HomeSort by relevance Sort by last modified time
    Searched full:payload (Results 176 - 200 of 776) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/dropbear/
cli-kex.c 78 keybloblen = buf_getint(ses.payload);
80 keyblob = buf_getptr(ses.payload, keybloblen);
86 if (buf_get_pub_key(ses.payload, hostkey, &type) != DROPBEAR_SUCCESS) {
91 if (buf_getmpint(ses.payload, &dh_f) != DROPBEAR_SUCCESS) {
102 if (buf_verify(ses.payload, hostkey, ses.hash, SHA1_HASH_SIZE)
common-channel.c 168 * data packet (ses.payload must be positioned appropriately).
175 chan = buf_getint(ses.payload);
684 datalen = buf_getint(ses.payload);
698 * is payload data */
705 buf_getptr(ses.payload, buflen), buflen);
707 buf_incrpos(ses.payload, buflen);
728 incr = buf_getint(ses.payload);
768 type = buf_getstring(ses.payload, &typelen);
770 remotechan = buf_getint(ses.payload);
771 transwindow = buf_getint(ses.payload);
    [all...]
svr-authpasswd.c 74 changepw = buf_getbool(ses.payload);
81 password = buf_getstring(ses.payload, &passwordlen);
  /external/ipsec-tools/src/racoon/
security.c 80 /* check SA payload size */
87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */
95 /* check the value of next payload */
98 "Invalid payload type=%u\n", pa->type);
124 "Invalid payload type=%u\n", ta->type);
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
firewire-cdev.h 82 * @length: Data length, i.e. the response's payload size in bytes
83 * @data: Payload data, if any
86 * sent by %FW_CDEV_IOC_SEND_REQUEST ioctl. The payload data for responses
105 * @length: Data length, i.e. the request's payload size in bytes
114 * The payload data for requests carrying data (write and lock requests)
218 * @length: Length of outgoing payload, in bytes
221 * @data: Userspace pointer to payload
225 * Both quadlet and block request specify the payload as a pointer to the data
242 * @length: Length of outgoing payload, in bytes
243 * @data: Userspace pointer to payload
    [all...]
if_fddi.h 38 #define FDDI_K_8022_DLEN 4475 /* Max octets in 802.2 payload */
39 #define FDDI_K_SNAP_DLEN 4470 /* Max octets in 802.2 SNAP payload */
  /development/tools/emulator/system/camera/
QemuClient.h 60 * - 8 bytes encoding the payload size as a string containing hexadecimal
61 * representation of the payload size value. This is done in order to simplify
63 * - Payload, whose size is defined by the first chunk.
65 * Every payload always begins with two characters, encoding the result of the
69 * After that payload may have optional data. If payload has more data following
70 * the query result, there is a ':' character separating them. If payload carries
71 * only the result, it always ends with a zero-terminator. So, payload 'ok'/'ko'
253 * characters encoding the payload size in hexadecimal string, followed by
  /dalvik/dx/src/com/android/dx/io/instructions/
InstructionCodec.java 473 * payload target instructions.
758 PackedSwitchPayloadDecodedInstruction payload = local
760 int[] targets = payload.getTargets();
763 out.write(payload.getOpcodeUnit());
765 out.writeInt(payload.getFirstKey());
794 SparseSwitchPayloadDecodedInstruction payload = local
796 int[] keys = payload.getKeys();
797 int[] targets = payload.getTargets();
800 out.write(payload.getOpcodeUnit());
864 FillArrayDataPayloadDecodedInstruction payload local
    [all...]
  /external/libvpx/mkvparser/
mkvparser.cpp 467 pos += len; //consume length of size of payload
472 pos += size; //consume size of payload
511 pos += len; //consume length of size of payload
531 pos += size_; //consume size of payload
570 pos += len; //consume length of size of payload
583 pos += size_; //consume size of payload
634 pos += size; //consume size of payload
669 pos += len; //consume length of size of payload
679 pos += size; //consume size of payload
813 //pos now designates start of payload
    [all...]
  /external/webkit/Source/WebCore/manual-tests/inspector/
display-form-data.html 18 Request Payload and/or Query String Parameter values.
