/external/openssl/ssl/ |
D | d1_srvr.c | 886 unsigned int msg_len; in dtls1_send_hello_verify_request() local 1493 unsigned int msg_len; in dtls1_send_certificate_request() local 1626 unsigned int hlen, msg_len; in dtls1_send_newsession_ticket() local
|
D | d1_both.c | 126 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 139 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 420 unsigned long msg_len; in dtls1_get_message() local 488 size_t frag_off,frag_len,msg_len; in dtls1_preprocess_fragment() local
|
/external/strace/ |
D | net.c | 392 uint32_t /* unsigned */ msg_len; member 425 printmmsghdr(struct tcb *tcp, long addr, unsigned int idx, unsigned long msg_len) in printmmsghdr() 429 unsigned msg_len; in printmmsghdr() member 464 decode_mmsg(struct tcb *tcp, unsigned long msg_len) in decode_mmsg()
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
D | d1_srvr.c | 656 unsigned int msg_len; in dtls1_send_hello_verify_request() local
|
D | d1_both.c | 129 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 142 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) { \ argument 428 unsigned long msg_len; in dtls1_get_message() local 500 size_t frag_off,frag_len,msg_len; in dtls1_preprocess_fragment() local
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
D | auth_driver.c | 171 int msg_len = (msg_len_octets + 1)/2; in auth_bits_per_second() local
|
/external/srtp/crypto/test/ |
D | auth_driver.c | 171 int msg_len = (msg_len_octets + 1)/2; in auth_bits_per_second() local
|
/external/wpa_supplicant_8/src/pae/ |
D | ieee802_1x_kay.c | 706 size_t msg_len) in ieee802_1x_mka_decode_basic_body() 912 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_i_in_peerlist() 981 const u8 *peer_msg, size_t msg_len) in ieee802_1x_mka_decode_live_peer_body() 1037 const u8 *peer_msg, size_t msg_len) in ieee802_1x_mka_decode_potential_peer_body() 1233 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_sak_use_body() 1512 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_dist_sak_body() 1746 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_icv_body() 1790 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_dist_cak_body() 1814 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_kmd_body() 1837 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_announce_body()
|
/external/tcpdump/ |
D | print-olsr.c | 96 u_int8_t msg_len[2]; member 106 u_int8_t msg_len[2]; member 263 u_int msg_type, msg_len, msg_tlen, hello_len; in olsr_print() local
|
D | print-ldp.c | 567 u_short pdu_len,msg_len,msg_type,msg_tlen; in ldp_msg_print() local
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | preauth_test.c | 46 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() 73 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol()
|
D | wpas_glue.c | 62 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() 407 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol()
|
/external/chromium_org/sandbox/linux/services/ |
D | broker_process.cc | 276 ssize_t msg_len = UnixDomainSocket::SendRecvMsgWithFlags(ipc_socketpair_, in PathAndFlagsSyscall() local 327 const ssize_t msg_len = UnixDomainSocket::RecvMsg(ipc_socketpair_, buf, in HandleRequest() local
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local
|
/external/bluetooth/bluedroid/hci/src/ |
D | hci_mct.c | 717 uint16_t msg_len, len; in hci_mct_receive_evt_msg() local 897 uint16_t msg_len, len; in hci_mct_receive_acl_msg() local
|
D | hci_h4.c | 743 uint16_t msg_len, len; in hci_h4_receive_msg() local
|
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
D | rsa.c | 349 size_t msg_len) { in pkcs1_prefixed_msg() 442 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, in RSA_verify()
|
/external/libnfc-nci/src/nfc/tags/ |
D | rw_t2t_ndef.c | 1157 tNFC_STATUS rw_t2t_write_ndef_first_block (UINT16 msg_len, BOOLEAN b_update_len) in rw_t2t_write_ndef_first_block() 1263 tNFC_STATUS rw_t2t_write_ndef_next_block (UINT16 block, UINT16 msg_len, BOOLEAN b_update_len) in rw_t2t_write_ndef_next_block() 3061 tNFC_STATUS RW_T2tWriteNDef (UINT16 msg_len, UINT8 *p_msg) in RW_T2tWriteNDef()
|
D | rw_t1t_ndef.c | 1631 static tNFC_STATUS rw_t1t_send_ndef_byte (UINT8 data, UINT8 block, UINT8 index, UINT8 msg_len) in rw_t1t_send_ndef_byte() 2594 tNFC_STATUS RW_T1tWriteNDef (UINT16 msg_len, UINT8 *p_msg) in RW_T1tWriteNDef()
|
/external/chromium_org/components/nacl/zygote/ |
D | nacl_fork_delegate_linux.cc | 115 const ssize_t msg_len = in SendIPCRequestAndReadReply() local
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() 400 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, in eap_sim_add_mac_sha256()
|
/external/bluetooth/bluedroid/stack/gatt/ |
D | gatt_sr.c | 769 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET); in gatts_process_primary_service_req() local 979 UINT16 msg_len = (UINT16)(sizeof(BT_HDR) + p_tcb->payload_size + L2CAP_MIN_OFFSET), in gatts_process_read_by_type_req() local
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.c | 926 size_t msg_len; in eap_sm_processIdentity() local 1199 size_t i, msg_len; in eap_sm_processNotify() local 1801 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len) in eap_sm_request_otp()
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
D | test_wpa.c | 91 u16 data_len, size_t *msg_len, void **data_pos) in supp_alloc_eapol()
|
/external/libpcap/ |
D | pcap-netfilter-linux.c | 111 u_int32_t msg_len; in netfilter_read_linux() local
|