/external/tcpdump/tests/ |
beep-oobr.out | 2 IP6 3030:3030:3030:3030:3030:3030:3030:3030.10288 > 3030:3030:3030:3030:3030:3030:3030:3030.12336: Flags [.U], seq 808464432:808476740, ack 808464432, win 12336, urg 12336, options [eol], length 12308 BEEP (payload or undecoded)
|
cve-2014-8768-Geonet.out | 1 GeoNet src:07:07:07:07:07:07; v:12 NH:6-Unknown HT:5-1-TopoScopeBcast-MH HopLim:7 Payload:1799 GN_ADDR:ef:06:07:35:97:00:24:8c lat:4521984 lon:1039368000 Malformed (small)
|
cve2015-0261-crash.out | 1 IP6 (class 0x03, flowlabel 0x03030, hlim 48, next-header Options (0) payload length: 12336) 3030:3030:3030:3030:3030:3030:3030:3030 > 130:3030:3030:3030:3030:3030:3030:3030: HBH [trunc] (header length 8 is too small for type 1)[|MOBILITY]
|
ip6_frag_asan.out | 1 IP6 (class 0x51, flowlabel 0xb2100, hlim 16, next-header Fragment (44) payload length: 27136) 452:22:19:0:41a:e4ff:10ff:484d > 2243:80:1400:100:19:ffff:ffff:fffb: [|frag]
|
ipv6hdr-heapoverflow-v.out | 1 IP6 (class 0x33, flowlabel 0x03030, hlim 48, next-header Options (0) payload length: 12336) 3030:3030:3030:3030:3030:3030:3030:3030 > 3030:3030:3030:3030:3030:3030:3030:3030: HBH [trunc] [|HBH]
|
mobility_opt_asan_2.out | 1 IP6 (class 0x50, flowlabel 0x0002c, hlim 0, next-header Mobile IP (old) (62) payload length: 7168) ff:7f0f:40:0:ee00:0:b658:5203 > 205:20:1:b00:0:2200:af01:e000: mobility: BRR(type-0x06: len=0)[|MOBILITY]
|
mobility_opt_asan_5.out | 1 IP6 (class 0x50, flowlabel 0x0002c, hlim 0, next-header Mobile IP (old) (62) payload length: 7168) ff:7f0f:40:0:ee00:0:b658:5203 > 205:20:1:b00:0:2200:af01:e000: mobility: BRR(type-0x06: len=0)[|MOBILITY]
|
olsr-oobr-2.out | 3 IP6 (flowlabel 0x06400, hlim 0, next-header UDP (17) payload length: 5401) 0:24::1e:a0a:141e.698 > 38fd:7f49:eaff:ffff:2025:7373:7562:2573.2: OLSRv6, seq 0x0201, length 5393[|olsr]
|
ospf6_decode_v3_asan.out | 1 IP6 (class 0x76, flowlabel 0xf6701, hlim 109, next-header OSPF (89) payload length: 30311) 6767:6780:6767:a102:4:b6:5853:f040 > 1000:a32:8847:1::116: OSPFv3, Hello, length 30311
|
pim_header_asan.out | 1 IP6 (class 0x76, flowlabel 0xf6767, hlim 109, next-header PIM (103) payload length: 30311) 6767:6767:6767:8267:6767:6765:6767:6767 > 6700:80:74:24:2424:2424:2424:2509: PIMv2, length 30311
|
dccp_partial_csum_v6_simple.out | 1 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::1.52921 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0xef1a (correct)) DCCP-Request (service=0) seq 1337846929 <change_l ack_ratio 2, change_r ccid 2, change_l ccid 2> 2 IP6 (hlim 64, next-header DCCP (33) payload length: 48) 3ffe::2.5001 > 3ffe::1.52921: DCCP (CCVal 0, CsCov 0, cksum 0x0b73 (correct)) DCCP-Response (service=0) (ack=1337846929) seq 1385331168 <nop, nop, change_l ack_ratio 2, confirm_r ccid 2 2, confirm_l ccid 2 2, confirm_r ack_ratio 2> 3 IP6 (hlim 64, next-header DCCP (33) payload length: 36) 3ffe::1.52921 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0x5062 (correct)) DCCP-Ack (ack=1385331168) seq 1337846930 <nop, confirm_r ack_ratio 2, ack_vector0 0x00, elapsed_time 1> 4 IP6 (hlim 64, next-header DCCP (33) payload length: 48) 3ffe::1.52921 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 1, cksum 0x8792 (correct)) DCCP-DataAck (ack=1385331168) seq 1337846931 <nop, nop, ack_vector0 0x00, elapsed_time 49357, ndp_count 1> 5 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::2.5001 > 3ffe::1.52921: DCCP (CCVal 0, CsCov 0, cksum 0x578b (correct)) DCCP-Ack (ack=1337846931) seq 1385331169 <nop, ack_vector0 0x01, elapsed_time 1> 6 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::1.52921 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0x61e0 (correct)) DCCP-Close (ack=1385331169) seq 1337846932 <nop, ack_vector0 0x00, elapsed_time 61355> 7 IP6 (hlim 64, next-header DCCP (33) payload length: 40) 3ffe::2.5001 > 3ffe::1.52921: DCCP (CCVal 0, CsCov 0, cksum 0x4b59 (correct)) DCCP-Reset (code=closed) (ack=1337846932) seq 1385331170 <nop, nop, ack_vector0 0x00, elapsed_time 2, ndp_count 1>
