HomeSort by relevance Sort by last modified time
    Searched full:payload (Results 51 - 75 of 3898) sorted by null

1 23 4 5 6 7 8 91011>>

  /packages/apps/Settings/tests/robotests/src/com/android/settings/search/
InlineSwitchPayloadTest.java 62 InlineSwitchPayload payload = local
64 final Intent retainedIntent = payload.getIntent();
65 assertThat(payload.getKey()).isEqualTo(uri);
66 assertThat(payload.getType()).isEqualTo(type);
67 assertThat(payload.mSettingSource).isEqualTo(source);
68 assertThat(payload.isStandard()).isTrue();
69 assertThat(payload.getAvailability()).isEqualTo(ResultPayload.Availability.AVAILABLE);
91 InlineSwitchPayload payload = InlineSwitchPayload.CREATOR.createFromParcel(parcel); local
93 final Intent builtIntent = payload.getIntent();
94 assertThat(payload.getKey()).isEqualTo(uri)
105 InlineSwitchPayload payload = new InlineSwitchPayload(DUMMY_SETTING, SettingsSource.SYSTEM, local
118 InlineSwitchPayload payload = new InlineSwitchPayload(DUMMY_SETTING, SettingsSource.SYSTEM, local
132 InlineSwitchPayload payload = new InlineSwitchPayload(DUMMY_SETTING, SettingsSource.SYSTEM, local
140 InlineSwitchPayload payload = new InlineSwitchPayload(DUMMY_SETTING, SettingsSource.SYSTEM, local
    [all...]
InlinePayloadTest.java 33 InlinePayload payload = getDummyPayload(SettingsSource.SECURE); local
37 int newValue = payload.getValue(mContext);
44 InlinePayload payload = getDummyPayload(SettingsSource.GLOBAL); local
48 int newValue = payload.getValue(mContext);
55 InlinePayload payload = getDummyPayload(SettingsSource.SYSTEM); local
59 int newValue = payload.getValue(mContext);
66 InlinePayload payload = getDummyPayload(SettingsSource.SECURE); local
71 payload.setValue(mContext, newValue);
79 InlinePayload payload = getDummyPayload(SettingsSource.GLOBAL); local
84 payload.setValue(mContext, newValue)
92 InlinePayload payload = getDummyPayload(SettingsSource.SECURE); local
    [all...]
  /system/nvram/messages/
nvram_messages.cpp 147 MakeOneOfField(1, &Request::payload, COMMAND_GET_INFO),
148 MakeOneOfField(2, &Request::payload, COMMAND_CREATE_SPACE),
149 MakeOneOfField(3, &Request::payload, COMMAND_GET_SPACE_INFO),
150 MakeOneOfField(4, &Request::payload, COMMAND_DELETE_SPACE),
151 MakeOneOfField(5, &Request::payload, COMMAND_DISABLE_CREATE),
152 MakeOneOfField(6, &Request::payload, COMMAND_WRITE_SPACE),
153 MakeOneOfField(7, &Request::payload, COMMAND_READ_SPACE),
154 MakeOneOfField(8, &Request::payload, COMMAND_LOCK_SPACE_WRITE),
155 MakeOneOfField(9, &Request::payload, COMMAND_LOCK_SPACE_READ),
156 MakeOneOfField(10, &Request::payload, COMMAND_WIPE_STORAGE)
    [all...]
  /external/libese/tools/ese_replay/
main.c 33 #include "payload.h"
96 struct Payload payload; local
97 if (!payload_init(&payload, 10 * 1024 * 1024, 1024 * 4)) {
98 ALOGE("Failed to initialize payload.");
104 while (!feof(stdin) && payload_read(&payload, stdin)) {
105 payload_dump(&payload, stdout);
107 &ese, payload.tx.buffer, payload.tx.len, reply.buffer, reply.size);
118 if (reply.len < payload.expected.len)
    [all...]
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
dm-log-userspace.h 39 * you will see 'Payload-to-userspace' and 'Payload-to-kernel'. The
40 * 'Payload-to-userspace' is what the kernel sends in 'additional data' as
41 * necessary parameters to complete the request. The 'Payload-to-kernel' is
44 * structure denotes the availability and amount of payload data.
52 * Payload-to-userspace:
54 * Payload-to-kernel:
76 * Payload-to-userspace:
78 * Payload-to-kernel:
83 * payload data
    [all...]
