/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 208 pos = hdr.payload; 250 pos = hdr.payload; 271 pos = hdr.payload; 326 pos = hdr.payload; 346 set_pos = hdr.payload; 347 pos = set_end = hdr.payload + hdr.length; 359 seq_pos = hdr.payload; 360 seq_end = hdr.payload + hdr.length; 425 os_memcpy(name->email, hdr.payload, hdr.length); 442 hdr.payload, hdr.length) [all...] |
tlsv1_record.c | 142 * beginning for record layer to fill in; payload filled in after this and 145 * @payload_len: Length of the payload 155 u8 *pos, *ct_start, *length, *payload; local 172 payload = pos; 203 size_t len = pos - payload; 217 if (crypto_cipher_encrypt(rl->write_cbc, payload, 218 payload, pos - payload) < 0)
|
/frameworks/base/telephony/java/com/android/internal/telephony/cdma/sms/ |
BearerData.java | 525 uData.payload = gcr.data; 526 uData.payload[0] = (byte)udhData.length; 527 System.arraycopy(udhData, 0, uData.payload, 1, udhData.length); 533 byte[] payload = encodeUtf16(uData.payloadStr); 537 int payloadCodeUnits = payload.length / 2; 541 uData.payload = new byte[uData.numFields * 2]; 542 uData.payload[0] = (byte)udhData.length; 543 System.arraycopy(udhData, 0, uData.payload, 1, udhData.length); 544 System.arraycopy(payload, 0, uData.payload, udhBytes + udhPadding, payload.length) [all...] |
/external/bluetooth/bluez/tools/ |
csr_bcsp.c | 111 send_packet.payload = send_buffer; 114 receive_packet.payload = receive_buffer; 184 memcpy(send_packet.payload, cp, (size * 2) + 4); 206 receive_packet.payload[0] == 0xff) { 207 memcpy(rp, receive_packet.payload,
|
ubcsp.h | 74 uint16 length; /* What is the length of the payload data */
75 uint8 *payload; /* The payload data itself - size of length */
member in struct:ubcsp_packet
|
/external/srtp/include/ |
srtp_priv.h | 76 unsigned char pt:7; /* payload type */ 91 unsigned pt:7; /* payload type */ 118 unsigned char pt:8; /* payload type */ 137 unsigned char pt:8; /* payload type */ 146 unsigned int pt:8; /* payload type */
|
/external/webkit/Source/JavaScriptCore/jit/ |
JITStubCall.h | 123 m_jit->poke(JIT::Imm32(value.payload()), m_stackIndex); 129 void addArgument(JIT::RegisterID tag, JIT::RegisterID payload) 131 m_jit->poke(payload, m_stackIndex); 148 void getArgument(size_t argumentNumber, JIT::RegisterID tag, JIT::RegisterID payload) 151 m_jit->peek(payload, stackIndex);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_common.c | 26 * @plen: Pointer to variable to contain the returned payload length 27 * Returns: Pointer to EAP payload (after type field), or %NULL on failure 33 * caller can just use the returned payload pointer (into *plen) for processing 34 * the payload regardless of whether the packet used the expanded EAP header or 95 * @payload_len: Payload length in bytes (data after Type)
|
ikev2_common.h | 46 u8 payload_length[2]; /* this payload, including the payload header */ 101 /* Payload Header Flags */ 105 /* EAP-IKEv2 Payload Types (in Next Payload Type field) 206 * public key is used to validate the sender's AUTH payload */
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_common.c | 26 * @plen: Pointer to variable to contain the returned payload length 27 * Returns: Pointer to EAP payload (after type field), or %NULL on failure 33 * caller can just use the returned payload pointer (into *plen) for processing 34 * the payload regardless of whether the packet used the expanded EAP header or 95 * @payload_len: Payload length in bytes (data after Type)
|
ikev2_common.h | 46 u8 payload_length[2]; /* this payload, including the payload header */ 101 /* Payload Header Flags */ 105 /* EAP-IKEv2 Payload Types (in Next Payload Type field) 206 * public key is used to validate the sender's AUTH payload */
|
/system/core/libnl_2/ |
README | 19 | #0 Header |A| #0 Payload |A| #1 Header |A| #1 Payload |A| | 22 |len:2(==4+payload)|type:2|payload|pad| 34 which creates an empty attribute with nest attributes as its payload. Then to
