/external/ppp/pppd/ |
D | upap.c | 382 int msglen; local 442 msglen = strlen(msg); 443 if (msglen > 255) 444 msglen = 255; 445 upap_sresp(u, retcode, id, msg, msglen); 475 u_char msglen; local 487 GETCHAR(msglen, inp); 488 if (msglen > 0) { 490 if (len < msglen) { 495 PRINTMSG(msg, msglen); [all …]
|
D | eap.c | 1050 int msglen; local 1059 msglen = EAP_HEADERLEN + sizeof (u_char) + lenstr; 1060 PUTSHORT(msglen, outp); 1066 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1081 int msglen; local 1090 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + MD5_SIGNATURE_SIZE + 1092 PUTSHORT(msglen, outp); 1101 output(esp->es_unit, outpacket_buf, PPP_HDRLEN + msglen); 1117 int msglen; local 1126 msglen = EAP_HEADERLEN + 2 * sizeof (u_char) + lenstr; [all …]
|
/external/kernel-headers/original/uapi/scsi/ |
D | scsi_netlink.h | 47 uint16_t msglen; member 119 (hdr)->msglen = mlen; \
|
/external/pdfium/core/src/fdrm/crypto/ |
D | fx_crypt_sha.cpp | 361 FX_BYTE msglen[8]; in CRYPT_SHA256Finish() local 365 PUT_FX_DWORD( high, msglen, 0 ); in CRYPT_SHA256Finish() 366 PUT_FX_DWORD( low, msglen, 4 ); in CRYPT_SHA256Finish() 370 CRYPT_SHA256Update( ctx, msglen, 8 ); in CRYPT_SHA256Finish() 662 FX_BYTE msglen[16]; in CRYPT_SHA384Finish() local 663 FXSYS_memset32(msglen, 0, 16); in CRYPT_SHA384Finish() 668 PUT_FX_64DWORD( high, msglen, 0 ); in CRYPT_SHA384Finish() 669 PUT_FX_64DWORD( low, msglen, 8 ); in CRYPT_SHA384Finish() 673 CRYPT_SHA384Update( ctx, msglen, 16 ); in CRYPT_SHA384Finish() 712 FX_BYTE msglen[16]; in CRYPT_SHA512Finish() local [all …]
|
D | fx_crypt.cpp | 235 FX_BYTE msglen[8]; in CRYPT_MD5Finish() local 236 PUT_FX_DWORD( ctx->total[0], msglen, 0 ); in CRYPT_MD5Finish() 237 PUT_FX_DWORD( ctx->total[1], msglen, 4 ); in CRYPT_MD5Finish() 241 CRYPT_MD5Update( ctx, msglen, 8 ); in CRYPT_MD5Finish()
|
/external/libpcap/ |
D | pcap-libdlpi.c | 307 size_t msglen; in pcap_read_libdlpi() local 327 msglen = p->bufsize; in pcap_read_libdlpi() 331 &msglen, -1, NULL); in pcap_read_libdlpi() 346 len = msglen; in pcap_read_libdlpi()
|
/external/ipsec-tools/src/libipsec/ |
D | policy_parse.y | 586 policy_parse(msg, msglen) in policy_parse() argument 588 int msglen; 619 ipsec_set_policy(msg, msglen) in ipsec_set_policy() argument 621 int msglen; 625 policy = policy_parse(msg, msglen);
|
/external/iproute2/lib/ |
D | libnetlink.c | 197 int msglen = 0; in rtnl_dump_filter_l() local 217 msglen = status; in rtnl_dump_filter_l() 219 while (NLMSG_OK(h, msglen)) { in rtnl_dump_filter_l() 247 h = NLMSG_NEXT(h, msglen); in rtnl_dump_filter_l() 258 if (msglen) { in rtnl_dump_filter_l() 259 fprintf(stderr, "!!!Remnant of size %d\n", msglen); in rtnl_dump_filter_l()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | preauth.c | 135 size_t msglen; in rsn_preauth_eapol_send() local 144 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); in rsn_preauth_eapol_send() 148 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen); in rsn_preauth_eapol_send() 150 ETH_P_RSN_PREAUTH, msg, msglen); in rsn_preauth_eapol_send()
|
/external/toybox/toys/pending/ |
