/system/core/trusty/libtrusty/tipc-test/ |
D | tipc_test.c | 346 size_t msg_len; in echo_test() local 364 msg_len = msgsz; in echo_test() 366 msg_len = rand() % msgsz; in echo_test() 369 memset(tx_buf, i + 1, msg_len); in echo_test() 371 rc = write(echo_fd, tx_buf, msg_len); in echo_test() 372 if ((size_t)rc != msg_len) { in echo_test() 377 rc = read(echo_fd, rx_buf, msg_len); in echo_test() 383 if ((size_t)rc != msg_len) { in echo_test() 385 rc, msg_len); in echo_test() 409 size_t msg_len; in burst_write_test() local [all …]
|
/system/bt/stack/crypto_toolbox/ |
D | crypto_toolbox.cc | 38 constexpr size_t msg_len = BT_OCTET32_LEN /* U size */ + in f4() local 46 std::array<uint8_t, msg_len> msg; in f4() 59 constexpr size_t msg_len = 1 /* Counter size */ + 4 /* keyID size */ + in calculate_mac_key_or_ltk() local 63 std::array<uint8_t, msg_len> msg; in calculate_mac_key_or_ltk() 102 const uint8_t msg_len = OCTET16_LEN /* N1 size */ + in f6() local 114 std::array<uint8_t, msg_len> msg; in f6() 127 constexpr size_t msg_len = BT_OCTET32_LEN /* U size */ + in g2() local 136 std::array<uint8_t, msg_len> msg; in g2()
|
/system/core/fastboot/device/ |
D | fastboot_device.cpp | 94 size_t msg_len = std::min(kMaxMessageSize, message.size()); in WriteStatus() local 104 memcpy(buf + kResponseReasonSize, message.c_str(), msg_len); in WriteStatus() 106 size_t response_len = kResponseReasonSize + msg_len; in WriteStatus()
|
/system/core/adb/daemon/ |
D | auth.cpp | 108 int msg_len = msg.length(); in adbd_send_key_message_locked() local 109 if (msg_len >= static_cast<int>(MAX_FRAMEWORK_PAYLOAD)) { in adbd_send_key_message_locked() 110 LOG(ERROR) << "Key too long (" << msg_len << ")"; in adbd_send_key_message_locked() 115 if (!WriteFdExactly(framework_fd, msg.c_str(), msg_len)) { in adbd_send_key_message_locked()
|
/system/nfc/src/nfa/hci/ |
D | nfa_hci_main.cc | 754 nfa_hci_cb.msg_len = 0; in nfa_hci_conn_cback() 785 pkt_len = nfa_hci_cb.msg_len; in nfa_hci_conn_cback() 1093 if ((nfa_hci_cb.msg_len + data_len) > nfa_hci_cb.max_msg_len) { in nfa_hci_assemble_msg() 1095 memcpy(&nfa_hci_cb.p_msg_data[nfa_hci_cb.msg_len], p_data, in nfa_hci_assemble_msg() 1096 (nfa_hci_cb.max_msg_len - nfa_hci_cb.msg_len)); in nfa_hci_assemble_msg() 1097 nfa_hci_cb.msg_len = nfa_hci_cb.max_msg_len; in nfa_hci_assemble_msg() 1103 ((nfa_hci_cb.msg_len + data_len) - nfa_hci_cb.max_msg_len)); in nfa_hci_assemble_msg() 1105 memcpy(&nfa_hci_cb.p_msg_data[nfa_hci_cb.msg_len], p_data, data_len); in nfa_hci_assemble_msg() 1106 nfa_hci_cb.msg_len += data_len; in nfa_hci_assemble_msg()
|
D | nfa_hci_utils.cc | 301 uint8_t instruction, uint16_t msg_len, in nfa_hciu_send_msg() argument 314 nfa_hciu_get_type_inst_names(pipe_id, type, instruction, buff), msg_len); in nfa_hciu_send_msg() 319 while ((first_pkt == true) || (msg_len != 0)) { in nfa_hciu_send_msg() 332 if (msg_len > data_len) { in nfa_hciu_send_msg() 335 data_len = msg_len; in nfa_hciu_send_msg() 352 msg_len -= data_len; in nfa_hciu_send_msg() 353 if (msg_len > 0) p_msg += data_len; in nfa_hciu_send_msg()
