HomeSort by relevance Sort by last modified time
    Searched full:payload (Results 201 - 225 of 535) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/wpa_supplicant/
eap_pax.c 163 "payload");
186 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
286 "payload");
320 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
375 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload",
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_pax.c 152 "payload");
175 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
268 "payload");
302 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload",
356 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload",
  /packages/apps/Tag/tests/src/com/android/apps/tag/
MockNdefMessages.java 32 (byte) 0x2b, // Payload Length = 43
35 // begin smart poster payload
39 (byte) 0x17, // Payload Length = 23
71 (byte) 0x0c, // Payload Length = 12
89 // end smart poster payload
  /external/webkit/JavaScriptCore/jit/
JIT.h 399 void emitLoadPayload(unsigned index, RegisterID payload);
401 void emitLoad(const JSValue& v, RegisterID tag, RegisterID payload);
402 void emitLoad(unsigned index, RegisterID tag, RegisterID payload, RegisterID base = callFrameRegister);
405 void emitStore(unsigned index, RegisterID tag, RegisterID payload, RegisterID base = callFrameRegister);
407 void emitStoreInt32(unsigned index, RegisterID payload, bool indexIsInt32 = false);
408 void emitStoreInt32(unsigned index, Imm32 payload, bool indexIsInt32 = false);
409 void emitStoreCell(unsigned index, RegisterID payload, bool indexIsCell = false);
414 void map(unsigned bytecodeIndex, unsigned virtualRegisterIndex, RegisterID tag, RegisterID payload);
418 bool getMappedPayload(unsigned virtualRegisterIndex, RegisterID& payload);
    [all...]
  /external/ipsec-tools/src/racoon/
ipsec_doi.c 170 * check phase 1 SA payload.
171 * make new SA payload to be replyed not including general header.
174 * positive: the pointer to new buffer of SA payload.
183 vchar_t *newsa; /* new SA payload approved. */
206 * return a new SA payload to be reply to peer.
881 * check phase 2 SA payload and select single proposal.
882 * make new SA payload to be replyed not including general header.
917 * check phase 2 SA payload returned from responder.
1111 * return a new SA payload to be reply to peer.
1282 * get proposal pairs from SA payload
    [all...]
localconf.h 88 vchar_t *ident[LC_IDENTTYPE_MAX]; /* base of Identifier payload. */
sainfo.h 44 * idsrc and iddst are constructed body of ID payload.
  /external/libnfc-nxp/src/
phFriNfc_NdefRecord.c 414 /* ++ is for the Payload Length Byte */
419 /* + PHFRINFCNDEFRECORD_NORMAL_RECORD_BYTE is for the Payload Length Byte */
672 /*check for SR bit and then correspondingly use the payload length*/
798 /* For Short Record, Payload Length Byte is 1 */
812 /* For Normal Record, Payload Length Byte is 4 */
    [all...]
phHciNfc_Jewel.c 669 && ((JEWEL_MULTIPLE_TAGS_FOUND == message->payload[i] )
670 || (JEWEL_SINGLE_TAG_FOUND == message->payload[i]))
675 if (JEWEL_MULTIPLE_TAGS_FOUND == message->payload[i])
761 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
  /frameworks/base/media/libstagefright/
MPEG2TSWriter.cpp 555 // adaptation_field_control = b01 (no adaptation field, payload only)
558 // --- payload follows
602 // adaptation_field_control = b01 (no adaptation field, payload only)
605 // -- payload follows
679 // adaptation_field_control = b01 (no adaptation field, payload only)
681 // -- payload follows
775 // adaptation_field_control = b01 (no adaptation field, payload only)
  /frameworks/base/telephony/java/com/android/internal/telephony/gsm/
SmsMessage.java 602 * Pulls the user data out of the PDU, and separates the payload from
606 * @param dataInSeptets true if the data payload is in septets instead
608 * @return the number of septets or octets in the user data payload
665 * Returns the user data payload, not including the headers
667 * @return the user data payload, not including the headers
694 * Interprets the user data payload as packed GSM 7bit characters, and
697 * @param septetCount the number of septets in the user data payload
713 * Interprets the user data payload as UCS2 characters, and
716 * @param byteCount the number of bytes in the user data payload
    [all...]
  /external/dropbear/
common-session.c 77 ses.payload = NULL;
133 dropbear_assert(ses.payload == NULL);
191 if (ses.payload != NULL) {
svr-auth.c 111 username = buf_getstring(ses.payload, &userlen);
112 servicename = buf_getstring(ses.payload, &servicelen);
113 methodname = buf_getstring(ses.payload, &methodlen);
debug.h 44 /* All functions writing to the cleartext payload buffer call
svr-kex.c 55 if (buf_getmpint(ses.payload, &dh_e) != DROPBEAR_SUCCESS) {
  /external/kernel-headers/original/linux/
if_vlan.h 39 #define VLAN_ETH_DATA_LEN 1500 /* Max. octets in payload */
221 * Inserts the VLAN tag into @skb as part of the payload
303 * __vlan_get_tag - get the VLAN ID that is part of the payload
if_hippi.h 34 #define HIPPI_DATA_LEN 65280 /* Max. bytes in payload */
  /external/tcpdump/
print-sctp.c 100 /* is now only as long as the payload */
201 printf("[Payload");
209 /* Less than 1 byte of chunk payload */
oakley.h 88 /* The use for checking proposal payload. This is not exchange type. */
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
radiotap.c 102 /* find payload start allowing for extended bitmap(s) */
145 * payload for the field. It takes care of alignment handling and extended
164 * starting from b0 in the bitmap, so we can walk the payload
  /external/chromium/net/base/
data_url.cc 74 // could be part of the payload, so don't strip it.
  /external/iproute2/tc/
em_nbyte.c 120 fprintf(stderr, "NByte payload size mismatch\n");
  /external/iptables/libipq/
ipq_set_mode.3 55 parameter is used to specify how many bytes of the payload to copy
  /external/libvpx/vpx_mem/memory_manager/include/
heapmm.h 88 /* Pointer to (payload of) root node in AVL tree. This field should
  /external/wpa_supplicant_6/wpa_supplicant/
wpas_glue.c 93 * @buf: Frame payload starting from IEEE 802.1X header
94 * @len: Frame payload length
115 * @buf: EAPOL payload (after IEEE 802.1X header)
116 * @len: EAPOL payload length

Completed in 1060 milliseconds

1 2 3 4 5 6 7 891011>>