|
babel_rtt.out | 1 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14) 3 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 52) fe80::5054:ff:fe23:4567.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (40) 6 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 52) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (40) 9 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14) 11 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe23:4567.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14) 13 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe23:4567.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14) 15 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14) 17 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 52) fe80::5054:ff:fe23:4567.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (40) 20 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 88) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (76)
|
/external/vboot_reference/scripts/image_signing/ |
insert_au_publickey.sh | 7 # Install an update payload verification public key to the image. 28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem" 29 sudo chown root:root "$rootfs/$key_location/update-payload-key.pub.pem" 30 sudo chmod 644 "$rootfs/$key_location/update-payload-key.pub.pem"
|
/frameworks/base/tools/aapt/tests/ |
MockFileFinder.h | 39 const KeyedVector<String8,time_t>* payload(&mFiles.valueFor(basePath)); 42 for (size_t i = 0; i < payload->size(); ++i) { 43 fileStore.add(payload->keyAt(i),payload->valueAt(i));
|
/system/core/trusty/gatekeeper/ |
gatekeeper_ipc.h | 32 * @cmd: the command, one of ENROLL, VERIFY. Payload must be a serialized 34 * @payload: start of the serialized command specific payload 38 uint8_t payload[0]; member in struct:gatekeeper_message
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
ByteBufferReader.java | 39 * @param payload The buffer to read from 46 public static long readInteger(ByteBuffer payload, ByteOrder byteOrder, int size) { 53 payload.get(octets); 72 * @param payload The buffer to read from 79 public static String readString(ByteBuffer payload, int length, Charset charset) { 81 payload.get(octets); 89 * @param payload The buffer to read from 94 public static String readStringWithByteLength(ByteBuffer payload, Charset charset) { 95 int length = payload.get() & 0xFF; 96 return readString(payload, length, charset) [all...] |
/external/webrtc/talk/app/webrtc/ |
sctputils.h | 43 bool IsOpenMessage(const rtc::Buffer& payload); 45 bool ParseDataChannelOpenMessage(const rtc::Buffer& payload, 49 bool ParseDataChannelOpenAckMessage(const rtc::Buffer& payload); 53 rtc::Buffer* payload); 55 void WriteDataChannelOpenAckMessage(rtc::Buffer* payload);
|
/external/webrtc/webrtc/modules/rtp_rtcp/source/ |
rtp_format.h | 35 // Get the next payload with payload header. 41 // Returns true on success or false if there was no payload to packetize. 56 const uint8_t* payload; member in struct:webrtc::RtpDepacketizer::ParsedPayload 66 // Parses the RTP payload, parsed result will be saved in |parsed_payload|.
