Searched refs:msg_len (Results 1 - 25 of 89) sorted by relevance

1234

/external/chromium_org/third_party/boringssl/src/ssl/
H A Dd1_both.c129 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
142 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
144 assert((msg_len) > 0); \
146 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
147 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
151 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
153 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
281 (int)s->d1->w_msg_hdr.msg_len
428 unsigned long msg_len; local
500 size_t frag_off,frag_len,msg_len; local
[all...]
/external/tcpdump/
H A Dprint-olsr.c96 u_int8_t msg_len[2]; member in struct:olsr_msg4
106 u_int8_t msg_len[2]; member in struct:olsr_msg6
263 u_int msg_type, msg_len, msg_tlen, hello_len; local
312 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len);
313 if ((msg_len >= sizeof (struct olsr_msg6))
314 && (msg_len <= length))
318 if (msg_type == 0 || msg_len == 0) {
330 msg_len, (msg_len_valid == 0) ? " (invalid)" : "");
332 msg_tlen = msg_len
[all...]
H A Dprint-ldp.c567 u_short pdu_len,msg_len,msg_type,msg_tlen; local
607 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
616 msg_len,
620 if (msg_len == 0) /* infinite loop protection */
624 msg_tlen=msg_len-sizeof(struct ldp_msg_header)+4; /* Type & Length fields not included */
627 TCHECK2(*tptr, msg_len);
666 msg_len);
668 tptr += msg_len+4;
669 tlen -= msg_len+4;
/external/openssl/ssl/
H A Dd1_both.c126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8)
139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \
141 OPENSSL_assert((msg_len) > 0); \
143 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) is_complete = 0; \
144 if (is_complete) for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0 ; ii--) \
148 #define RSMBLY_BITMASK_PRINT(bitmask, msg_len) { \
150 printf("bitmask: "); for (ii = 0; ii < (msg_len); ii++) \
278 (int)s->d1->w_msg_hdr.msg_len
420 unsigned long msg_len; local
488 size_t frag_off,frag_len,msg_len; local
[all...]
H A Ddtls1.h145 unsigned long msg_len; member in struct:hm_header_st
H A Dd1_srvr.c886 unsigned int msg_len; local
908 msg_len = p - msg;
911 DTLS1_MT_HELLO_VERIFY_REQUEST, msg_len, 0, msg_len);
1493 unsigned int msg_len; local
1571 msg_len = s->init_num - DTLS1_HM_HEADER_LENGTH;
1573 SSL3_MT_CERTIFICATE_REQUEST, msg_len, 0, msg_len); local
1626 unsigned int hlen, msg_len; local
1718 msg_len
1720 SSL3_MT_NEWSESSION_TICKET, msg_len, 0, msg_len); local
[all...]
/external/chromium_org/sandbox/linux/services/
H A Dbroker_process.cc276 ssize_t msg_len = UnixDomainSocket::SendRecvMsgWithFlags(ipc_socketpair_, local
282 if (msg_len <= 0) {
288 Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); local
327 const ssize_t msg_len = UnixDomainSocket::RecvMsg(ipc_socketpair_, buf, local
330 if (msg_len == 0 || (msg_len == -1 && errno == ECONNRESET)) {
338 if (msg_len < 0 || fds.size() != 1 || fds[0]->get() < 0) {
345 Pickle pickle(buf, msg_len);
/external/bluetooth/bluedroid/hci/src/
H A Dhci_mct.c717 uint16_t msg_len, len; local
756 msg_len = byte;
757 p_cb->rcv_len = msg_len;
762 len = msg_len + p_cb->preload_count + BT_HC_HDR_SIZE;
784 if (msg_len == 0)
800 if (msg_len)
897 uint16_t msg_len, len; local
935 msg_len = p_cb->preload_buffer[3];
936 msg_len = (msg_len <<
[all...]
H A Dhci_h4.c743 uint16_t msg_len, len; local
790 msg_len = p_cb->preload_buffer[3];
791 msg_len = (msg_len << 8) + p_cb->preload_buffer[2];
793 if (msg_len && (p_cb->preload_count == 4))
822 msg_len = byte;
823 p_cb->rcv_len = msg_len;
828 len = msg_len + p_cb->preload_count + BT_HC_HDR_SIZE;
853 if (msg_len == 0)
868 if (msg_len)
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dpreauth_test.c46 size_t *msg_len, void **data_pos)
50 *msg_len = sizeof(*hdr) + data_len;
51 hdr = os_malloc(*msg_len);
73 size_t *msg_len, void **data_pos)
75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
44 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
71 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/
H A Dauth_driver.c74 auth_bits_per_second(auth_t *h, int msg_len);
171 int msg_len = (msg_len_octets + 1)/2; local
178 for (i=0; i < msg_len; i++)
/external/srtp/crypto/test/
H A Dauth_driver.c74 auth_bits_per_second(auth_t *h, int msg_len);
171 int msg_len = (msg_len_octets + 1)/2; local
178 for (i=0; i < msg_len; i++)
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Ddtls1.h133 unsigned long msg_len; member in struct:hm_header_st
/external/openssl/include/openssl/
H A Ddtls1.h145 unsigned long msg_len; member in struct:hm_header_st
/external/kernel-headers/original/uapi/linux/
H A Dtipc_config.h383 int msg_len; local
385 msg_len = TCM_LENGTH(data_len);
387 tcm_hdr->tcm_len = htonl(msg_len);
/external/strace/
H A Dnet.c392 uint32_t /* unsigned */ msg_len; member in struct:mmsghdr32
425 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len) argument
429 unsigned msg_len; member in struct:mmsghdr
448 mmsg.msg_len = mmsg32.msg_len;
459 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len);
460 tprintf(", %u}", mmsg.msg_len);
464 decode_mmsg(struct tcb *tcp, unsigned long msg_len) argument
[all...]
/external/libpcap/
H A Dpcap-netfilter-linux.c111 u_int32_t msg_len; local
202 msg_len = NLMSG_ALIGN(nlh->nlmsg_len);
203 if (msg_len > len)
204 msg_len = len;
206 len -= msg_len;
207 buf += msg_len;
/external/chromium_org/components/nacl/zygote/
H A Dnacl_fork_delegate_linux.cc115 const ssize_t msg_len = local
118 if (msg_len <= 0) {
122 *reply_size = msg_len;
/external/libnfc-nci/src/nfc/include/
H A Drw_api.h158 UINT16 msg_len; /* Length of the NDEF message */ member in struct:__anon24326
410 ** Parameters: msg_len: The length of the buffer
416 NFC_API extern tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg);
555 ** Parameters: msg_len: The length of the buffer
561 NFC_API extern tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg );
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa_i.h194 size_t *msg_len, void **data_pos)
198 msg_len, data_pos);
317 u8 *msg, size_t msg_len, u8 *key_mic);
192 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_i.h194 size_t *msg_len, void **data_pos)
198 msg_len, data_pos);
317 u8 *msg, size_t msg_len, u8 *key_mic);
192 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa_i.h194 size_t *msg_len, void **data_pos)
198 msg_len, data_pos);
317 u8 *msg, size_t msg_len, u8 *key_mic);
192 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument

Completed in 993 milliseconds

1234