HomeSort by relevance Sort by last modified time
    Searched full:payload (Results 101 - 125 of 3898) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/tcpdump/tests/
beep-oobr.out 2 IP6 3030:3030:3030:3030:3030:3030:3030:3030.10288 > 3030:3030:3030:3030:3030:3030:3030:3030.12336: Flags [.U], seq 808464432:808476740, ack 808464432, win 12336, urg 12336, options [eol], length 12308 BEEP (payload or undecoded)
cve-2014-8768-Geonet.out 1 GeoNet src:07:07:07:07:07:07; v:12 NH:6-Unknown HT:5-1-TopoScopeBcast-MH HopLim:7 Payload:1799 GN_ADDR:ef:06:07:35:97:00:24:8c lat:4521984 lon:1039368000 Malformed (small)
cve2015-0261-crash.out 1 IP6 (class 0x03, flowlabel 0x03030, hlim 48, next-header Options (0) payload length: 12336) 3030:3030:3030:3030:3030:3030:3030:3030 > 130:3030:3030:3030:3030:3030:3030:3030: HBH [trunc] (header length 8 is too small for type 1)[|MOBILITY]
ip6_frag_asan.out 1 IP6 (class 0x51, flowlabel 0xb2100, hlim 16, next-header Fragment (44) payload length: 27136) 452:22:19:0:41a:e4ff:10ff:484d > 2243:80:1400:100:19:ffff:ffff:fffb: [|frag]
ipv6hdr-heapoverflow-v.out 1 IP6 (class 0x33, flowlabel 0x03030, hlim 48, next-header Options (0) payload length: 12336) 3030:3030:3030:3030:3030:3030:3030:3030 > 3030:3030:3030:3030:3030:3030:3030:3030: HBH [trunc] [|HBH]
mobility_opt_asan_2.out 1 IP6 (class 0x50, flowlabel 0x0002c, hlim 0, next-header Mobile IP (old) (62) payload length: 7168) ff:7f0f:40:0:ee00:0:b658:5203 > 205:20:1:b00:0:2200:af01:e000: mobility: BRR(type-0x06: len=0)[|MOBILITY]
mobility_opt_asan_5.out 1 IP6 (class 0x50, flowlabel 0x0002c, hlim 0, next-header Mobile IP (old) (62) payload length: 7168) ff:7f0f:40:0:ee00:0:b658:5203 > 205:20:1:b00:0:2200:af01:e000: mobility: BRR(type-0x06: len=0)[|MOBILITY]
olsr-oobr-2.out 3 IP6 (flowlabel 0x06400, hlim 0, next-header UDP (17) payload length: 5401) 0:24::1e:a0a:141e.698 > 38fd:7f49:eaff:ffff:2025:7373:7562:2573.2: OLSRv6, seq 0x0201, length 5393[|olsr]
ospf6_decode_v3_asan.out 1 IP6 (class 0x76, flowlabel 0xf6701, hlim 109, next-header OSPF (89) payload length: 30311) 6767:6780:6767:a102:4:b6:5853:f040 > 1000:a32:8847:1::116: OSPFv3, Hello, length 30311
pim_header_asan.out 1 IP6 (class 0x76, flowlabel 0xf6767, hlim 109, next-header PIM (103) payload length: 30311) 6767:6767:6767:8267:6767:6765:6767:6767 > 6700:80:74:24:2424:2424:2424:2509: PIMv2, length 30311
dccp_partial_csum_v6_simple.out 1 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::1.52921 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0xef1a (correct)) DCCP-Request (service=0) seq 1337846929 <change_l ack_ratio 2, change_r ccid 2, change_l ccid 2>
2 IP6 (hlim 64, next-header DCCP (33) payload length: 48) 3ffe::2.5001 > 3ffe::1.52921: DCCP (CCVal 0, CsCov 0, cksum 0x0b73 (correct)) DCCP-Response (service=0) (ack=1337846929) seq 1385331168 <nop, nop, change_l ack_ratio 2, confirm_r ccid 2 2, confirm_l ccid 2 2, confirm_r ack_ratio 2>
3 IP6 (hlim 64, next-header DCCP (33) payload length: 36) 3ffe::1.52921 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0x5062 (correct)) DCCP-Ack (ack=1385331168) seq 1337846930 <nop, confirm_r ack_ratio 2, ack_vector0 0x00, elapsed_time 1>
4 IP6 (hlim 64, next-header DCCP (33) payload length: 48) 3ffe::1.52921 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 1, cksum 0x8792 (correct)) DCCP-DataAck (ack=1385331168) seq 1337846931 <nop, nop, ack_vector0 0x00, elapsed_time 49357, ndp_count 1>
5 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::2.5001 > 3ffe::1.52921: DCCP (CCVal 0, CsCov 0, cksum 0x578b (correct)) DCCP-Ack (ack=1337846931) seq 1385331169 <nop, ack_vector0 0x01, elapsed_time 1>
