Searched refs:msg_len (Results 1 - 25 of 81) sorted by relevance

1234

/external/chromium-trace/catapult/third_party/typ/typ/
H A Dprinter.py30 msg_len = len(msg)
31 if elide and self.cols and msg_len > self.cols - 5:
/external/tcpdump/
H A Dprint-olsr.c93 uint8_t msg_len[2]; member in struct:olsr_msg4
103 uint8_t msg_len[2]; member in struct:olsr_msg6
273 u_int msg_type, msg_len, msg_tlen, hello_len; local
319 msg_len = EXTRACT_16BITS(msgptr.v6->msg_len);
320 if ((msg_len >= sizeof (struct olsr_msg6))
321 && (msg_len <= length))
325 if (msg_type == 0 || msg_len == 0) {
337 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""));
342 msg_tlen = msg_len
[all...]
H A Dprint-ldp.c568 u_short pdu_len,msg_len,msg_type,msg_tlen; local
614 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
617 if (msg_len < sizeof(struct ldp_msg_header)-4) {
625 msg_len,
636 msg_len,
641 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */
644 ND_TCHECK2(*tptr, msg_len);
683 msg_len);
685 tptr += msg_len+4;
686 tlen -= msg_len
[all...]
/external/boringssl/src/ssl/
H A Dd1_both.c214 size_t msg_len = frag->msg_header.msg_len; local
216 if (frag->reassembly == NULL || start > end || end > msg_len) {
221 assert(msg_len > 0);
236 for (i = 0; i < (msg_len >> 3); i++) {
241 if ((msg_len & 7) != 0 &&
242 frag->reassembly[msg_len >> 3] != bit_range(0, msg_len & 7)) {
374 !CBB_add_u24(&cbb, ssl->d1->w_msg_hdr.msg_len) ||
460 frag = dtls1_hm_fragment_new(msg_hdr->msg_len,
525 const size_t msg_len = msg_hdr.msg_len; local
[all...]
H A Dd1_lib.c330 l2n3(msg_hdr->msg_len, p);
333 l2n3(msg_hdr->msg_len, p);
/external/libchrome/sandbox/linux/syscall_broker/
H A Dbroker_host.cc181 const ssize_t msg_len = base::UnixDomainSocket::RecvMsg( local
184 if (msg_len == 0 || (msg_len == -1 && errno == ECONNRESET)) {
191 if (msg_len < 0 || fds.size() != 1 || fds[0].get() < 0) {
198 base::Pickle pickle(buf, msg_len);
H A Dbroker_client.cc84 ssize_t msg_len = base::UnixDomainSocket::SendRecvMsgWithFlags( local
87 if (msg_len <= 0) {
93 base::Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); local
/external/boringssl/src/crypto/cmac/
H A Dcmac_test.cc32 const uint8_t *msg, size_t msg_len, const uint8_t *expected) {
35 if (!AES_CMAC(out, key, key_len, msg, msg_len)) {
52 for (unsigned chunk_size = 1; chunk_size <= msg_len; chunk_size++) {
59 while (done < msg_len) {
60 size_t todo = std::min(msg_len - done, static_cast<size_t>(chunk_size));
31 test(const char *name, const uint8_t *key, size_t key_len, const uint8_t *msg, size_t msg_len, const uint8_t *expected) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dpreauth_test.c46 size_t *msg_len, void **data_pos)
50 *msg_len = sizeof(*hdr) + data_len;
51 hdr = os_malloc(*msg_len);
73 size_t *msg_len, void **data_pos)
75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
44 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
71 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
/external/srtp/crypto/test/
H A Dauth_driver.c74 auth_bits_per_second(auth_t *h, int msg_len);
171 int msg_len = (msg_len_octets + 1)/2; local
178 for (i=0; i < msg_len; i++)
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; local
59 msg_len = os_strlen(msg);
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
69 wpabuf_put_data(req, msg, msg_len);
/external/toybox/toys/pending/
H A Dtraceroute.c66 unsigned msg_len;
127 send_icmp4->icmp_cksum = in_cksum((uint16_t *) send_icmp4, TT.msg_len);
135 len = TT.msg_len;
156 if (sendto(TT.snd_sock, out, TT.msg_len, 0,
