HomeSort by relevance Sort by last modified time
    Searched refs:message_len (Results 1 - 25 of 28) sorted by null

1 2

  /system/connectivity/wifilogd/
message_buffer.cpp 34 bool MessageBuffer::Append(const uint8_t* message, uint16_t message_len) {
35 CHECK(message_len);
37 if (!CanFitNow(message_len)) {
41 AppendHeader(message_len);
42 AppendRawBytes(message, message_len);
82 void MessageBuffer::AppendHeader(uint16_t message_len) {
84 header.payload_len = message_len;
message_buffer.h 92 void AppendHeader(uint16_t message_len);
  /external/mmc-utils/3rdparty/hmac_sha/
hmac_sha2.h 99 unsigned int message_len);
103 const unsigned char *message, unsigned int message_len,
110 unsigned int message_len);
114 const unsigned char *message, unsigned int message_len,
121 unsigned int message_len);
125 const unsigned char *message, unsigned int message_len,
132 unsigned int message_len);
136 const unsigned char *message, unsigned int message_len,
hmac_sha2.c 100 unsigned int message_len)
102 sha224_update(&ctx->ctx_inside, message, message_len);
118 const unsigned char *message, unsigned int message_len,
124 hmac_sha224_update(&ctx, message, message_len);
186 unsigned int message_len)
188 sha256_update(&ctx->ctx_inside, message, message_len);
204 const unsigned char *message, unsigned int message_len,
210 hmac_sha256_update(&ctx, message, message_len);
272 unsigned int message_len)
274 sha384_update(&ctx->ctx_inside, message, message_len);
    [all...]
  /hardware/qcom/wlan/qcwcn/wifi_hal/
nan_req.cpp 27 size_t message_len = NAN_MAX_ENABLE_REQ_SIZE; local
34 message_len += \
164 pNanEnableReqMsg pFwReq = (pNanEnableReqMsg)malloc(message_len);
170 ALOGV("Message Len %zu", message_len);
171 memset (pFwReq, 0, message_len);
174 pFwReq->fwHeader.msgLen = message_len;
342 mDataLen = message_len;
359 size_t message_len = sizeof(NanDisableReqMsg); local
361 pNanDisableReqMsg pFwReq = (pNanDisableReqMsg)malloc(message_len);
367 ALOGV("Message Len %zu", message_len);
391 size_t message_len = 0; local
645 size_t message_len = local
862 size_t message_len = sizeof(NanPublishServiceCancelReqMsg); local
903 size_t message_len = local
1125 size_t message_len = sizeof(NanSubscribeServiceCancelReqMsg); local
1164 size_t message_len = local
1236 size_t message_len = sizeof(NanStatsReqMsg); local
1277 size_t message_len = sizeof(NanTcaReqMsg); local
1334 size_t message_len = sizeof(NanMsgHeader) + \\ local
1634 size_t message_len = sizeof(NanCapabilitiesReqMsg); local
1666 size_t message_len = sizeof(NanTestModeReqMsg); local
    [all...]
nan_rsp.cpp 668 u32 message_len)
672 if (message_len != sizeof(NanPublishStats)) {
674 __func__, stats_type, message_len, sizeof(NanPublishStats));
709 if (message_len != sizeof(NanSubscribeStats)) {
711 __func__, stats_type, message_len, sizeof(NanSubscribeStats));
    [all...]
nancommand.h 96 u32 message_len);
  /system/core/trusty/keymaster/
trusty_keymaster_device_test.cpp 183 size_t message_len = params.modulus_size / 8; local
184 std::unique_ptr<uint8_t[]> message(build_message(message_len));
187 EXPECT_EQ(KM_ERROR_OK, device.sign_data(&sig_params, ptr, size, message.get(), message_len,
190 EXPECT_EQ(message_len, siglen);
202 size_t message_len = params.modulus_size / 8 - 1; local
203 std::unique_ptr<uint8_t[]> message(build_message(message_len));
207 message_len, &signature, &siglen));
219 size_t message_len = params.modulus_size / 8 + 1; local
220 std::unique_ptr<uint8_t[]> message(build_message(message_len));
224 message_len, &signature, &siglen))
274 size_t message_len = 1024 * 7; local
296 size_t message_len = params.modulus_size \/ 8; local
317 size_t message_len = params.modulus_size \/ 8; local
340 size_t message_len = params.modulus_size \/ 8; local
362 size_t message_len = params.modulus_size \/ 8; local
384 size_t message_len = params.modulus_size \/ 8; local
424 size_t message_len = 1024 * 7; local
520 size_t message_len = params.modulus_size \/ 8; local
    [all...]
trusty_keymaster_main.cpp 188 size_t message_len = 1024 / 8; local
189 std::unique_ptr<uint8_t[]> message(new uint8_t[message_len]);
190 memset(message.get(), 'a', message_len);
191 keymaster_blob_t input = {message.get(), message_len}, signature;
224 size_t message_len = 1024 / 8; local
225 std::unique_ptr<uint8_t[]> message(new uint8_t[message_len]);
226 memset(message.get(), 'a', message_len);
227 keymaster_blob_t input = {message.get(), message_len}, signature;
265 message_len) != 1) {
292 size_t message_len = 30 /* arbitrary */ local
328 size_t message_len = 30 \/* arbitrary *\/; local
    [all...]
  /external/boringssl/src/include/openssl/
