/system/connectivity/wifilogd/ |
message_buffer.cpp | 34 bool MessageBuffer::Append(const uint8_t* message, uint16_t message_len) { 35 CHECK(message_len); 37 if (!CanFitNow(message_len)) { 41 AppendHeader(message_len); 42 AppendRawBytes(message, message_len); 82 void MessageBuffer::AppendHeader(uint16_t message_len) { 84 header.payload_len = message_len;
|
message_buffer.h | 92 void AppendHeader(uint16_t message_len);
|
/external/mmc-utils/3rdparty/hmac_sha/ |
hmac_sha2.h | 99 unsigned int message_len); 103 const unsigned char *message, unsigned int message_len, 110 unsigned int message_len); 114 const unsigned char *message, unsigned int message_len, 121 unsigned int message_len); 125 const unsigned char *message, unsigned int message_len, 132 unsigned int message_len); 136 const unsigned char *message, unsigned int message_len,
|
hmac_sha2.c | 100 unsigned int message_len) 102 sha224_update(&ctx->ctx_inside, message, message_len); 118 const unsigned char *message, unsigned int message_len, 124 hmac_sha224_update(&ctx, message, message_len); 186 unsigned int message_len) 188 sha256_update(&ctx->ctx_inside, message, message_len); 204 const unsigned char *message, unsigned int message_len, 210 hmac_sha256_update(&ctx, message, message_len); 272 unsigned int message_len) 274 sha384_update(&ctx->ctx_inside, message, message_len); [all...] |
/hardware/qcom/wlan/qcwcn/wifi_hal/ |
nan_req.cpp | 27 size_t message_len = NAN_MAX_ENABLE_REQ_SIZE; local 34 message_len += \ 164 pNanEnableReqMsg pFwReq = (pNanEnableReqMsg)malloc(message_len); 170 ALOGV("Message Len %zu", message_len); 171 memset (pFwReq, 0, message_len); 174 pFwReq->fwHeader.msgLen = message_len; 342 mDataLen = message_len; 359 size_t message_len = sizeof(NanDisableReqMsg); local 361 pNanDisableReqMsg pFwReq = (pNanDisableReqMsg)malloc(message_len); 367 ALOGV("Message Len %zu", message_len); 391 size_t message_len = 0; local 645 size_t message_len = local 862 size_t message_len = sizeof(NanPublishServiceCancelReqMsg); local 903 size_t message_len = local 1125 size_t message_len = sizeof(NanSubscribeServiceCancelReqMsg); local 1164 size_t message_len = local 1236 size_t message_len = sizeof(NanStatsReqMsg); local 1277 size_t message_len = sizeof(NanTcaReqMsg); local 1334 size_t message_len = sizeof(NanMsgHeader) + \\ local 1634 size_t message_len = sizeof(NanCapabilitiesReqMsg); local 1666 size_t message_len = sizeof(NanTestModeReqMsg); local [all...] |
nan_rsp.cpp | 668 u32 message_len) 672 if (message_len != sizeof(NanPublishStats)) { 674 __func__, stats_type, message_len, sizeof(NanPublishStats)); 709 if (message_len != sizeof(NanSubscribeStats)) { 711 __func__, stats_type, message_len, sizeof(NanSubscribeStats)); [all...] |
nancommand.h | 96 u32 message_len);
|
/system/core/trusty/keymaster/ |
trusty_keymaster_device_test.cpp | 183 size_t message_len = params.modulus_size / 8; local 184 std::unique_ptr<uint8_t[]> message(build_message(message_len)); 187 EXPECT_EQ(KM_ERROR_OK, device.sign_data(&sig_params, ptr, size, message.get(), message_len, 190 EXPECT_EQ(message_len, siglen); 202 size_t message_len = params.modulus_size / 8 - 1; local 203 std::unique_ptr<uint8_t[]> message(build_message(message_len)); 207 message_len, &signature, &siglen)); 219 size_t message_len = params.modulus_size / 8 + 1; local 220 std::unique_ptr<uint8_t[]> message(build_message(message_len)); 224 message_len, &signature, &siglen)) 274 size_t message_len = 1024 * 7; local 296 size_t message_len = params.modulus_size \/ 8; local 317 size_t message_len = params.modulus_size \/ 8; local 340 size_t message_len = params.modulus_size \/ 8; local 362 size_t message_len = params.modulus_size \/ 8; local 384 size_t message_len = params.modulus_size \/ 8; local 424 size_t message_len = 1024 * 7; local 520 size_t message_len = params.modulus_size \/ 8; local [all...] |
trusty_keymaster_main.cpp | 188 size_t message_len = 1024 / 8; local 189 std::unique_ptr<uint8_t[]> message(new uint8_t[message_len]); 190 memset(message.get(), 'a', message_len); 191 keymaster_blob_t input = {message.get(), message_len}, signature; 224 size_t message_len = 1024 / 8; local 225 std::unique_ptr<uint8_t[]> message(new uint8_t[message_len]); 226 memset(message.get(), 'a', message_len); 227 keymaster_blob_t input = {message.get(), message_len}, signature; 265 message_len) != 1) { 292 size_t message_len = 30 /* arbitrary */ local 328 size_t message_len = 30 \/* arbitrary *\/; local [all...] |
/external/boringssl/src/include/openssl/ |
