/external/nanopb-c/examples/simple/ |
H A D | simple.c | 10 size_t message_length; local 29 message_length = stream.bytes_written; 50 pb_istream_t stream = pb_istream_from_buffer(buffer, message_length);
|
/external/chromium_org/remoting/host/native_messaging/ |
H A D | native_messaging_writer.cc | 53 MessageLengthType message_length = local 57 reinterpret_cast<char*>(&message_length), kMessageHeaderSize); 66 int message_length_as_int = message_length;
|
H A D | native_messaging_reader.cc | 83 MessageLengthType message_length; local 85 reinterpret_cast<char*>(&message_length), kMessageHeaderSize); 96 if (message_length > kMaximumMessageSize) { 97 LOG(ERROR) << "Message size too large: " << message_length; 102 std::string message_json(message_length, '\0'); 104 message_length); 105 if (read_result != static_cast<int>(message_length)) {
|
/external/chromium_org/chrome/installer/util/ |
H A D | installation_validation_helper.cc | 85 size_t message_length = str.size() - message_start; local 87 --message_length; 89 << base::StringPiece(str.c_str() + message_start, message_length);
|
/external/chromium_org/extensions/browser/api/cast_channel/ |
H A D | cast_framer_unittest.cc | 47 size_t message_length; local 53 EXPECT_EQ(NULL, framer_->Ingest(1, &message_length, &error).get()); 59 EXPECT_EQ(NULL, framer_->Ingest(3, &message_length, &error).get()); 67 message = framer_->Ingest(framer_->BytesRequested(), &message_length, &error); 72 EXPECT_EQ(message->SerializeAsString().size(), message_length); 122 size_t message_length; local 125 EXPECT_EQ(NULL, framer_->Ingest(4, &message_length, &error).get()); 132 framer_->Ingest(framer_->BytesRequested(), &message_length, &error)
|
H A D | cast_framer.cc | 114 size_t* message_length, 117 DCHECK(message_length); 128 *message_length = 0; 156 *message_length = body_size_; 113 Ingest(size_t num_bytes, size_t* message_length, ChannelError* error) argument
|
/external/chromium_org/components/proximity_auth/ |
H A D | bluetooth_connection.cc | 75 int message_length = base::checked_cast<int>(serialized_message.size()); local 76 scoped_refptr<net::IOBuffer> buffer = new net::IOBuffer(message_length); 77 memcpy(buffer->data(), serialized_message.c_str(), message_length); 83 message_length,
|
/external/chromium_org/ppapi/proxy/ |
H A D | websocket_resource.cc | 274 uint32 message_length = message_arraybuffer->ByteLength(); local 276 message_data + message_length);
|
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
H A D | protobufwireadapter.cc | 163 uint32_t message_length = util::PoloUtil::BigEndianBytesToInt(&data[0]); local 164 interface()->Receive(message_length);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ikev2.c | 291 u32 message_length, 304 data->in_buf = wpabuf_alloc(message_length); 330 u32 message_length = 0; local 362 message_length = WPA_GET_BE32(pos); 365 if (message_length < (u32) (end - pos)) { 368 message_length, (long) (end - pos)); 375 "Message Length %u", flags, message_length); 396 message_length, pos, 288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_tnc.c | 165 u32 message_length, 178 data->in_buf = wpabuf_alloc(message_length); 210 u32 message_length = 0; local 243 message_length = WPA_GET_BE32(pos); 246 if (message_length < (u32) (end - pos) || 247 message_length > 75000) { 250 message_length, (long) (end - pos)); 257 "Message Length %u", flags, message_length); 278 message_length, pos, 162 eap_tnc_process_fragment(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_wsc.c | 397 u16 message_length, 410 data->in_buf = wpabuf_alloc(message_length); 437 u16 message_length = 0; local 462 message_length = WPA_GET_BE16(pos); 465 if (message_length < end - pos) { 475 op_code, flags, message_length); 523 message_length, pos, 394 eap_wsc_process_fragment(struct eap_wsc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ikev2.c | 300 u8 flags, u32 message_length, 312 data->in_buf = wpabuf_alloc(message_length); 352 u32 message_length = 0; local 382 message_length = WPA_GET_BE32(pos); 385 if (message_length < (u32) (end - pos)) { 388 message_length, (long) (end - pos)); 394 "Message Length %u", flags, message_length); 414 if (eap_ikev2_process_fragment(data, flags, message_length, 299 eap_ikev2_process_fragment(struct eap_ikev2_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_server_tls_common.c | 235 u8 flags, u32 message_length, 250 if (message_length > 65536) { 256 if (len > message_length) { 260 (int) len, (int) message_length); 264 data->tls_in = wpabuf_alloc(message_length); 234 eap_server_tls_process_fragment(struct eap_ssl_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_server_wsc.c | 318 u8 flags, u8 op_code, u16 message_length, 330 data->in_buf = wpabuf_alloc(message_length); 355 u16 message_length = 0; local 380 message_length = WPA_GET_BE16(pos); 383 if (message_length < end - pos) { 392 op_code, flags, message_length); 422 message_length, pos, end - pos) < 317 eap_wsc_process_fragment(struct eap_wsc_data *data, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ikev2.c | 291 u32 message_length, 304 data->in_buf = wpabuf_alloc(message_length); 330 u32 message_length = 0; local 362 message_length = WPA_GET_BE32(pos); 365 if (message_length < (u32) (end - pos)) { 368 message_length, (long) (end - pos)); 375 "Message Length %u", flags, message_length); 396 message_length, pos, 288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_tnc.c | 165 u32 message_length, 178 data->in_buf = wpabuf_alloc(message_length); 210 u32 message_length = 0; local 243 message_length = WPA_GET_BE32(pos); 246 if (message_length < (u32) (end - pos) || 247 message_length > 75000) { 250 message_length, (long) (end - pos)); 257 "Message Length %u", flags, message_length); 278 message_length, pos, 162 eap_tnc_process_fragment(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_wsc.c | 397 u16 message_length, 410 data->in_buf = wpabuf_alloc(message_length); 437 u16 message_length = 0; local 462 message_length = WPA_GET_BE16(pos); 465 if (message_length < end - pos) { 475 op_code, flags, message_length); 523 message_length, pos, 394 eap_wsc_process_fragment(struct eap_wsc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ikev2.c | 300 u8 flags, u32 message_length, 312 data->in_buf = wpabuf_alloc(message_length); 352 u32 message_length = 0; local 382 message_length = WPA_GET_BE32(pos); 385 if (message_length < (u32) (end - pos)) { 388 message_length, (long) (end - pos)); 394 "Message Length %u", flags, message_length); 414 if (eap_ikev2_process_fragment(data, flags, message_length, 299 eap_ikev2_process_fragment(struct eap_ikev2_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_server_tls_common.c | 235 u8 flags, u32 message_length, 250 if (message_length > 65536) { 256 if (len > message_length) { 260 (int) len, (int) message_length); 264 data->tls_in = wpabuf_alloc(message_length); 234 eap_server_tls_process_fragment(struct eap_ssl_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_server_wsc.c | 318 u8 flags, u8 op_code, u16 message_length, 330 data->in_buf = wpabuf_alloc(message_length); 355 u16 message_length = 0; local 380 message_length = WPA_GET_BE16(pos); 383 if (message_length < end - pos) { 392 op_code, flags, message_length); 422 message_length, pos, end - pos) < 317 eap_wsc_process_fragment(struct eap_wsc_data *data, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ikev2.c | 291 u32 message_length, 304 data->in_buf = wpabuf_alloc(message_length); 330 u32 message_length = 0; local 362 message_length = WPA_GET_BE32(pos); 365 if (message_length < (u32) (end - pos)) { 368 message_length, (long) (end - pos)); 375 "Message Length %u", flags, message_length); 396 message_length, pos, 288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_tnc.c | 165 u32 message_length, 178 data->in_buf = wpabuf_alloc(message_length); 210 u32 message_length = 0; local 243 message_length = WPA_GET_BE32(pos); 246 if (message_length < (u32) (end - pos) || 247 message_length > 75000) { 250 message_length, (long) (end - pos)); 257 "Message Length %u", flags, message_length); 278 message_length, pos, 162 eap_tnc_process_fragment(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_wsc.c | 397 u16 message_length, 410 data->in_buf = wpabuf_alloc(message_length); 437 u16 message_length = 0; local 462 message_length = WPA_GET_BE16(pos); 465 if (message_length < end - pos) { 475 op_code, flags, message_length); 523 message_length, pos, 394 eap_wsc_process_fragment(struct eap_wsc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ikev2.c | 300 u8 flags, u32 message_length, 312 data->in_buf = wpabuf_alloc(message_length); 352 u32 message_length = 0; local 382 message_length = WPA_GET_BE32(pos); 385 if (message_length < (u32) (end - pos)) { 388 message_length, (long) (end - pos)); 394 "Message Length %u", flags, message_length); 414 if (eap_ikev2_process_fragment(data, flags, message_length, 299 eap_ikev2_process_fragment(struct eap_ikev2_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|