curve25519.h 80 // ED25519_sign sets |out_sig| to be a signature of |message_len| bytes from
84 size_t message_len,
88 // |public_key| of |message_len| bytes from |message|. It returns zero
90 OPENSSL_EXPORT int ED25519_verify(const uint8_t *message, size_t message_len,
  /device/google/contexthub/contexthubhal/
nanohubhal.h 70 message_len = len;
87 message_len = msg->message_len;
91 if (msg->message_len > 0 && msg->message != nullptr) {
92 data_ = std::unique_ptr<uint8_t>(new uint8_t[msg->message_len]);
93 memcpy(data_.get(), msg->message, msg->message_len);
108 other.message_len = 0;
NanohubHidlAdapter.cpp 140 .message_len = static_cast<uint32_t>(msg.msg.size()), // Note the check above
146 if (txMsg.message_len == 0 && txMsg.message == nullptr) {
152 txMsg.message_len,
336 rxMsg.message_len,
346 rxMsg.message_len);
370 msg.message_len = sizeof(req);
419 hubMsg.message_len = binaryWithHeader.size();
449 msg.message_len = sizeof(req);
480 msg.message_len = sizeof(req);
506 msg.message_len = sizeof(payload)
    [all...]
nanohubhal.cpp 427 dumpBuffer("APP -> HAL", msg->app_name, msg->message_type, 0, msg->message, msg->message_len);
430 } else if (msg->message_len > MAX_RX_PACKET) {
435 dumpBuffer("APP -> DEV", msg->app_name, msg->message_type, endpoint, msg->message, msg->message_len);
437 ret = doSendToDevice(msg->app_name, msg->message, msg->message_len, msg->message_type, endpoint);
system_comms.cpp 318 mLen = appMsg->message_len;
423 if (appMsg->message_len != sizeof(appName)) {
    [all...]
  /system/core/logd/
LogAudit.cpp 323 size_t message_len = str_len + sizeof(android_log_event_string_t); local
328 uint32_t buffer[(message_len + sizeof(uint32_t) - 1) / sizeof(uint32_t)];
341 (message_len <= USHRT_MAX) ? (unsigned short)message_len
383 message_len = str_len + prefix_len + suffix_len + bug_metadata.length() + 2;
386 char newstr[message_len];
396 (message_len <= USHRT_MAX) ? (unsigned short)message_len
411 rc = message_len;
  /system/iot/attestation/atap/test/
atap_util_unittest.cpp 77 uint32_t message_len = *(uint32_t*)next(buf, index, sizeof(uint32_t)); local
78 EXPECT_EQ(serialized_size - ATAP_HEADER_LEN, message_len);
104 uint32_t message_len = 100; local
105 uint8_t* res = append_header_to_buf(buf, message_len);
108 EXPECT_EQ(message_len, *(uint32_t*)&buf[4]);
311 uint32_t message_len = 128 - ATAP_HEADER_LEN; local
313 message_len - ATAP_GCM_IV_LEN - sizeof(uint32_t) - ATAP_GCM_TAG_LEN;
315 append_header_to_buf(buf, message_len);
  /hardware/interfaces/contexthub/1.0/default/
Contexthub.cpp 154 .message_len = static_cast<uint32_t>(msg.msg.size()), // Note the check above
160 if (txMsg.message_len == 0 && txMsg.message == nullptr) {
166 txMsg.message_len,
188 msg.message_len = 0;
380 rxMsg->message_len);
389 rxMsg->message_len);
417 msg.message_len = sizeof(req);
468 hubMsg.message_len = binaryWithHeader.size();
500 msg.message_len = sizeof(req);
533 msg.message_len = sizeof(req)
    [all...]
  /device/google/contexthub/contexthubhal/test/
main.cpp 146 .message_len = len,
177 dumpBuffer(log, "Rx", msg.app_name, msg.message_type, msg.message, msg.message_len, 0);
191 msg.message_len = dataSize;
196 dumpBuffer(log, "TxCmd", msg.app_name, msg.message_type, msg.message, msg.message_len, 0);
204 msg.message_len = dataSize;
209 dumpBuffer(log, "TxMsg", msg.app_name, msg.message_type, msg.message, msg.message_len, 0);
  /system/iot/attestation/atap/libatap/
atap_util.c 246 uint32_t encrypted_len, message_len; local
257 copy_uint32_from_buf(&buf_ptr, &message_len);
258 if (message_len != buf_size - ATAP_HEADER_LEN) {
264 message_len - ATAP_GCM_IV_LEN - sizeof(uint32_t) - ATAP_GCM_TAG_LEN) {
  /external/libchrome/base/
logging.cc 919 const size_t message_len = strlen(message); local
921 while (bytes_written < message_len) {
924 message_len - bytes_written));
932 if (message_len > 0 && message[message_len - 1] != '\n') {
  /external/protobuf/python/google/protobuf/pyext/
descriptor_pool.cc 412 Py_ssize_t message_len; local
422 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) {
427 if (!file_proto.ParseFromArray(message_type, message_len)) {
  /hardware/libhardware/include/hardware/
context_hub.h 223 uint32_t message_len; member in struct:hub_message_t
  /external/libese/libese-hw/nxp/pn80t/
common.c 182 const uint32_t message_len = local
189 ese->ops->hw_transmit(ese, message, message_len, 1);
  /test/vts/runners/host/tcp_client/
vts_tcp_client.py 583 message_len = len(message)
584 logging.debug("sending %d bytes", message_len)
585 self.channel.write(str(message_len) + b'\n')
  /external/boringssl/src/third_party/fiat/
curve25519.c     [all...]

Completed in 574 milliseconds

1 2