/external/wpa_supplicant_8/src/wps/ |
ndef.c | 28 u32 payload_length; member in struct:ndef_record 45 record->payload_length = *pos++; 49 record->payload_length = ntohl(*(u32 *)pos); 66 record->payload = record->payload_length == 0 ? NULL : pos; 67 pos += record->payload_length; 90 record.payload_length); 108 size_t payload_length = wpabuf_len(payload); local 110 short_record = payload_length < 256 ? 1 : 0; 117 total_len += type_length + id_length + payload_length; 135 wpabuf_put_u8(record, payload_length); [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
TransportConnection.java | 222 int payload_length = packet_length - padding_length - 1; local 224 if (payload_length < 0) 227 return payload_length; 248 int payload_length = packet_length - padding_length - 1; local 250 if (payload_length < 0) 253 if (payload_length >= len) 254 throw new IOException("Receive buffer too small (" + len + ", need " + payload_length + ")"); 256 cis.read(buffer, off, payload_length); 265 recv_mac.update(buffer, off, payload_length); 280 log.debug("Received " + Packets.getMessageName(buffer[off] & 0xff) + " " + payload_length [all...] |
/external/webkit/Source/WebKit/android/wds/client/ |
AdbConnection.cpp | 76 #define PAYLOAD_LENGTH 4 95 char payloadLen[PAYLOAD_LENGTH + 1]; 99 if (send(m_fd, payloadLen, PAYLOAD_LENGTH, 0) < 0) { 116 char lenStr[PAYLOAD_LENGTH + 1]; 118 ALOG_ASSERT(payloadLen == PAYLOAD_LENGTH, "Incorrect payload size"); 119 lenStr[PAYLOAD_LENGTH] = 0; 192 char lenStr[PAYLOAD_LENGTH + 1]; 198 lenStr[PAYLOAD_LENGTH] = 0;
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
_stream_hybi.py | 102 def create_header(opcode, payload_length, fin, rsv1, rsv2, rsv3, mask): 112 if payload_length < 0 or (1 << 63) <= payload_length: 113 raise ValueError('payload_length out of range') 124 header += create_length_header(payload_length, mask) 203 payload_length = second_byte & 0x7f 207 'Mask=%s, Payload_length=%s', 208 fin, rsv1, rsv2, rsv3, opcode, mask, payload_length) 220 if payload_length == 127: 225 payload_length = struct.unpack [all...] |
mux.py | 680 payload_length = len(payload) 691 while write_position < payload_length: 700 remaining = payload_length - write_position 704 (write_position + write_length == payload_length)) [all...] |
/external/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 75 size_t payload_length; member in struct:__anon12618 98 key->payload_length = NO_PAYLOAD_LENGTH; 127 size_t plen = key->payload_length; 215 key->payload_length = NO_PAYLOAD_LENGTH; 264 key->payload_length=len;
|
e_aes_cbc_hmac_sha1.c | 79 size_t payload_length; /* AAD length in decrypt case */ member in struct:__anon12607 133 key->payload_length = NO_PAYLOAD_LENGTH; 184 size_t plen = key->payload_length, 194 key->payload_length = NO_PAYLOAD_LENGTH; 495 key->payload_length = len; 511 key->payload_length = arg;
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/test/ |
client_for_testing.py | 240 payload_length = second_byte & 0x7f 246 if payload_length == 127: 248 payload_length = struct.unpack( 250 if payload_length > 0x7FFFFFFFFFFFFFFF: 252 elif payload_length == 126: 254 payload_length = struct.unpack( 257 return fin, rsv1, rsv2, rsv3, opcode, payload_length 809 payload_length = len(payload) 810 if payload_length <= 125: 811 header += chr(mask_bit | payload_length) [all...] |
test_stream.py | 67 # Too long payload_length
|
mux_client_for_testing.py | 295 fin, rsv1, rsv2, rsv3, opcode, payload_length = ( 319 self._mux._socket, payload_length)
|
/external/chromium/chrome/browser/sync/engine/net/ |
syncapi_server_connection_manager.cc | 61 response->payload_length =
|
server_connection_manager.h | 92 int64 payload_length; member in struct:browser_sync::HttpResponse 103 payload_length(kUnsetPayloadLength),
|
/external/chromium/net/spdy/ |
spdy_framer.cc | 1238 int payload_length; local 1429 int payload_length; local 1497 int payload_length; local [all...] |
spdy_framer.h | 421 bool GetFrameBoundaries(const SpdyFrame& frame, int* payload_length,
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 940 WPA_PUT_BE16(phdr->payload_length, plen); 977 WPA_PUT_BE16(phdr->payload_length, plen); 996 WPA_PUT_BE16(phdr->payload_length, plen); 1022 WPA_PUT_BE16(phdr->payload_length, plen); 1062 WPA_PUT_BE16(phdr->payload_length, plen); 1114 WPA_PUT_BE16(phdr->payload_length, plen); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 958 WPA_PUT_BE16(phdr->payload_length, plen); 996 WPA_PUT_BE16(phdr->payload_length, plen); 1015 WPA_PUT_BE16(phdr->payload_length, plen); 1041 WPA_PUT_BE16(phdr->payload_length, plen); 1081 WPA_PUT_BE16(phdr->payload_length, plen);
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 40 u8 payload_length[2]; /* this payload, including the payload header */ member in struct:ikev2_payload_hdr
|
ikev2_common.c | 329 plen = WPA_GET_BE16(phdr->payload_length); 658 WPA_PUT_BE16(phdr->payload_length, plen);
|