/dalvik/dx/src/com/android/dx/io/instructions/ |
FillArrayDataPayloadDecodedInstruction.java | 20 * A decoded Dalvik instruction which contains the payload for
|
/external/bluetooth/bluez/tools/ |
l2ping.c | 215 /* Check payload length */ 222 /* Check payload */ 225 fprintf(stderr, "Response payload different.\n"); 261 printf("\t-v Verify request and response payload\n");
|
/external/dropbear/ |
cli-auth.c | 72 banner = buf_getstring(ses.payload, &bannerlen); 73 buf_eatstring(ses.payload); /* The language string */ 173 methods = buf_getstring(ses.payload, &methlen); 175 partial = buf_getbool(ses.payload);
|
cli-channel.c | 48 datatype = buf_getint(ses.payload);
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample | 14 # if the certificate/certificate request payload is received.
|
/external/iptables/extensions/ |
libxt_u32.man | 107 of the ICMP payload, of which byte 0 is the ICMP type. Therefore, we simply 113 TCP payload bytes 8-12 is any of 1, 2, 5 or 8 128 start of the TCP payload. Finally, 8 reads bytes 8-12 of the payload and
|
/external/ppp/pppd/plugins/rp-pppoe/ |
pppoe.h | 217 unsigned int length:16; /* Payload length */ 218 unsigned char payload[ETH_DATA_LEN]; /* A bit of room to spare */ member in struct:PPPoEPacketStruct 231 unsigned int length:16; /* Length of payload */ 232 unsigned char payload[ETH_DATA_LEN]; /* A LOT of room to spare */ member in struct:PPPoETagStruct
|
/external/tcpdump/ |
print-atm.c | 308 u_int16_t cell_type, func_type,vpi,vci,payload,clp; local 316 payload = (cell_header>>1)&0x7; 319 printf("%s, vpi %u, vci %u, payload %u, clp %u, ", 321 vpi, vci, payload, clp);
|
print-beep.c | 70 printf(" BEEP (payload or undecoded)");
|
/external/webkit/Source/WebCore/platform/graphics/ |
WOFFFileFormat.h | 41 // if conversion ran out of memory). Otherwise returns true and writes the sfnt payload into sfnt.
|
/external/webkit/Source/WebKit/android/jni/ |
JavaSharedClient.h | 53 static void EnqueueFunctionPtr(void (*proc)(void*), void* payload);
|
/external/wpa_supplicant/ |
asn1.h | 53 const u8 *payload; member in struct:asn1_hdr
|
eap_pax_common.h | 32 /* Followed by variable length payload and ICV */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_fast_common.c | 57 /* Encapsulate EAP packet in EAP-Payload TLV */ 58 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 187 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 191 "EAP-Payload TLV in the message");
|
eap_pax_common.h | 28 /* Followed by variable length payload and ICV */
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
ikev2.c | 374 * Key Exchange Payload: 386 wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload"); 501 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 507 "encrypted payload"); 529 wpa_printf(MSG_INFO, "IKEV2: Too short IDr payload"); 663 wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload"); 669 "Payload"); 695 u8 *payload, size_t payload_len) 701 if (ikev2_parse_payloads(&pl, next_payload, payload, payload [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
asn1.h | 53 const u8 *payload; member in struct:asn1_hdr
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 57 /* Encapsulate EAP packet in EAP-Payload TLV */ 58 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 187 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 191 "EAP-Payload TLV in the message");
|
eap_pax_common.h | 28 /* Followed by variable length payload and ICV */
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 375 * Key Exchange Payload: 387 wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload"); 502 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 508 "encrypted payload"); 530 wpa_printf(MSG_INFO, "IKEV2: Too short IDr payload"); 664 wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload"); 670 "Payload"); 696 u8 *payload, size_t payload_len) 702 if (ikev2_parse_payloads(&pl, next_payload, payload, payload [all...] |
/external/wpa_supplicant_8/src/tls/ |
asn1.h | 53 const u8 *payload; member in struct:asn1_hdr
|
/frameworks/base/core/java/android/util/ |
EventLog.java | 41 * They carry a payload of one or more int, long, or String values. The 42 * event-log-tags file defines the payload contents for each type code. 110 Log.wtf(TAG, "Illegal entry payload: tag=" + getTag(), e); 113 Log.wtf(TAG, "Truncated entry payload: tag=" + getTag(), e);
|
/libcore/luni/src/main/java/libcore/net/http/ |
UnknownLengthHttpInputStream.java | 25 * An HTTP payload terminated by the end of the socket stream.
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter/ |
nfnetlink_compat.h | 25 * bit to indicate whether the payload is nested */
|
/system/core/liblog/ |
logd_write.c | 249 int __android_log_bwrite(int32_t tag, const void *payload, size_t len) 255 vec[1].iov_base = (void*)payload; 266 int __android_log_btwrite(int32_t tag, char type, const void *payload, 275 vec[2].iov_base = (void*)payload;
|