/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
H A D | MessageHandler.java | 17 public void handleMessage(byte[] msg, int msglen) throws IOException; argument
|
H A D | TransportManager.java | 717 int msglen; 720 msglen = tc.receiveMessage(msg, 0, msg.length); 745 TypesReader tr = new TypesReader(msg, 0, msglen); 774 TypesReader tr = new TypesReader(msg, 0, msglen); 822 km.handleMessage(msg, msglen); 843 mh.handleMessage(msg, msglen);
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
H A D | pkcs_1_v1_5_decode.c | 23 * @param msglen The length of the encoded data (octets) 33 unsigned long msglen, 50 if ((msglen > modulus_len) || (modulus_len < 11)) { 90 if (*outlen < (msglen - (2 + ps_len + 1))) { 91 *outlen = msglen - (2 + ps_len + 1); 96 *outlen = (msglen - (2 + ps_len + 1)); 32 pkcs_1_v1_5_decode(const unsigned char *msg, unsigned long msglen, int block_type, unsigned long modulus_bitlen, unsigned char *out, unsigned long *outlen, int *is_valid) argument
|
H A D | pkcs_1_v1_5_encode.c | 23 * \param msglen The length of the data to encode (octets) 34 unsigned long msglen, 61 if ((msglen + 11) > modulus_len) { 73 ps_len = modulus_len - msglen - 3; 99 XMEMCPY(&out[2 + ps_len + 1], msg, msglen); 33 pkcs_1_v1_5_encode(const unsigned char *msg, unsigned long msglen, int block_type, unsigned long modulus_bitlen, prng_state *prng, int prng_idx, unsigned char *out, unsigned long *outlen) argument
|
H A D | pkcs_1_oaep_encode.c | 23 @param msglen The length of the data to encode (octets) 34 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, argument 62 if ((2*hLen >= (modulus_len - 2)) || (msglen > (modulus_len - 2*hLen - 2))) { 99 y = modulus_len - msglen - 2*hLen - 2; 106 /* message (length = msglen) */ 107 XMEMCPY(DB+x, msg, msglen); 108 x += msglen;
|
H A D | pkcs_1_oaep_decode.c | 23 @param msglen The length of the encoded data (octets) 33 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen, argument 59 if ((2*hLen >= (modulus_len - 2)) || (msglen != modulus_len)) {
|
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_pkcs.h | 28 unsigned long msglen, 37 unsigned long msglen, 45 int pkcs_1_oaep_encode(const unsigned char *msg, unsigned long msglen, 51 int pkcs_1_oaep_decode(const unsigned char *msg, unsigned long msglen,
|
/external/qemu/android/ |
H A D | hw-qemud.h | 73 typedef void (*QemudClientRecv) ( void* opaque, uint8_t* msg, int msglen, QemudClient* client ); 107 extern void qemud_client_send ( QemudClient* client, const uint8_t* msg, int msglen ); 147 int msglen );
|
H A D | adb-server.c | 151 _adb_host_append_message(AdbHost* adb_host, const void* msg, int msglen) argument 153 printf("Append %d bytes to ADB host buffer.\n", msglen); 157 adb_host->pending_send_buffer = (uint8_t*)malloc(msglen); 158 adb_host->pending_send_buffer_size = msglen; 159 } else if ((adb_host->pending_send_data_size + msglen) > 163 adb_host->pending_send_data_size + msglen); 165 adb_host->pending_send_data_size + msglen; 170 adb_host->pending_send_data_size + msglen); 177 msg, msglen); 513 adb_server_on_guest_message(void* opaque, const uint8_t* msg, int msglen) argument [all...] |
H A D | adb-qemud.c | 180 * msg, msglen - Message received from the ADB guest. 184 _adb_client_recv(void* opaque, uint8_t* msg, int msglen, QemudClient* client) argument 189 adb_client, adb_client->opaque, msglen, QB(msg, msglen)); 193 adb_server_on_guest_message(adb_client->opaque, msg, msglen); 205 if ((msglen + adb_client->msg_cur) > sizeof(adb_client->msg_buffer)) { 211 memcpy(adb_client->msg_buffer + adb_client->msg_cur, msg, msglen); 212 adb_client->msg_cur += msglen; 249 QB(msg, msglen), adb_client->state); 324 * msg, msglen 328 _adb_dbg_client_recv(void* opaque, uint8_t* msg, int msglen, QemudClient* client) argument [all...] |
H A D | hw-qemud.c | 223 typedef void (*QemudSerialReceive)( void* opaque, int channel, uint8_t* msg, int msglen); 522 int msglen ) 526 int avail, len = msglen; 528 if (msglen <= 0 || channel < 0) 532 __FUNCTION__, channel, msglen, 533 quote_bytes((const void*)msg, msglen)); 564 int2hex(frame, FRAME_HEADER_SIZE, msglen); 717 qemud_client_recv( void* opaque, uint8_t* msg, int msglen ) 724 c->clie_recv( c->clie_opaque, msg, msglen, c ); 735 if (msglen > FRAME_HEADER_SIZ 1411 qemud_multiplexer_control_recv( void* opaque, uint8_t* msg, int msglen, QemudClient* client ) argument 1609 _qemud_pipe_cache_buffer(QemudClient* client, const uint8_t* msg, int msglen) argument 1636 _qemud_pipe_send(QemudClient* client, const uint8_t* msg, int msglen) argument 2365 _qemud_char_client_recv( void* opaque, uint8_t* msg, int msglen, QemudClient* client ) argument [all...] |