D | ip.c | 1472 int32_t tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local 1477 if (msglen < 0) return 1; in display_route_info() 1505 tvar = msglen; in display_route_info() 1603 int tvar, msglen = mhdr->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg)); in display_route_info() local 1606 tvar = msglen; in display_route_info() 1626 int msglen = recv(sockfd, toybuf, sizeof(toybuf), 0); in display_route_info() local 1628 if ((msglen < 0) && (errno == EINTR || errno == EAGAIN)) continue; in display_route_info() 1629 else if (msglen < 0) { in display_route_info() 1633 } else if (!msglen) { in display_route_info() 1639 for (mhdr = (struct nlmsghdr*)toybuf; NLMSG_OK(mhdr, msglen); in display_route_info() [all …]
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_write.c | 729 size_t msglen; in tls_send_client_key_exchange() local 733 msglen = 2000; in tls_send_client_key_exchange() 735 msglen += tls_client_cert_chain_der_len(conn); in tls_send_client_key_exchange() 737 msg = os_malloc(msglen); in tls_send_client_key_exchange() 742 end = msg + msglen; in tls_send_client_key_exchange()
|
D | tlsv1_server_write.c | 806 size_t msglen; in tls_send_server_hello() local 810 msglen = 1000 + tls_server_cert_chain_der_len(conn); in tls_send_server_hello() 812 msg = os_malloc(msglen); in tls_send_server_hello() 817 end = msg + msglen; in tls_send_server_hello()
|
/external/libnfc-nci/src/udrv/include/ |
D | uipc.h | 127 UDRV_API extern BOOLEAN UIPC_Send(tUIPC_CH_ID ch_id, UINT16 msg_evt, UINT8 *p_buf, UINT16 msglen);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | wpas_glue.c | 141 size_t msglen; in wpa_supplicant_eapol_send() local 207 msg = wpa_alloc_eapol(wpa_s, type, buf, len, &msglen, NULL); in wpa_supplicant_eapol_send() 212 wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", msg, msglen); in wpa_supplicant_eapol_send() 213 res = wpa_ether_send(wpa_s, dst, ETH_P_EAPOL, msg, msglen); in wpa_supplicant_eapol_send()
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd.c | 422 mDNSu16 msglen = 0; in RecvPacket() local 430 nread = my_recv( sock, &msglen, sizeof( msglen ), closed ); in RecvPacket() 435 msglen = ntohs( msglen ); in RecvPacket() 436 …require_action_quiet( nread == sizeof( msglen ), exit, err = mStatus_UnknownErr; Log( "Could not r… in RecvPacket() 440 …require_action_quiet( msglen <= sizeof( storage->msg ), exit, err = mStatus_UnknownErr; Log( "Recv… in RecvPacket() 447 if ( msglen > sizeof(DNSMessage)) in RecvPacket() 449 allocsize = sizeof(PktMsg) - sizeof(DNSMessage) + msglen; in RecvPacket() 461 pkt->len = msglen; in RecvPacket() 470 nread = my_recv(sock, &pkt->msg, msglen, closed ); in RecvPacket() 472 …require_action_quiet( nread == msglen, exit, err = mStatus_UnknownErr ; Log( "Could not read entir… in RecvPacket()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.c | 2177 const char *msg, size_t msglen) in eap_sm_request() argument 2204 tmp = os_malloc(msglen + 3); in eap_sm_request() 2208 os_memcpy(tmp + 1, msg, msglen); in eap_sm_request() 2209 tmp[msglen + 1] = ']'; in eap_sm_request() 2210 tmp[msglen + 2] = '\0'; in eap_sm_request() 2214 config->pending_req_otp_len = msglen + 3; in eap_sm_request() 2235 #define eap_sm_request(sm, type, msg, msglen) do { } while (0) argument
|
/external/mdnsresponder/mDNSCore/ |
D | DNSCommon.c | 2633 mDNSu16 msglen = (mDNSu16)(end - (mDNSu8 *)msg); in mDNSSendDNSMessage() local 2634 mDNSu8 lenbuf[2] = { (mDNSu8)(msglen >> 8), (mDNSu8)(msglen & 0xFF) }; in mDNSSendDNSMessage() 2639 nsent = mDNSPlatformWriteTCP(sock, (char *)msg, msglen); in mDNSSendDNSMessage() 2640 …if (nsent != msglen) { LogMsg("mDNSSendDNSMessage: write msg body failed %d/%d", nsent, msglen); s… in mDNSSendDNSMessage()
|