curve25519.h | 80 // ED25519_sign sets |out_sig| to be a signature of |message_len| bytes from 84 size_t message_len, 88 // |public_key| of |message_len| bytes from |message|. It returns zero 90 OPENSSL_EXPORT int ED25519_verify(const uint8_t *message, size_t message_len,
|
/device/google/contexthub/contexthubhal/ |
nanohubhal.h | 70 message_len = len; 87 message_len = msg->message_len; 91 if (msg->message_len > 0 && msg->message != nullptr) { 92 data_ = std::unique_ptr<uint8_t>(new uint8_t[msg->message_len]); 93 memcpy(data_.get(), msg->message, msg->message_len); 108 other.message_len = 0;
|
NanohubHidlAdapter.cpp | 140 .message_len = static_cast<uint32_t>(msg.msg.size()), // Note the check above 146 if (txMsg.message_len == 0 && txMsg.message == nullptr) { 152 txMsg.message_len, 336 rxMsg.message_len, 346 rxMsg.message_len); 370 msg.message_len = sizeof(req); 419 hubMsg.message_len = binaryWithHeader.size(); 449 msg.message_len = sizeof(req); 480 msg.message_len = sizeof(req); 506 msg.message_len = sizeof(payload) [all...] |
nanohubhal.cpp | 427 dumpBuffer("APP -> HAL", msg->app_name, msg->message_type, 0, msg->message, msg->message_len); 430 } else if (msg->message_len > MAX_RX_PACKET) { 435 dumpBuffer("APP -> DEV", msg->app_name, msg->message_type, endpoint, msg->message, msg->message_len); 437 ret = doSendToDevice(msg->app_name, msg->message, msg->message_len, msg->message_type, endpoint);
|
system_comms.cpp | 318 mLen = appMsg->message_len; 423 if (appMsg->message_len != sizeof(appName)) { [all...] |
/system/core/logd/ |
LogAudit.cpp | 323 size_t message_len = str_len + sizeof(android_log_event_string_t); local 328 uint32_t buffer[(message_len + sizeof(uint32_t) - 1) / sizeof(uint32_t)]; 341 (message_len <= USHRT_MAX) ? (unsigned short)message_len 383 message_len = str_len + prefix_len + suffix_len + bug_metadata.length() + 2; 386 char newstr[message_len]; 396 (message_len <= USHRT_MAX) ? (unsigned short)message_len 411 rc = message_len;
|
/system/iot/attestation/atap/test/ |
atap_util_unittest.cpp | 77 uint32_t message_len = *(uint32_t*)next(buf, index, sizeof(uint32_t)); local 78 EXPECT_EQ(serialized_size - ATAP_HEADER_LEN, message_len); 104 uint32_t message_len = 100; local 105 uint8_t* res = append_header_to_buf(buf, message_len); 108 EXPECT_EQ(message_len, *(uint32_t*)&buf[4]); 311 uint32_t message_len = 128 - ATAP_HEADER_LEN; local 313 message_len - ATAP_GCM_IV_LEN - sizeof(uint32_t) - ATAP_GCM_TAG_LEN; 315 append_header_to_buf(buf, message_len);
|
/hardware/interfaces/contexthub/1.0/default/ |
Contexthub.cpp | 154 .message_len = static_cast<uint32_t>(msg.msg.size()), // Note the check above 160 if (txMsg.message_len == 0 && txMsg.message == nullptr) { 166 txMsg.message_len, 188 msg.message_len = 0; 380 rxMsg->message_len); 389 rxMsg->message_len); 417 msg.message_len = sizeof(req); 468 hubMsg.message_len = binaryWithHeader.size(); 500 msg.message_len = sizeof(req); 533 msg.message_len = sizeof(req) [all...] |
/device/google/contexthub/contexthubhal/test/ |
main.cpp | 146 .message_len = len, 177 dumpBuffer(log, "Rx", msg.app_name, msg.message_type, msg.message, msg.message_len, 0); 191 msg.message_len = dataSize; 196 dumpBuffer(log, "TxCmd", msg.app_name, msg.message_type, msg.message, msg.message_len, 0); 204 msg.message_len = dataSize; 209 dumpBuffer(log, "TxMsg", msg.app_name, msg.message_type, msg.message, msg.message_len, 0);
|
/system/iot/attestation/atap/libatap/ |
atap_util.c | 246 uint32_t encrypted_len, message_len; local 257 copy_uint32_from_buf(&buf_ptr, &message_len); 258 if (message_len != buf_size - ATAP_HEADER_LEN) { 264 message_len - ATAP_GCM_IV_LEN - sizeof(uint32_t) - ATAP_GCM_TAG_LEN) {
|
/external/libchrome/base/ |
logging.cc | 919 const size_t message_len = strlen(message); local 921 while (bytes_written < message_len) { 924 message_len - bytes_written)); 932 if (message_len > 0 && message[message_len - 1] != '\n') {
|
/external/protobuf/python/google/protobuf/pyext/ |
descriptor_pool.cc | 412 Py_ssize_t message_len; local 422 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { 427 if (!file_proto.ParseFromArray(message_type, message_len)) {
|
/hardware/libhardware/include/hardware/ |
context_hub.h | 223 uint32_t message_len; member in struct:hub_message_t
|
/external/libese/libese-hw/nxp/pn80t/ |
common.c | 182 const uint32_t message_len = local 189 ese->ops->hw_transmit(ese, message, message_len, 1);
|
/test/vts/runners/host/tcp_client/ |
vts_tcp_client.py | 583 message_len = len(message) 584 logging.debug("sending %d bytes", message_len) 585 self.channel.write(str(message_len) + b'\n')
|
/external/boringssl/src/third_party/fiat/ |
curve25519.c | [all...] |