505 TT.msg_len = pack_size = ICMP_HD_SIZE4; //udp payload is also 8bytes
507 TT.msg_len = atolx_range(toys.optargs[1], pack_size, 32768);//max packet size
559 if (setsockopt(TT.snd_sock, SOL_SOCKET, SO_SNDBUF, &TT.msg_len,
560 sizeof(TT.msg_len)) < 0) perror_exit("SO_SNDBUF failed ");
576 TT.packet = xzalloc(TT.msg_len);
638 xprintf(", %ld hops max, %u byte packets\n", TT.max_ttl, TT.msg_len);
[all...]
/external/kernel-headers/original/uapi/linux/
H A Dtipc_config.h395 int msg_len; local
397 msg_len = TCM_LENGTH(data_len);
399 tcm_hdr->tcm_len = htonl(msg_len);
/external/libpcap/
H A Dpcap-netfilter-linux.c111 u_int32_t msg_len; local
204 msg_len = NLMSG_ALIGN(nlh->nlmsg_len);
205 if (msg_len > len)
206 msg_len = len;
208 len -= msg_len;
209 buf += msg_len;
/external/libnfc-nci/src/nfc/include/
H A Drw_api.h159 UINT16 msg_len; /* Length of the NDEF message */ member in struct:__anon10373
411 ** Parameters: msg_len: The length of the buffer
417 NFC_API extern tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg);
556 ** Parameters: msg_len: The length of the buffer
562 NFC_API extern tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg );
/external/libnfc-nci/src/nfa/hci/
H A Dnfa_hci_main.c732 nfa_hci_cb.msg_len = 0;
768 pkt_len = nfa_hci_cb.msg_len;
1088 if ((nfa_hci_cb.msg_len + data_len) > nfa_hci_cb.max_msg_len)
1091 memcpy (&nfa_hci_cb.p_msg_data[nfa_hci_cb.msg_len], p_data, (nfa_hci_cb.max_msg_len - nfa_hci_cb.msg_len));
1092 nfa_hci_cb.msg_len = nfa_hci_cb.max_msg_len;
1095 NFA_TRACE_ERROR1 ("nfa_hci_assemble_msg (): Insufficient buffer to Reassemble HCP packet! Dropping :%u bytes", ((nfa_hci_cb.msg_len + data_len) - nfa_hci_cb.max_msg_len));
1099 memcpy (&nfa_hci_cb.p_msg_data[nfa_hci_cb.msg_len], p_data, data_len);
1100 nfa_hci_cb.msg_len += data_len;
H A Dnfa_hci_utils.c316 tNFA_STATUS nfa_hciu_send_msg (UINT8 pipe_id, UINT8 type, UINT8 instruction, UINT16 msg_len, UINT8 *p_msg) argument
329 pipe_id, nfa_hciu_get_type_inst_names (pipe_id, type, instruction, buff), msg_len);
332 pipe_id, type, instruction, msg_len);
338 while ((first_pkt == TRUE) || (msg_len != 0))
350 if (msg_len > data_len)
356 data_len = msg_len;
375 msg_len -= data_len;
376 if (msg_len > 0)
/external/strace/
H A Dnet.c633 uint32_t /* unsigned */ msg_len; member in struct:mmsghdr32
639 unsigned msg_len; member in struct:mmsghdr
686 mmsg->msg_len = mmsg32.msg_len;
718 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len) argument
724 do_msghdr(tcp, &mmsg.msg_hdr, msg_len ? msg_len : mmsg.msg_len);
725 tprintf(", %u}", mmsg.msg_len);
732 decode_mmsg(struct tcb *tcp, unsigned long msg_len) argument
[all...]
/external/boringssl/src/crypto/rsa/
H A Drsa.c384 size_t msg_len) {
389 if (msg_len != SSL_SIG_LENGTH) {
411 signed_msg_len = prefix_len + msg_len;
424 memcpy(signed_msg + prefix_len, msg, msg_len);
474 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, argument
484 return rsa->meth->verify(hash_nid, msg, msg_len, sig, sig_len, rsa);
492 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) {
509 &signed_msg_is_alloced, hash_nid, msg, msg_len)) {
382 RSA_add_pkcs1_prefix(uint8_t **out_msg, size_t *out_msg_len, int *is_alloced, int hash_nid, const uint8_t *msg, size_t msg_len) argument
/external/opencv/cxcore/src/
H A Dcxerror.cpp181 size_t msg_len = strlen(err_msg ? err_msg : "") + 1024;
182 char* message = (char*)alloca(msg_len);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,

Completed in 761 milliseconds

1234