/external/wpa_supplicant/ |
eap_pax.c | 163 "payload"); 186 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 286 "payload"); 320 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 375 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload",
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_pax.c | 152 "payload"); 175 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 268 "payload"); 302 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 356 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload",
|
/packages/apps/Tag/tests/src/com/android/apps/tag/ |
MockNdefMessages.java | 32 (byte) 0x2b, // Payload Length = 43 35 // begin smart poster payload 39 (byte) 0x17, // Payload Length = 23 71 (byte) 0x0c, // Payload Length = 12 89 // end smart poster payload
|
/external/webkit/JavaScriptCore/jit/ |
JIT.h | 399 void emitLoadPayload(unsigned index, RegisterID payload); 401 void emitLoad(const JSValue& v, RegisterID tag, RegisterID payload); 402 void emitLoad(unsigned index, RegisterID tag, RegisterID payload, RegisterID base = callFrameRegister); 405 void emitStore(unsigned index, RegisterID tag, RegisterID payload, RegisterID base = callFrameRegister); 407 void emitStoreInt32(unsigned index, RegisterID payload, bool indexIsInt32 = false); 408 void emitStoreInt32(unsigned index, Imm32 payload, bool indexIsInt32 = false); 409 void emitStoreCell(unsigned index, RegisterID payload, bool indexIsCell = false); 414 void map(unsigned bytecodeIndex, unsigned virtualRegisterIndex, RegisterID tag, RegisterID payload); 418 bool getMappedPayload(unsigned virtualRegisterIndex, RegisterID& payload); [all...] |
/external/ipsec-tools/src/racoon/ |
ipsec_doi.c | 170 * check phase 1 SA payload. 171 * make new SA payload to be replyed not including general header. 174 * positive: the pointer to new buffer of SA payload. 183 vchar_t *newsa; /* new SA payload approved. */ 206 * return a new SA payload to be reply to peer. 881 * check phase 2 SA payload and select single proposal. 882 * make new SA payload to be replyed not including general header. 917 * check phase 2 SA payload returned from responder. 1111 * return a new SA payload to be reply to peer. 1282 * get proposal pairs from SA payload [all...] |
localconf.h | 88 vchar_t *ident[LC_IDENTTYPE_MAX]; /* base of Identifier payload. */
|
sainfo.h | 44 * idsrc and iddst are constructed body of ID payload.
|
/external/libnfc-nxp/src/ |
phFriNfc_NdefRecord.c | 414 /* ++ is for the Payload Length Byte */ 419 /* + PHFRINFCNDEFRECORD_NORMAL_RECORD_BYTE is for the Payload Length Byte */ 672 /*check for SR bit and then correspondingly use the payload length*/ 798 /* For Short Record, Payload Length Byte is 1 */ 812 /* For Normal Record, Payload Length Byte is 4 */ [all...] |
phHciNfc_Jewel.c | 669 && ((JEWEL_MULTIPLE_TAGS_FOUND == message->payload[i] ) 670 || (JEWEL_SINGLE_TAG_FOUND == message->payload[i])) 675 if (JEWEL_MULTIPLE_TAGS_FOUND == message->payload[i]) 761 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
|
/frameworks/base/media/libstagefright/ |
MPEG2TSWriter.cpp | 555 // adaptation_field_control = b01 (no adaptation field, payload only) 558 // --- payload follows 602 // adaptation_field_control = b01 (no adaptation field, payload only) 605 // -- payload follows 679 // adaptation_field_control = b01 (no adaptation field, payload only) 681 // -- payload follows 775 // adaptation_field_control = b01 (no adaptation field, payload only)
|
/frameworks/base/telephony/java/com/android/internal/telephony/gsm/ |
SmsMessage.java | 602 * Pulls the user data out of the PDU, and separates the payload from 606 * @param dataInSeptets true if the data payload is in septets instead 608 * @return the number of septets or octets in the user data payload 665 * Returns the user data payload, not including the headers 667 * @return the user data payload, not including the headers 694 * Interprets the user data payload as packed GSM 7bit characters, and 697 * @param septetCount the number of septets in the user data payload 713 * Interprets the user data payload as UCS2 characters, and 716 * @param byteCount the number of bytes in the user data payload [all...] |
/external/dropbear/ |
common-session.c | 77 ses.payload = NULL; 133 dropbear_assert(ses.payload == NULL); 191 if (ses.payload != NULL) {
|
svr-auth.c | 111 username = buf_getstring(ses.payload, &userlen); 112 servicename = buf_getstring(ses.payload, &servicelen); 113 methodname = buf_getstring(ses.payload, &methodlen);
|
debug.h | 44 /* All functions writing to the cleartext payload buffer call
|
svr-kex.c | 55 if (buf_getmpint(ses.payload, &dh_e) != DROPBEAR_SUCCESS) {
|
/external/kernel-headers/original/linux/ |
if_vlan.h | 39 #define VLAN_ETH_DATA_LEN 1500 /* Max. octets in payload */ 221 * Inserts the VLAN tag into @skb as part of the payload 303 * __vlan_get_tag - get the VLAN ID that is part of the payload
|
if_hippi.h | 34 #define HIPPI_DATA_LEN 65280 /* Max. bytes in payload */
|
/external/tcpdump/ |
print-sctp.c | 100 /* is now only as long as the payload */ 201 printf("[Payload"); 209 /* Less than 1 byte of chunk payload */
|
oakley.h | 88 /* The use for checking proposal payload. This is not exchange type. */
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
radiotap.c | 102 /* find payload start allowing for extended bitmap(s) */ 145 * payload for the field. It takes care of alignment handling and extended 164 * starting from b0 in the bitmap, so we can walk the payload
|
/external/chromium/net/base/ |
data_url.cc | 74 // could be part of the payload, so don't strip it.
|
/external/iproute2/tc/ |
em_nbyte.c | 120 fprintf(stderr, "NByte payload size mismatch\n");
|
/external/iptables/libipq/ |
ipq_set_mode.3 | 55 parameter is used to specify how many bytes of the payload to copy
|
/external/libvpx/vpx_mem/memory_manager/include/ |
heapmm.h | 88 /* Pointer to (payload of) root node in AVL tree. This field should
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpas_glue.c | 93 * @buf: Frame payload starting from IEEE 802.1X header 94 * @len: Frame payload length 115 * @buf: EAPOL payload (after IEEE 802.1X header) 116 * @len: EAPOL payload length
|