|
/external/dropbear/ |
process-packet.c | 50 type = buf_getbyte(ses.payload); 122 buf_free(ses.payload); 123 ses.payload = NULL;
|
/external/iptables/libipq/ |
ipq_message_type.3 | 57 A packet message containing packet metadata and optional packet payload data. 88 unsigned char payload[0]; /* Optional packet data */ 98 value is greater than zero, the packet payload contents may be accessed
|
/external/kernel-headers/original/linux/ |
if_arcnet.h | 63 uint8_t payload[0]; /* space remaining in packet (504 bytes)*/ member in struct:arc_rfc1201 74 uint8_t payload[0]; /* 507 bytes */ member in struct:arc_rfc1051 87 uint8_t payload[0]; /* 493 bytes */ member in struct:arc_eth_encap
|
/external/libvpx/examples/ |
simple_decoder.txt | 14 header followed by a variable length payload. The length of the payload 15 is specified in the first four bytes of the frame header. The payload is
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
if_arcnet.h | 63 uint8_t payload[0]; /* space remaining in packet (504 bytes)*/ member in struct:arc_rfc1201 74 uint8_t payload[0]; /* 507 bytes */ member in struct:arc_rfc1051 87 uint8_t payload[0]; /* 493 bytes */ member in struct:arc_eth_encap
|
/external/antlr/src/org/antlr/runtime/ |
RecognitionException.java | 127 Token payload = adaptor.getToken(node); local 128 if ( payload!=null ) { 129 this.token = payload; 130 if ( payload.getLine()<= 0 ) { 148 this.line = payload.getLine(); 149 this.charPositionInLine = payload.getCharPositionInLine();
|
/external/antlr/src/org/antlr/runtime/debug/ |
DebugTreeAdaptor.java | 56 public Object create(Token payload) { 57 if ( payload.getTokenIndex() < 0 ) { 59 return create(payload.getType(), payload.getText()); 61 Object node = adaptor.create(payload); 62 dbg.createNode(node, payload);
|
/dalvik/dx/tests/045-dex-switch-ops/ |
expected.txt | 23 0016: packed-switch-payload // for switch @ 0003 49 0016: sparse-switch-payload // for switch @ 0003
|
/external/chromium/chrome/browser/debugger/ |
devtools_remote_message.h | 88 // Creates a message given the certain header values and a payload. 91 const std::string& payload);
|
/external/ppp/pppd/plugins/rp-pppoe/ |
discovery.c | 150 memcpy(conn->cookie.payload, data, len); 164 memcpy(conn->relayId.payload, data, len); 229 memcpy(conn->relayId.payload, data, len); 247 unsigned char *cursor = packet.payload; 248 PPPoETag *svc = (PPPoETag *) (&packet.payload); 256 CHECK_ROOM(cursor, packet.payload, plen); 270 CHECK_ROOM(cursor, packet.payload, namelen+TAG_HDR_SIZE); 273 memcpy(svc->payload, conn->serviceName, strlen(conn->serviceName)); 283 memcpy(hostUniq.payload, &pid, sizeof(pid)); 284 CHECK_ROOM(cursor, packet.payload, sizeof(pid) + TAG_HDR_SIZE) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 142 * beginning for record layer to fill in; payload filled in after this and 145 * @payload_len: Length of the payload 155 u8 *pos, *ct_start, *length, *payload; local 172 payload = pos; 203 size_t len = pos - payload; 217 if (crypto_cipher_encrypt(rl->write_cbc, payload, 218 payload, pos - payload) < 0)
|
/external/wpa_supplicant_8/src/wps/ |
upnp_xml.c | 33 * characters that would appear in the payload data are rewritten using 41 * to be equivalent to <label></label>, i.e., no payload, but we are unlikely 58 * any special chars in our payload. 108 * 110xxxxx(2) -- 1st byte of 2 byte sequence (5 payload bits here) 109 * 1110xxxx(2) -- 1st byte of 3 byte sequence (4 payload bits here) 110 * 11110xxx(2) -- 1st byte of 4 byte sequence (3 payload bits here) 111 * 10xxxxxx(2) -- extension byte (6 payload bits per byte) 119 * appear in payload data... which we do here.
|
/packages/apps/Tag/src/com/android/apps/tag/record/ |
MimeRecord.java | 73 byte[] payload = record.getPayload(); 74 return new MimeRecord(type, payload);
|