|
rtp_receiver_impl.cc | 25 using RtpUtility::Payload; 105 // payload or not. 113 LOG(LS_ERROR) << "Failed to register payload: " << payload_name << "/" 162 const uint8_t* payload, 169 int8_t first_payload_byte = payload_length > 0 ? payload[0] : 0; 178 LOG(LS_WARNING) << "Receiving invalid payload type."; 202 &webrtc_rtp_header, payload_specific, is_red, payload, payload_length, 278 const Payload* payload = rtp_payload_registry_->PayloadTypeToPayload( local 280 if (!payload) { 366 const Payload* payload = local [all...] |
/packages/apps/Settings/tests/robotests/src/com/android/settings/search/ |
ResultPayloadUtilsTest.java | 37 private ResultPayload payload; field in class:ResultPayloadUtilsTest 43 payload = new ResultPayload(intent); 59 byte[] marshalledPayload = ResultPayloadUtils.marshall(payload); 66 byte[] marshalledPayload = ResultPayloadUtils.marshall(payload); 70 String originalIntentExtra = payload.getIntent().getStringExtra(EXTRA_KEY);
|
/system/bt/packet/tests/ |
packet_test_helper.h | 44 std::vector<uint8_t> payload) { 45 size_t end = payload.size(); 46 return Make(std::move(payload), 0, end); 50 std::vector<uint8_t> payload, size_t start, size_t end) { 55 pkt->data_ = std::make_shared<std::vector<uint8_t>>(std::move(payload));
|
/external/syslinux/gpxe/src/core/ |
gdbstub.c | 36 SIZEOF_PAYLOAD = 256, /* buffer size of GDB payload data */ 49 /* Buffer for payload data when parsing a packet. Once the 51 * the reply payload. */ 52 char buf [ SIZEOF_PAYLOAD + 4 ]; /* $...PAYLOAD...#XX */ 53 char *payload; /* start of payload */ member in struct:gdbstub 54 int len; /* length of payload */ 139 uint8_t cksum = gdbstub_cksum ( stub->payload, stub->len ); 150 stub->payload [ 0 ] = 'O'; 151 stub->payload [ 1 ] = 'K' [all...] |
/system/netd/server/ |
WakeupController.cpp | 53 static void extractIpPorts(WakeupController::ReportArgs& args, Slice payload) { 57 if (extract(payload, header) < sizeof(struct tcphdr)) { 66 if (extract(payload, header) < sizeof(struct udphdr)) { 78 static void extractIpHeader(WakeupController::ReportArgs& args, Slice payload) { 82 if (extract(payload, header) < sizeof(struct iphdr)) { 91 extractIpPorts(args, drop(payload, header.ihl * 4)); // ipv4 IHL counts 32 bit words. 96 if (extract(payload, header) < sizeof(struct ip6_hdr)) { 107 extractIpPorts(args, drop(payload, sizeof(header))); 135 const auto attrHandler = [&args, &parseAgain](const nlattr attr, const Slice payload) { 139 extract(payload, ts) [all...] |
/device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/ |
Payload.c | 23 // The Constant String of "Key Pad for IKEv2" for Authentication Payload generation.
32 Generate Ikev2 SA payload according to SessionSaData
34 @param[in] SessionSaData The data used in SA payload.
35 @param[in] NextPayload The payload type presented in NextPayload field of
36 SA Payload header.
40 @retval a Pointer to SA IKE payload.
90 Generate a Nonce payload containing the input parameter NonceBuf.
92 @param[in] NonceBuf The nonce buffer contains the whole Nonce payload block
93 except the payload header.
95 @param[in] NextPayload The payload type presented in the NextPayload field [all...] |
/external/webrtc/webrtc/modules/audio_conference_mixer/source/ |
memory_pool_win.h | 41 // Atomic single linked list payload. 42 MemoryPoolItemPayload<MemoryType>* payload; member in struct:webrtc::MemoryPoolItem 110 memory = &((MemoryPoolItem<MemoryType>*)pListEntry)->payload->memoryType; 131 delete item->payload; 137 delete item->payload; 167 delete item->payload; 187 returnValue->payload = new MemoryPoolItemPayload<MemoryType>(); 188 if(returnValue->payload == NULL) 193 returnValue->payload->base = returnValue;
|