  /development/samples/training/testingfun/app/src/com/example/android/testingfun/lesson4/
NextActivity.java 27 * This activity is started from LaunchActivity. It reads the payload from the given bundle and
33 * Extras key for the payload.
42 * @param payload the payload data that should be added for this intent
43 * @return a configured intent to launch this activity with a String payload.
45 public static Intent makeIntent(Context context, String payload) {
46 return new Intent(context, NextActivity.class).putExtra(EXTRAS_PAYLOAD_KEY, payload);
  /external/python/cpython3/Lib/test/test_email/
test_inversion.py 52 'plain_text': dict(payload='This is a test\n'*20),
53 'base64_text': dict(payload=(('xy a'*40+'\n')*5), cte='base64'),
54 'qp_text': dict(payload=(('xy a'*40+'\n')*5), cte='quoted-printable'),
57 def payload_as_body(self, payload, **kw):
61 msg['Subject'] = 'payload round trip test'
62 msg.set_content(payload, **kw)
66 self.assertEqual(msg2.get_content(), payload)
  /frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/anqp/
RawByteElement.java 31 public RawByteElement(Constants.ANQPElementType infoID, byte[] payload) {
33 mPayload = payload;
39 * @param payload The byte buffer to read from
42 public static RawByteElement parse(Constants.ANQPElementType infoID, ByteBuffer payload) {
43 byte[] rawBytes = new byte[payload.remaining()];
44 if (payload.hasRemaining()) {
45 payload.get(rawBytes);
  /external/webrtc/webrtc/modules/rtp_rtcp/source/
rtp_format_h264_unittest.cc 392 parsed_payload->payload,
393 parsed_payload->payload + parsed_payload->payload_length),
402 RtpDepacketizer::ParsedPayload payload; local
404 ASSERT_TRUE(depacketizer_->Parse(&payload, packet, sizeof(packet)));
405 ExpectPacket(&payload, packet, sizeof(packet));
406 EXPECT_EQ(kVideoFrameKey, payload.frame_type);
407 EXPECT_EQ(kRtpVideoH264, payload.type.Video.codec);
408 EXPECT_TRUE(payload.type.Video.isFirstPacket);
410 payload.type.Video.codecHeader.H264.packetization_type);
411 EXPECT_EQ(kIdr, payload.type.Video.codecHeader.H264.nalu_type)
418 RtpDepacketizer::ParsedPayload payload; local
437 RtpDepacketizer::ParsedPayload payload; local
457 RtpDepacketizer::ParsedPayload payload; local
474 RtpDepacketizer::ParsedPayload payload; local
508 RtpDepacketizer::ParsedPayload payload; local
544 RtpDepacketizer::ParsedPayload payload; local
550 RtpDepacketizer::ParsedPayload payload; local
556 RtpDepacketizer::ParsedPayload payload; local
562 RtpDepacketizer::ParsedPayload payload; local
568 RtpDepacketizer::ParsedPayload payload; local
    [all...]
rtp_receiver_strategy.cc 26 PayloadUnion* payload) const {
28 memcpy(payload, &last_payload_, sizeof(*payload));
32 const PayloadUnion& payload) {
34 memcpy(&last_payload_, &payload, sizeof(last_payload_));
rtp_format_vp9.h 14 // constructor is called with the payload data and size.
46 // The payload data must be one encoded VP9 frame.
47 void SetPayloadData(const uint8_t* payload,
51 // Gets the next payload with VP9 payload header.
74 // Writes the payload descriptor header and copies payload to the |buffer|.
75 // |packet_info| determines which part of the payload to write.
82 // Writes payload descriptor header to |buffer|.
90 const uint8_t* payload_; // The payload data to be packetized
    [all...]
  /system/update_engine/scripts/update_payload/
block_tracer.py 5 """Tracing block data source through a Chrome OS update payload.
7 This module is used internally by the main Payload class for tracing block
8 content through an update payload. This is a useful feature in debugging
9 payload applying functionality in this package. The interface for invoking the
12 tracer = PayloadBlockTracer(payload)
23 # Payload block tracing.
33 def __init__(self, payload):
34 assert payload.is_init, 'uninitialized update payload'
35 self.payload = payloa
    [all...]
payload.py 47 # Update payload.