6 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::1.52921 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0x61e0 (correct)) DCCP-Close (ack=1385331169) seq 1337846932 <nop, ack_vector0 0x00, elapsed_time 61355>
7 IP6 (hlim 64, next-header DCCP (33) payload length: 40) 3ffe::2.5001 > 3ffe::1.52921: DCCP (CCVal 0, CsCov 0, cksum 0x4b59 (correct)) DCCP-Reset (code=closed) (ack=1337846932) seq 1385331170 <nop, nop, ack_vector0 0x00, elapsed_time 2, ndp_count 1>
babel_rtt.out 1 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14)
3 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 52) fe80::5054:ff:fe23:4567.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (40)
6 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 52) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (40)
9 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14)
11 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe23:4567.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14)
13 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe23:4567.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14)
15 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 26) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (14)
17 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 52) fe80::5054:ff:fe23:4567.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (40)
20 IP6 (class 0xc0, hlim 1, next-header UDP (17) payload length: 88) fe80::5054:ff:fe85:5da9.6696 > ff02::1:6.6696: [udp sum ok] babel 2 (76)
  /external/vboot_reference/scripts/image_signing/
insert_au_publickey.sh 7 # Install an update payload verification public key to the image.
28 sudo cp "$pub_key" "$rootfs/$key_location/update-payload-key.pub.pem"
29 sudo chown root:root "$rootfs/$key_location/update-payload-key.pub.pem"
30 sudo chmod 644 "$rootfs/$key_location/update-payload-key.pub.pem"
  /frameworks/base/tools/aapt/tests/
MockFileFinder.h 39 const KeyedVector<String8,time_t>* payload(&mFiles.valueFor(basePath));
42 for (size_t i = 0; i < payload->size(); ++i) {
43 fileStore.add(payload->keyAt(i),payload->valueAt(i));
  /system/core/trusty/gatekeeper/
gatekeeper_ipc.h 32 * @cmd: the command, one of ENROLL, VERIFY. Payload must be a serialized
34 * @payload: start of the serialized command specific payload
38 uint8_t payload[0]; member in struct:gatekeeper_message
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/
ByteBufferReader.java 39 * @param payload The buffer to read from
46 public static long readInteger(ByteBuffer payload, ByteOrder byteOrder, int size) {
53 payload.get(octets);
72 * @param payload The buffer to read from
79 public static String readString(ByteBuffer payload, int length, Charset charset) {
81 payload.get(octets);
89 * @param payload The buffer to read from
94 public static String readStringWithByteLength(ByteBuffer payload, Charset charset) {
95 int length = payload.get() & 0xFF;
96 return readString(payload, length, charset)
    [all...]
  /external/webrtc/talk/app/webrtc/
sctputils.h 43 bool IsOpenMessage(const rtc::Buffer& payload);
45 bool ParseDataChannelOpenMessage(const rtc::Buffer& payload,
49 bool ParseDataChannelOpenAckMessage(const rtc::Buffer& payload);
53 rtc::Buffer* payload);
55 void WriteDataChannelOpenAckMessage(rtc::Buffer* payload);
  /external/webrtc/webrtc/modules/rtp_rtcp/source/
rtp_format.h 35 // Get the next payload with payload header.
41 // Returns true on success or false if there was no payload to packetize.
56 const uint8_t* payload; member in struct:webrtc::RtpDepacketizer::ParsedPayload
66 // Parses the RTP payload, parsed result will be saved in |parsed_payload|.
rtp_receiver_impl.cc 25 using RtpUtility::Payload;
105 // payload or not.
