/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | d1_srvr.c | 656 unsigned int msg_len; local 678 msg_len = p - msg; 681 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len);
|
H A D | d1_both.c | 129 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 142 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 144 assert((msg_len) > 0); \ 146 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 147 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 151 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \ 153 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \ 281 (int)s->d1->w_msg_hdr.msg_len 428 unsigned long msg_len; local 500 size_t frag_off,frag_len,msg_len; local [all...] |
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
H A D | auth_driver.c | 74 auth_bits_per_second(auth_t *h, int msg_len); 171 int msg_len = (msg_len_octets + 1)/2; local 178 for (i=0; i < msg_len; i++)
|
/external/srtp/crypto/test/ |
H A D | auth_driver.c | 74 auth_bits_per_second(auth_t *h, int msg_len); 171 int msg_len = (msg_len_octets + 1)/2; local 178 for (i=0; i < msg_len; i++)
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|
/external/bluetooth/bluedroid/stack/gatt/ |
H A D | gatt_main.c | 948 UINT16 msg_len; local 953 msg_len = p_buf->len - 1; 969 gatt_server_handle_client_req (p_tcb, op_code, msg_len, p); 971 gatt_client_handle_server_rsp (p_tcb, op_code, msg_len, p);
|
H A D | gatt_sr.c | 769 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET); local 786 if ((p_msg = (BT_HDR *)GKI_getbuf(msg_len)) == NULL) 793 memset(p_msg, 0, msg_len); 979 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET), local 1004 if ((p_msg = (BT_HDR *)GKI_getbuf(msg_len)) == NULL) 1012 memset(p_msg, 0, msg_len);
|
/external/chromium_org/components/nacl/zygote/ |
H A D | nacl_fork_delegate_linux.cc | 115 const ssize_t msg_len = local 118 if (msg_len <= 0) { 122 *reply_size = msg_len;
|
/external/chromium_org/sandbox/linux/services/ |
H A D | broker_process.cc | 276 ssize_t msg_len = UnixDomainSocket::SendRecvMsgWithFlags(ipc_socketpair_, local 282 if (msg_len <= 0) { 288 Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); local 327 const ssize_t msg_len = UnixDomainSocket::RecvMsg(ipc_socketpair_, buf, local 330 if (msg_len == 0 || (msg_len == -1 && errno == ECONNRESET)) { 338 if (msg_len < 0 || fds.size() != 1 || fds[0]->get() < 0) { 345 Pickle pickle(buf, msg_len);
|
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
H A D | padding.c | 264 size_t msg_index, msg_len; local 282 msg_len = flen - msg_index; 283 if (msg_len > tlen) { 290 memcpy(to, &from[msg_index], msg_len); 291 return msg_len;
|
H A D | rsa.c | 349 size_t msg_len) { 358 if (msg_len != SSL_SIG_LENGTH) { 383 signed_msg_len = prefix_len + msg_len; 396 memcpy(signed_msg + prefix_len, msg, msg_len); 442 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, argument 452 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa); 460 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) { 477 hash_nid, msg, msg_len)) { 347 pkcs1_prefixed_msg(uint8_t **out_msg, size_t *out_msg_len, int *is_alloced, int hash_nid, const uint8_t *msg, size_t msg_len) argument
|
/external/libpcap/ |
H A D | pcap-netfilter-linux.c | 111 u_int32_t msg_len; local 202 msg_len = NLMSG_ALIGN(nlh->nlmsg_len); 203 if (msg_len > len) 204 msg_len = len; 206 len -= msg_len; 207 buf += msg_len;
|
/external/openssl/ssl/ |
H A D | d1_srvr.c | 886 unsigned int msg_len; local 908 msg_len = p - msg; 911 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len); 1493 unsigned int msg_len; local 1571 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH; 1573 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local 1626 unsigned int hlen, msg_len; local 1718 msg_len 1720 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local [all...] |
H A D | d1_both.c | 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) 139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ 141 OPENSSL_assert((msg_len) > 0); \ 143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \ 144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \ 148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \ 150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \ 278 (int)s->d1->w_msg_hdr.msg_len 420 unsigned long msg_len; local 488 size_t frag_off,frag_len,msg_len; local [all...] |
/external/tcpdump/ |
H A D | print-olsr.c | 96 u_int8_t msg_len[2]; member in struct:olsr_msg4 106 u_int8_t msg_len[2]; member in struct:olsr_msg6 263 u_int msg_type, msg_len, msg_tlen, hello_len; local 312 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len); 313 if ((msg_len >= sizeof (struct olsr_msg6)) 314 && (msg_len <= length)) 318 if (msg_type == 0 || msg_len == 0) { 330 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); 332 msg_tlen = msg_len [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | preauth_test.c | 46 size_t *msg_len, void **data_pos) 50 *msg_len = sizeof(*hdr) + data_len; 51 hdr = os_malloc(*msg_len); 73 size_t *msg_len, void **data_pos) 75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); 44 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 71 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | test_wpa.c | 91 u16 data_len, size_t *msg_len, void **data_pos) 98 *msg_len = sizeof(*hdr) + data_len; 99 hdr = os_malloc(*msg_len); 90 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/bluetooth/bluedroid/hci/src/ |
H A D | hci_h4.c | 743 uint16_t msg_len, len; local 790 msg_len = p_cb->preload_buffer[3]; 791 msg_len = (msg_len << 8) + p_cb->preload_buffer[2]; 793 if (msg_len && (p_cb->preload_count == 4)) 822 msg_len = byte; 823 p_cb->rcv_len = msg_len; 828 len = msg_len + p_cb->preload_count + BT_HC_HDR_SIZE; 853 if (msg_len == 0) 868 if (msg_len) [all...] |
H A D | hci_mct.c | 717 uint16_t msg_len, len; local 756 msg_len = byte; 757 p_cb->rcv_len = msg_len; 762 len = msg_len + p_cb->preload_count + BT_HC_HDR_SIZE; 784 if (msg_len == 0) 800 if (msg_len) 897 uint16_t msg_len, len; local 935 msg_len = p_cb->preload_buffer[3]; 936 msg_len = (msg_len << [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | dtls1.h | 133 unsigned long msg_len; member in struct:hm_header_st
|
/external/libnfc-nci/src/nfa/hci/ |
H A D | nfa_hci_utils.c | 316 tNFA_STATUS nfa_hciu_send_msg (UINT8 pipe_id, UINT8 type, UINT8 instruction, UINT16 msg_len, UINT8 *p_msg) argument 329 pipe_id, nfa_hciu_get_type_inst_names (pipe_id, type, instruction, buff), msg_len); 332 pipe_id, type, instruction, msg_len); 338 while ((first_pkt == TRUE) || (msg_len != 0)) 350 if (msg_len > data_len) 356 data_len = msg_len; 375 msg_len -= data_len; 376 if (msg_len > 0)
|
/external/libnfc-nci/src/nfc/ndef/ |
H A D | ndef_utils.c | 79 tNDEF_STATUS NDEF_MsgValidate (UINT8 *p_msg, UINT32 msg_len, BOOLEAN b_allow_chunks) argument 82 UINT8 *p_end = p_msg + msg_len; 88 if ( (p_msg == NULL) || (msg_len < 3) )
|
/external/openssl/include/openssl/ |
H A D | dtls1.h | 145 unsigned long msg_len; member in struct:hm_header_st
|