|
/system/nfc/src/nfc/include/ |
D | rw_api.h | 174 uint16_t msg_len; /* Length of the NDEF message */ member 437 extern tNFC_STATUS RW_T1tWriteNDef(uint16_t msg_len, uint8_t* p_msg); 586 extern tNFC_STATUS RW_T2tWriteNDef(uint16_t msg_len, uint8_t* p_msg);
|
D | ndef_utils.h | 82 extern tNDEF_STATUS NDEF_MsgValidate(uint8_t* p_msg, uint32_t msg_len,
|
/system/nfc/src/nfc/tags/ |
D | rw_t2t_ndef.cc | 64 static tNFC_STATUS rw_t2t_write_ndef_first_block(uint16_t msg_len, 67 uint16_t msg_len, 280 evt_data.msg_len = p_t2t->prop_msg_len; in rw_t2t_ntf_tlv_detect_complete() 1105 tNFC_STATUS rw_t2t_write_ndef_first_block(uint16_t msg_len, bool b_update_len) { in rw_t2t_write_ndef_first_block() argument 1122 if (msg_len == 0) { in rw_t2t_write_ndef_first_block() 1130 length_field[1] = (uint8_t)(msg_len >> 8); in rw_t2t_write_ndef_first_block() 1131 length_field[2] = (uint8_t)(msg_len); in rw_t2t_write_ndef_first_block() 1135 length_field[0] = (uint8_t)(msg_len); in rw_t2t_write_ndef_first_block() 1202 tNFC_STATUS rw_t2t_write_ndef_next_block(uint16_t block, uint16_t msg_len, in rw_t2t_write_ndef_next_block() argument 1251 if (msg_len == 0) { in rw_t2t_write_ndef_next_block() [all …]
|
D | rw_t1t_ndef.cc | 55 uint8_t index, uint8_t msg_len); 1484 uint8_t index, uint8_t msg_len) { in rw_t1t_send_ndef_byte() argument 1494 if (p_t1t->work_offset == p_t1t->new_ndef_msg_len + msg_len) { in rw_t1t_send_ndef_byte() 2414 tNFC_STATUS RW_T1tWriteNDef(uint16_t msg_len, uint8_t* p_msg) { in RW_T1tWriteNDef() argument 2443 if (msg_len > p_t1t->max_ndef_msg_len) { in RW_T1tWriteNDef() 2451 p_t1t->new_ndef_msg_len = msg_len; in RW_T1tWriteNDef()
|
/system/bt/stack/gatt/ |
D | gatt_main.cc | 859 uint16_t msg_len = p_buf->len - 1; in gatt_data_process() local 879 gatt_server_handle_client_req(tcb, op_code, msg_len, p); in gatt_data_process() 881 gatt_client_handle_server_rsp(tcb, op_code, msg_len, p); in gatt_data_process()
|
D | gatt_sr.cc | 652 uint16_t msg_len = in gatts_process_primary_service_req() local 654 BT_HDR* p_msg = (BT_HDR*)osi_calloc(msg_len); in gatts_process_primary_service_req() 815 size_t msg_len = sizeof(BT_HDR) + tcb.payload_size + L2CAP_MIN_OFFSET; in gatts_process_read_by_type_req() local 816 BT_HDR* p_msg = (BT_HDR*)osi_calloc(msg_len); in gatts_process_read_by_type_req()
|
/system/nfc/src/nfc/ndef/ |
D | ndef_utils.cc | 74 tNDEF_STATUS NDEF_MsgValidate(uint8_t* p_msg, uint32_t msg_len, in NDEF_MsgValidate() argument 77 uint8_t* p_end = p_msg + msg_len; in NDEF_MsgValidate() 84 if ((p_msg == nullptr) || (msg_len < 3)) return (NDEF_MSG_TOO_SHORT); in NDEF_MsgValidate()
|
/system/nfc/src/nfa/include/ |
D | nfa_hci_int.h | 395 uint16_t msg_len; /* For segmentation - length of the combined message */ member
|