23 <br>no Form Data, Request Payload or Query String Parameters
37 <br>no Form Data, Request Payload or Query String Parameters
46 <br>Request Payload: 3 lines of text data with a very long 2nd line which should wrap
49 <br>Request Payload: 3 lines of text data with a very long 2nd line which should wrap
52 <br>Request Payload: 3 lines of text data with a very long 2nd line of binary data which should wrap
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 150 const u8 *payload,
163 if (eap_sake_parse_attributes(payload, payload_len, &attr))
194 const u8 *payload,
213 if (eap_sake_parse_attributes(payload, payload_len, &attr))
294 const u8 *payload,
309 if (eap_sake_parse_attributes(payload, payload_len, &attr))
ikev2.c 391 * Key Exchange Payload:
403 wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload");
414 /* Reject message with Notify payload of type
507 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload");
631 wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload");
637 "Payload");
663 u8 *payload, size_t payload_len)
669 if (ikev2_parse_payloads(&pl, next_payload, payload, payload +
789 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Version: 0x%x
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 310 const u8 *payload, size_t payloadlen)
324 const u8 *payload, size_t payloadlen)
334 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
387 const u8 *payload, size_t payloadlen)
397 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
422 const u8 *payload, size_t payloadlen)
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_cred.c 293 pos = hdr.payload;
306 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length);
313 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
315 pos = hdr.payload + hdr.length;
328 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length);
335 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 151 const u8 *payload,
164 if (eap_sake_parse_attributes(payload, payload_len, &attr))
195 const u8 *payload,
214 if (eap_sake_parse_attributes(payload, payload_len, &attr))
295 const u8 *payload,
310 if (eap_sake_parse_attributes(payload, payload_len, &attr))
ikev2.c 392 * Key Exchange Payload:
404 wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload");
415 /* Reject message with Notify payload of type
508 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload");
632 wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload");
638 "Payload");
664 u8 *payload, size_t payload_len)
670 if (ikev2_parse_payloads(&pl, next_payload, payload, payload +
790 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Version: 0x%x
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 311 const u8 *payload, size_t payloadlen)
325 const u8 *payload, size_t payloadlen)
335 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
388 const u8 *payload, size_t payloadlen)
398 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
423 const u8 *payload, size_t payloadlen)
  /external/libnfc-nxp/src/
phFriNfc_NdefRecord.h 74 #define PH_FRINFC_NDEFRECORD_TNF_EMPTY ((uint8_t)0x00) /**< Empty Record, no type, ID or payload present. */
96 #define PH_FRINFC_NDEFRECORD_FLAGS_SR ((uint8_t)0x10) /**< Short Record: Payload Length is encoded in ONE byte only. */
114 #define PH_FRINFC_NDEFRECORD_BUF_TNF_VALUE ((uint8_t)0x00) /** \internal If TNF = Empty, Unknown and Unchanged, the id, type and payload length is ZERO */
210 * The length of the Payload, in bytes. The maximum length is 2^32 - 1.
220 * Payload Data, pointer to a buffer containing the payload data.
222 * \li \b Extraction: The pointer is set to the beginning of the payload.
280 *<br>10.TNF bits are set to 0x00 (Empty), but Payload Length is not equal to zero.
344 *<br>3. TNF bits are set to 0x00 (Empty),but Payload Length is not equal to 0.
473 * Type Length, Payload Length and ID Length for the respective Type, Payload and ID Data
    [all...]
phHciNfc_AdminMgmt.c 743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */
744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id;
745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id;
746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id;
773 hcp_message->payload[i++] = pipe_id ;
    [all...]
  /external/antlr/src/org/antlr/runtime/debug/
ParseTreeBuilder.java 60 public ParseTree create(Object payload) {
61 return new ParseTree(payload);
  /external/wpa_supplicant/
eap_sake.c 125 static u8 * eap_sake_build_msg(struct eap_sake_data *data, u8 **payload,
148 *payload = (u8 *) (req + 1);
158 const u8 *payload, size_t payload_len,
172 if (eap_sake_parse_attributes(payload, payload_len, &attr))
205 const u8 *payload, size_t payload_len,
223 if (eap_sake_parse_attributes(payload, payload_len, &attr))
306 const u8 *payload, size_t payload_len,
321 if (eap_sake_parse_attributes(payload, payload_len, &attr))
tlsv1_common.c 286 * beginning for record layer to fill in; payload filled in after this and
289 * @payload_len: Length of the payload
299 u8 *pos, *ct_start, *length, *payload; local
316 payload = pos;
347 size_t len = pos - payload;
361 if (crypto_cipher_encrypt(rl->write_cbc, payload,
362 payload, pos - payload) < 0)
  /frameworks/base/telephony/java/com/android/internal/telephony/
IccFileHandler.java 312 sendResult(response, result.payload, ar.exception);
322 sendResult(response, result.payload, ar.exception);
342 data = result.payload;
375 data = result.payload;
421 data = result.payload;
462 sendResult(response, result.payload, null);
464 lc.results.add(result.payload);
498 sendResult(response, result.payload, null);
  /hardware/libhardware/include/hardware/
qemud.h 122 D("can4t write qemud frame payload: %s", strerror(errno));
147 D("can't read qemud frame payload: %s", strerror(errno));
  /system/core/adb/
protocol.txt 28 header followed (optionally) by a payload. The header consists of 6
35 unsigned data_length; /* length of payload (0 is allowed) */
36 unsigned data_crc32; /* crc32 of data payload */
40 Receipt of an invalid message header, corrupt message payload, or an
46 detail. Their format is COMMAND(arg0, arg1, payload) where the payload
82 destination in the message payload. The local-id may not be zero.
121 remote-id. The payload MUST be <= maxdata in length.

Completed in 1074 milliseconds

1 2 3 4 5 6 78 91011>>