Searched defs:msg_len (Results 1 - 4 of 4) sorted by relevance
/system/core/libcutils/ |
H A D | debugger.c | 32 static int send_request(int sock_fd, void* msg_ptr, size_t msg_len) { argument 34 if (TEMP_FAILURE_RETRY(write(sock_fd, msg_ptr, msg_len)) != (ssize_t) msg_len) {
|
/system/bt/stack/gatt/ |
H A D | gatt_main.c | 971 UINT16 msg_len; local 976 msg_len = p_buf->len - 1; 992 gatt_server_handle_client_req (p_tcb, op_code, msg_len, p); 994 gatt_client_handle_server_rsp (p_tcb, op_code, msg_len, p);
|
H A D | gatt_sr.c | 768 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET); local 785 if ((p_msg = (BT_HDR *)GKI_getbuf(msg_len)) == NULL) 792 memset(p_msg, 0, msg_len); 980 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET), local 1005 if ((p_msg = (BT_HDR *)GKI_getbuf(msg_len)) == NULL) 1013 memset(p_msg, 0, msg_len);
|
/system/bt/stack/smp/ |
H A D | smp_keys.c | 1263 UINT8 msg_len = BT_OCTET32_LEN /* U size */ + BT_OCTET32_LEN /* V size */ + 1 /* Z size */; local 1291 smp_debug_print_nbyte_little_endian (p_prnt, (const UINT8 *)"M", msg_len); 1301 aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac); 1378 UINT8 msg_len = BT_OCTET32_LEN /* U size */ + BT_OCTET32_LEN /* V size */ local 1413 if(!aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac)) 1611 UINT8 msg_len = 1 /* Counter size */ + 4 /* keyID size */ + local 1656 smp_debug_print_nbyte_little_endian (p_prnt, (const UINT8 *)"M", msg_len); 1659 if (!aes_cipher_msg_auth_code(key, msg, msg_len, BT_OCTET16_LEN, cmac)) 1851 UINT8 msg_len = BT_OCTET16_LEN /* N1 size */ + BT_OCTET16_LEN /* N2 size */ + local 1896 smp_debug_print_nbyte_little_endian (p_print, (const UINT8 *)"M", msg_len); 2136 UINT8 msg_len = 4 /* KeyID size */; local [all...] |
Completed in 10 milliseconds