113 LOG(LS_ERROR) << "Failed to register payload: " << payload_name << "/"
162 const uint8_t* payload,
169 int8_t first_payload_byte = payload_length > 0 ? payload[0] : 0;
178 LOG(LS_WARNING) << "Receiving invalid payload type.";
202 &webrtc_rtp_header, payload_specific, is_red, payload, payload_length,
278 const Payload* payload = rtp_payload_registry_->PayloadTypeToPayload( local
280 if (!payload) {
366 const Payload* payload = local
    [all...]
  /packages/apps/Settings/tests/robotests/src/com/android/settings/search/
ResultPayloadUtilsTest.java 37 private ResultPayload payload; field in class:ResultPayloadUtilsTest
43 payload = new ResultPayload(intent);
59 byte[] marshalledPayload = ResultPayloadUtils.marshall(payload);
66 byte[] marshalledPayload = ResultPayloadUtils.marshall(payload);
70 String originalIntentExtra = payload.getIntent().getStringExtra(EXTRA_KEY);
  /system/bt/packet/tests/
packet_test_helper.h 44 std::vector<uint8_t> payload) {
45 size_t end = payload.size();
46 return Make(std::move(payload), 0, end);
50 std::vector<uint8_t> payload, size_t start, size_t end) {
55 pkt->data_ = std::make_shared<std::vector<uint8_t>>(std::move(payload));
  /external/syslinux/gpxe/src/core/
gdbstub.c 36 SIZEOF_PAYLOAD = 256, /* buffer size of GDB payload data */
49 /* Buffer for payload data when parsing a packet. Once the
51 * the reply payload. */
52 char buf [ SIZEOF_PAYLOAD + 4 ]; /* $...PAYLOAD...#XX */
53 char *payload; /* start of payload */ member in struct:gdbstub
54 int len; /* length of payload */
139 uint8_t cksum = gdbstub_cksum ( stub->payload, stub->len );
150 stub->payload [ 0 ] = 'O';
151 stub->payload [ 1 ] = 'K'
    [all...]
  /system/netd/server/
WakeupController.cpp 53 static void extractIpPorts(WakeupController::ReportArgs& args, Slice payload) {
57 if (extract(payload, header) < sizeof(struct tcphdr)) {
66 if (extract(payload, header) < sizeof(struct udphdr)) {
78 static void extractIpHeader(WakeupController::ReportArgs& args, Slice payload) {
82 if (extract(payload, header) < sizeof(struct iphdr)) {
91 extractIpPorts(args, drop(payload, header.ihl * 4)); // ipv4 IHL counts 32 bit words.
96 if (extract(payload, header) < sizeof(struct ip6_hdr)) {
107 extractIpPorts(args, drop(payload, sizeof(header)));
135 const auto attrHandler = [&args, &parseAgain](const nlattr attr, const Slice payload) {
139 extract(payload, ts)
    [all...]
  /device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/
Payload.c 23 // The Constant String of "Key Pad for IKEv2" for Authentication Payload generation.
32 Generate Ikev2 SA payload according to SessionSaData
34 @param[in] SessionSaData The data used in SA payload.
35 @param[in] NextPayload The payload type presented in NextPayload field of
36 SA Payload header.
40 @retval a Pointer to SA IKE payload.
90 Generate a Nonce payload containing the input parameter NonceBuf.
92 @param[in] NonceBuf The nonce buffer contains the whole Nonce payload block
93 except the payload header.
95 @param[in] NextPayload The payload type presented in the NextPayload field
    [all...]
  /external/webrtc/webrtc/modules/audio_conference_mixer/source/
memory_pool_win.h 41 // Atomic single linked list payload.
42 MemoryPoolItemPayload<MemoryType>* payload; member in struct:webrtc::MemoryPoolItem
110 memory = &((MemoryPoolItem<MemoryType>*)pListEntry)->payload->memoryType;
131 delete item->payload;
137 delete item->payload;
167 delete item->payload;
187 returnValue->payload = new MemoryPoolItemPayload<MemoryType>();
188 if(returnValue->payload == NULL)
193 returnValue->payload->base = returnValue;

Completed in 1782 milliseconds

1 2 3 45 6 7 8 91011>>