/external/dropbear/ |
cli-kex.c | 78 keybloblen = buf_getint(ses.payload); 80 keyblob = buf_getptr(ses.payload, keybloblen); 86 if (buf_get_pub_key(ses.payload, hostkey, &type) != DROPBEAR_SUCCESS) { 91 if (buf_getmpint(ses.payload, &dh_f) != DROPBEAR_SUCCESS) { 102 if (buf_verify(ses.payload, hostkey, ses.hash, SHA1_HASH_SIZE)
|
common-channel.c | 168 * data packet (ses.payload must be positioned appropriately). 175 chan = buf_getint(ses.payload); 684 datalen = buf_getint(ses.payload); 698 * is payload data */ 705 buf_getptr(ses.payload, buflen), buflen); 707 buf_incrpos(ses.payload, buflen); 728 incr = buf_getint(ses.payload); 768 type = buf_getstring(ses.payload, &typelen); 770 remotechan = buf_getint(ses.payload); 771 transwindow = buf_getint(ses.payload); [all...] |
svr-authpasswd.c | 74 changepw = buf_getbool(ses.payload); 81 password = buf_getstring(ses.payload, &passwordlen);
|
/external/ipsec-tools/src/racoon/ |
security.c | 80 /* check SA payload size */ 87 bp = (caddr_t)(sab + 1); /* here bp points to first proposal payload */ 95 /* check the value of next payload */ 98 "Invalid payload type=%u\n", pa->type); 124 "Invalid payload type=%u\n", ta->type);
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
firewire-cdev.h | 82 * @length: Data length, i.e. the response's payload size in bytes 83 * @data: Payload data, if any 86 * sent by %FW_CDEV_IOC_SEND_REQUEST ioctl. The payload data for responses 105 * @length: Data length, i.e. the request's payload size in bytes 114 * The payload data for requests carrying data (write and lock requests) 218 * @length: Length of outgoing payload, in bytes 221 * @data: Userspace pointer to payload 225 * Both quadlet and block request specify the payload as a pointer to the data 242 * @length: Length of outgoing payload, in bytes 243 * @data: Userspace pointer to payload [all...] |
if_fddi.h | 38 #define FDDI_K_8022_DLEN 4475 /* Max octets in 802.2 payload */ 39 #define FDDI_K_SNAP_DLEN 4470 /* Max octets in 802.2 SNAP payload */
|
/development/tools/emulator/system/camera/ |
QemuClient.h | 60 * - 8 bytes encoding the payload size as a string containing hexadecimal 61 * representation of the payload size value. This is done in order to simplify 63 * - Payload, whose size is defined by the first chunk. 65 * Every payload always begins with two characters, encoding the result of the 69 * After that payload may have optional data. If payload has more data following 70 * the query result, there is a ':' character separating them. If payload carries 71 * only the result, it always ends with a zero-terminator. So, payload 'ok'/'ko' 253 * characters encoding the payload size in hexadecimal string, followed by
|
/dalvik/dx/src/com/android/dx/io/instructions/ |
InstructionCodec.java | 473 * payload target instructions. 758 PackedSwitchPayloadDecodedInstruction payload = local 760 int[] targets = payload.getTargets(); 763 out.write(payload.getOpcodeUnit()); 765 out.writeInt(payload.getFirstKey()); 794 SparseSwitchPayloadDecodedInstruction payload = local 796 int[] keys = payload.getKeys(); 797 int[] targets = payload.getTargets(); 800 out.write(payload.getOpcodeUnit()); 864 FillArrayDataPayloadDecodedInstruction payload local [all...] |
/external/libvpx/mkvparser/ |
mkvparser.cpp | 467 pos += len; //consume length of size of payload
472 pos += size; //consume size of payload
511 pos += len; //consume length of size of payload
531 pos += size_; //consume size of payload
570 pos += len; //consume length of size of payload
583 pos += size_; //consume size of payload
634 pos += size; //consume size of payload
669 pos += len; //consume length of size of payload
679 pos += size; //consume size of payload
813 //pos now designates start of payload
[all...] |
/external/webkit/Source/WebCore/manual-tests/inspector/ |
display-form-data.html | 18 Request Payload and/or Query String Parameter values. 23 <br>no Form Data, Request Payload or Query String Parameters 37 <br>no Form Data, Request Payload or Query String Parameters 46 <br>Request Payload: 3 lines of text data with a very long 2nd line which should wrap 49 <br>Request Payload: 3 lines of text data with a very long 2nd line which should wrap 52 <br>Request Payload: 3 lines of text data with a very long 2nd line of binary data which should wrap
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 150 const u8 *payload, 163 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 194 const u8 *payload, 213 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 294 const u8 *payload, 309 if (eap_sake_parse_attributes(payload, payload_len, &attr))
|
ikev2.c | 391 * Key Exchange Payload: 403 wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload"); 414 /* Reject message with Notify payload of type 507 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload"); 631 wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload"); 637 "Payload"); 663 u8 *payload, size_t payload_len) 669 if (ikev2_parse_payloads(&pl, next_payload, payload, payload + 789 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Version: 0x%x [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 310 const u8 *payload, size_t payloadlen) 324 const u8 *payload, size_t payloadlen) 334 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 387 const u8 *payload, size_t payloadlen) 397 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 422 const u8 *payload, size_t payloadlen)
