local 138 for (i = 0, msglen = 30000; i < 15; i++, msglen-=2000) { 142 test_check_msg_data(&inmessage, error, msglen,
|
/bionic/libc/kernel/uapi/scsi/ |
scsi_netlink.h | 31 uint16_t msglen; member in struct:scsi_nl_hdr 50 #define INIT_SCSI_NL_HDR(hdr,t,mtype,mlen) { (hdr)->version = SCSI_NL_VERSION; (hdr)->transport = t; (hdr)->magic = SCSI_NL_MAGIC; (hdr)->msgtype = mtype; (hdr)->msglen = mlen; }
|
/external/iproute2/testsuite/tools/ |
generate_nlmsg.c | 97 int msglen; local 100 msglen = fill_vf_rate_test(buf, sizeof(buf)); 101 if (msglen < 0) { 110 if (fwrite(buf, msglen, 1, fp) != 1) {
|
/external/kernel-headers/original/uapi/scsi/ |
scsi_netlink.h | 48 uint16_t msglen; member in struct:scsi_nl_hdr 120 (hdr)->msglen = mlen; \
|
/external/libpcap/ |
pcap-libdlpi.c | 336 size_t msglen; local 356 msglen = p->bufsize; 360 &msglen, -1, NULL); 375 len = msglen;
|
sockutils.c | 356 size_t msglen; local 373 msglen = strlen(errbufptr); 375 errbufptr[msglen] = ' '; 376 errbufptr[msglen + 1] = 0; 378 bufspaceleft = bufspaceleft - (msglen + 1); 379 errbufptr += (msglen + 1); [all...] |
/external/ltp/testcases/network/stress/ns-tools/ |
ns-mcast_receiver.c | 372 ssize_t msglen; /* the length of message */ local 408 msglen = recvfrom(sd, msgbuf, msgbuf_size, MSG_DONTWAIT, 410 if (msglen < 0) { 414 fprintf(stderr, "received %zd byte message\n", msglen);
|
ns-udpserver.c | 145 ssize_t msglen; /* the length of message */ local 168 if ((msglen = recvfrom(sock_fd, msgbuf, msgbuf_size, 0, 172 msgbuf[msglen] = '\0'; 178 if (sendto(sock_fd, msgbuf, msglen, 0, 180 sizeof(client_addr)) != msglen)
|
/external/syslinux/core/lwip/src/netif/ppp/ |
pap.c | 396 int msglen; local 442 retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen); 446 upap_sresp(u, retcode, id, msg, msglen); 468 u_char msglen; local 486 GETCHAR(msglen, inp); 487 if (msglen > 0) { 489 if (len < msglen) { 494 PRINTMSG(msg, msglen); 510 u_char msglen; local 527 GETCHAR(msglen, inp) [all...] |
chap.c | 749 int outlen, msglen; local 757 msglen = (int)strlen(msg); 759 outlen = CHAP_HEADERLEN + msglen; 767 BCOPY(msg, outp, msglen);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.c | 135 size_t msglen; local 144 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); 150 ETH_P_RSN_PREAUTH, msg, msglen);
|
/system/core/adb/ |
file_sync_service.h | 78 uint32_t msglen; member in struct:syncmsg::__anon2742
|
/external/ppp/pppd/ |
upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); 515 u_char msglen; local [all...] |
eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr 1148 int msglen; local 1176 int msglen; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 873 size_t msglen; local 877 msglen = 2000; 879 msglen += tls_client_cert_chain_der_len(conn); 881 msg = os_malloc(msglen); 886 end = msg + msglen;
|
tlsv1_server_write.c | 930 size_t msglen; local 951 msglen = 1000 + tls_server_cert_chain_der_len(conn) + ocsp_resp_len; 953 msg = os_malloc(msglen); 960 end = msg + msglen;
|
/hardware/qcom/data/ipacfg-mgr/msm8998/ipacm/src/ |
IPACM_Netlink.cpp | 256 uint32_t msglen 264 if(IPA_NL_MSG_MAX_LEN < msglen) 294 buf = (unsigned char *)malloc(msglen); 315 iov->iov_len = msglen; 1538 unsigned int msglen = 0; local [all...] |
/external/libcups/cups/ |
snmp.c | 1091 msglen, /* Length of entire message */ local 1142 msglen = 2 + asn1_size_integer(packet->version) + 1145 total = 1 + asn1_size_length(msglen) + msglen; 1160 asn1_set_length(&bufptr, msglen); [all...] |
/external/iproute2/lib/ |
libnetlink.c | 426 int msglen = 0; local 450 msglen = status; 452 while (NLMSG_OK(h, msglen)) { 486 h = NLMSG_NEXT(h, msglen); 501 if (msglen) { 502 fprintf(stderr, "!!!Remnant of size %d\n", msglen);
|
/external/pdfium/core/fdrm/crypto/ |
fx_crypt_sha.cpp | 484 uint8_t msglen[8]; local 487 SHA_PUT_UINT32(high, msglen, 0); 488 SHA_PUT_UINT32(low, msglen, 4); 492 CRYPT_SHA256Update(ctx, msglen, 8); 557 uint8_t msglen[16]; local 558 memset(msglen, 0, 16); 562 PUT_UINT64(high, msglen, 0); 563 PUT_UINT64(low, msglen, 8); 567 CRYPT_SHA384Update(ctx, msglen, 16); 608 uint8_t msglen[16] local [all...] |
/external/syslinux/gpxe/src/net/udp/ |
tftp.c | 430 size_t msglen; local 436 msglen = sizeof ( *err ) + strlen ( errmsg ) + 1 /* NUL */; 437 iobuf = xfer_alloc_iob ( &tftp->socket, msglen ); 442 err = iob_put ( iobuf, msglen ); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 142 size_t msglen; local 210 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL); 215 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen); 216 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen); [all...] |
/external/curl/tests/server/ |
rtspd.c | 944 size_t msglen; local 957 msglen = strlen(msgbuf); 960 msglen, msgbuf); [all...] |