H A D | hw-control.c | 57 int msglen, 60 hw_control_do_query(opaque, msg, msglen); 55 _hw_control_qemud_client_recv( void* opaque, uint8_t* msg, int msglen, QemudClient* client ) argument
|
H A D | hw-sensors.c | 252 _hwSensorClient_recv( void* opaque, uint8_t* msg, int msglen, argument 257 _hwSensorClient_receive(cl, msg, msglen); 272 _hwSensorClient_send( HwSensorClient* cl, const uint8_t* msg, int msglen ) 274 D("%s: '%s'", __FUNCTION__, quote_bytes((const void*)msg, msglen)); 275 qemud_client_send(cl->client, msg, msglen); 360 _hwSensorClient_receive( HwSensorClient* cl, uint8_t* msg, int msglen ) 364 D("%s: '%.*s'", __FUNCTION__, msglen, msg); 370 if (msglen == 12 && !memcmp(msg, "list-sensors", 12)) { 388 if (msglen == 4 && !memcmp(msg, "wake", 4)) { 396 if (msglen > 1 [all...] |
H A D | boot-properties.c | 296 int msglen, 302 if (msglen == 4 && !memcmp(msg, "list", 4)) { 315 D("%s: ignoring unknown command: %.*s", __FUNCTION__, msglen, msg); 294 boot_property_client_recv( void* opaque, uint8_t* msg, int msglen, QemudClient* client ) argument
|
/external/ppp/pppd/ |
H A D | upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); 516 u_char msglen; local [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/channel/ |
H A D | ChannelManager.java | 783 public void msgChannelExtendedData(byte[] msg, int msglen) throws IOException argument 785 if (msglen <= 13) 786 throw new IOException("SSH_MSG_CHANNEL_EXTENDED_DATA message has wrong size (" + msglen + ")"); 800 if (len != (msglen - 13)) 801 throw new IOException("SSH_MSG_CHANNEL_EXTENDED_DATA message has wrong len (calculated " + (msglen - 13) 1061 public void msgChannelData(byte[] msg, int msglen) throws IOException argument 1063 if (msglen <= 9) 1064 throw new IOException("SSH_MSG_CHANNEL_DATA message has wrong size (" + msglen + ")"); 1074 if (len != (msglen - 9)) 1075 throw new IOException("SSH_MSG_CHANNEL_DATA message has wrong len (calculated " + (msglen 1101 msgChannelWindowAdjust(byte[] msg, int msglen) argument 1132 msgChannelOpen(byte[] msg, int msglen) argument 1250 msgChannelRequest(byte[] msg, int msglen) argument 1336 msgChannelEOF(byte[] msg, int msglen) argument 1358 msgChannelClose(byte[] msg, int msglen) argument 1386 msgChannelSuccess(byte[] msg, int msglen) argument 1408 msgChannelFailure(byte[] msg, int msglen) argument 1430 msgChannelOpenConfirmation(byte[] msg, int msglen) argument 1458 msgChannelOpenFailure(byte[] msg, int msglen) argument 1521 msgGlobalRequest(byte[] msg, int msglen) argument 1569 handleMessage(byte[] msg, int msglen) argument [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
H A D | eax_test.c | 33 msglen; 231 tests[x].plaintext, tests[x].msglen, outct, outtag, &len)) != CRYPT_OK) { 234 if (XMEMCMP(outct, tests[x].ciphertext, tests[x].msglen) || XMEMCMP(outtag, tests[x].tag, len)) { 238 for (y = 0; y < (unsigned long)tests[x].msglen; ) { 240 if (y < (unsigned long)(tests[x].msglen-1)) printf(", "); 256 outct, tests[x].msglen, outct, outtag, len, &res)) != CRYPT_OK) { 259 if ((res != 1) || XMEMCMP(outct, tests[x].plaintext, tests[x].msglen)) { 263 for (y = 0; y < (unsigned long)tests[x].msglen; ) { 265 if (y < (unsigned long)(tests[x].msglen-1)) printf(", ");
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
H A D | ctr_test.c | 26 int keylen, msglen; 66 if ((err = ctr_encrypt(tests[x].pt, buf, tests[x].msglen, &ctr)) != CRYPT_OK) { 70 if (XMEMCMP(buf, tests[x].ct, tests[x].msglen)) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
H A D | f9_test.c | 29 int msglen; 61 if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
|
/external/bluetooth/bluedroid/udrv/include/ |
H A D | uipc.h | 117 UDRV_API extern BOOLEAN UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen);
|
/external/libnfc-nci/src/udrv/include/ |
H A D | uipc.h | 127 UDRV_API extern BOOLEAN UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen);
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
H A D | omac_test.c | 30 int keylen, msglen; 89 if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &len)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
H A D | xcbc_test.c | 29 int msglen; 111 if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
H A D | SFTPv3Client.java | 204 int msglen = len + 1; 208 msglen += 4; 211 os.write(msglen >> 24); 212 os.write(msglen >> 16); 213 os.write(msglen >> 8); 214 os.write(msglen); 265 byte[] msglen = new byte[4]; 267 readBytes(msglen, 0, 4); 269 int len = (((msglen[0] & 0xff) << 24) | ((msglen[ [all...] |
/external/ipsec-tools/src/libipsec/ |
H A D | policy_parse.y | 586 policy_parse(msg, msglen) 588 int msglen; 619 ipsec_set_policy(msg, msglen) 621 int msglen; 625 policy = policy_parse(msg, msglen);
|