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_cred.c | 293 pos = hdr.payload; 306 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); 313 os_memcpy(cred->dh_p, hdr.payload, hdr.length); 315 pos = hdr.payload + hdr.length; 328 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length); 335 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 151 const u8 *payload, 164 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 195 const u8 *payload, 214 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 295 const u8 *payload, 310 if (eap_sake_parse_attributes(payload, payload_len, &attr))
|
ikev2.c | 392 * Key Exchange Payload: 404 wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload"); 415 /* Reject message with Notify payload of type 508 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload"); 632 wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload"); 638 "Payload"); 664 u8 *payload, size_t payload_len) 670 if (ikev2_parse_payloads(&pl, next_payload, payload, payload + 790 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Version: 0x%x [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 311 const u8 *payload, size_t payloadlen) 325 const u8 *payload, size_t payloadlen) 335 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 388 const u8 *payload, size_t payloadlen) 398 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 423 const u8 *payload, size_t payloadlen)
|
/external/libnfc-nxp/src/ |
phFriNfc_NdefRecord.h | 74 #define PH_FRINFC_NDEFRECORD_TNF_EMPTY ((uint8_t)0x00) /**< Empty Record, no type, ID or payload present. */ 96 #define PH_FRINFC_NDEFRECORD_FLAGS_SR ((uint8_t)0x10) /**< Short Record: Payload Length is encoded in ONE byte only. */ 114 #define PH_FRINFC_NDEFRECORD_BUF_TNF_VALUE ((uint8_t)0x00) /** \internal If TNF = Empty, Unknown and Unchanged, the id, type and payload length is ZERO */ 210 * The length of the Payload, in bytes. The maximum length is 2^32 - 1. 220 * Payload Data, pointer to a buffer containing the payload data. 222 * \li \b Extraction: The pointer is set to the beginning of the payload. 280 *<br>10.TNF bits are set to 0x00 (Empty), but Payload Length is not equal to zero. 344 *<br>3. TNF bits are set to 0x00 (Empty),but Payload Length is not equal to 0. 473 * Type Length, Payload Length and ID Length for the respective Type, Payload and ID Data [all...] |
phHciNfc_AdminMgmt.c | 743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */ 744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id; 745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id; 746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id; 773 hcp_message->payload[i++] = pipe_id ; [all...] |
/external/antlr/src/org/antlr/runtime/debug/ |
ParseTreeBuilder.java | 60 public ParseTree create(Object payload) { 61 return new ParseTree(payload);
|
/external/wpa_supplicant/ |
eap_sake.c | 125 static u8 * eap_sake_build_msg(struct eap_sake_data *data, u8 **payload, 148 *payload = (u8 *) (req + 1); 158 const u8 *payload, size_t payload_len, 172 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 205 const u8 *payload, size_t payload_len, 223 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 306 const u8 *payload, size_t payload_len, 321 if (eap_sake_parse_attributes(payload, payload_len, &attr))
|
tlsv1_common.c | 286 * beginning for record layer to fill in; payload filled in after this and 289 * @payload_len: Length of the payload 299 u8 *pos, *ct_start, *length, *payload; local 316 payload = pos; 347 size_t len = pos - payload; 361 if (crypto_cipher_encrypt(rl->write_cbc, payload, 362 payload, pos - payload) < 0)
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
IccFileHandler.java | 312 sendResult(response, result.payload, ar.exception); 322 sendResult(response, result.payload, ar.exception); 342 data = result.payload; 375 data = result.payload; 421 data = result.payload; 462 sendResult(response, result.payload, null); 464 lc.results.add(result.payload); 498 sendResult(response, result.payload, null);
|
/hardware/libhardware/include/hardware/ |
qemud.h | 122 D("can4t write qemud frame payload: %s", strerror(errno)); 147 D("can't read qemud frame payload: %s", strerror(errno));
|
/system/core/adb/ |
protocol.txt | 28 header followed (optionally) by a payload. The header consists of 6 35 unsigned data_length; /* length of payload (0 is allowed) */ 36 unsigned data_crc32; /* crc32 of data payload */ 40 Receipt of an invalid message header, corrupt message payload, or an 46 detail. Their format is COMMAND(arg0, arg1, payload) where the payload 82 destination in the message payload. The local-id may not be zero. 121 remote-id. The payload MUST be <= maxdata in length.
|