49 class Payload(object):
50 """Chrome OS update payload processor."""
53 """Update payload header struct."""
68 """Reads the payload header from a file.
70 Reads the payload header from the |payload_file| and updates the |hasher|
87 raise PayloadError('invalid payload magic: %s' % magic)
105 """Initialize the payload object.
108 payload_file: update payload file object open for reading
109 payload_file_offset: the offset of the actual payload
    [all...]
test_utils.py 16 from update_payload import payload
21 """An error during testing of update payload code."""
26 'payload-test-key.pem')
28 'payload-test-key.pub')
62 raise payload.PayloadError('error writing to file (%s): %s' %
100 """Generates a payload signatures data block."""
124 """Generates an update payload allowing low-level control.
127 manifest: the protobuf containing the payload manifest
128 version: the payload version identifier
160 """Sets the payload's block size.""
    [all...]
  /external/tcpdump/tests/
dccp_partial_csum_v6_longer.out 1 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0xd538 (correct)) DCCP-Request (service=0) seq 1559687427 <change_l ack_ratio 2, change_r ccid 2, change_l ccid 2>
2 IP6 (hlim 64, next-header DCCP (33) payload length: 48) 3ffe::2.5001 > 3ffe::1.55024: DCCP (CCVal 0, CsCov 0, cksum 0x81a3 (correct)) DCCP-Response (service=0) (ack=1559687427) seq 1585962456 <nop, nop, change_l ack_ratio 2, confirm_r ccid 2 2, confirm_l ccid 2 2, confirm_r ack_ratio 2>
3 IP6 (hlim 64, next-header DCCP (33) payload length: 36) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0xc692 (correct)) DCCP-Ack (ack=1585962456) seq 1559687428 <nop, confirm_r ack_ratio 2, ack_vector0 0x00, elapsed_time 1>
4 IP6 (hlim 64, next-header DCCP (33) payload length: 164) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 10, cksum 0xe362 (correct)) DCCP-DataAck (ack=1585962456) seq 1559687429 <nop, nop, ack_vector0 0x00, elapsed_time 7282, ndp_count 1>
5 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::2.5001 > 3ffe::1.55024: DCCP (CCVal 0, CsCov 0, cksum 0xcdbb (correct)) DCCP-Ack (ack=1559687429) seq 1585962457 <nop, ack_vector0 0x01, elapsed_time 1>
6 IP6 (hlim 64, next-header DCCP (33) payload length: 160) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 10, cksum 0x5574 (correct)) DCCP-DataAck (ack=1585962457) seq 1559687430 <nop, ack_vector0 0x00, elapsed_time 55>
7 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0xc778 (correct)) DCCP-Close (ack=1585962457) seq 1559687431 <nop, ack_vector0 0x00, elapsed_time 67>
8 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::2.5001 > 3ffe::1.55024: DCCP (CCVal 0, CsCov 0, cksum 0xd2bc (correct)) DCCP-Ack (ack=1559687430) seq 1585962458 <nop, nop, ack_vector0 0x00, ndp_count 1>
9 IP6 (hlim 64, next-header DCCP (33) payload length: 40) 3ffe::2.5001 > 3ffe::1.55024: DCCP (CCVal 0, CsCov 0, cksum 0xc186 (correct)) DCCP-Reset (code=closed) (ack=1559687431) seq 1585962459 <nop, nop, ack_vector0 0x01, elapsed_time 1, ndp_count 2>
  /external/webrtc/talk/media/base/
rtputils.h 47 kRtcpTypeSR = 200, // Sender report payload type.
48 kRtcpTypeRR = 201, // Receiver report payload type.
49 kRtcpTypeSDES = 202, // SDES payload type.
50 kRtcpTypeBye = 203, // BYE payload type.
51 kRtcpTypeApp = 204, // APP payload type.
52 kRtcpTypeRTPFB = 205, // Transport layer Feedback message payload type.
53 kRtcpTypePSFB = 206, // Payload-specific Feedback message payload type.
71 // True if |payload type| is 0-127.
  /device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/
Payload.h 2 The Definitions related to IKEv2 payload.
19 // Payload Type for IKEv2
87 // IKEv2 Transform Type Values presented within Transform Payload
142 // Transform Payload
168 // Identification Type Values presented within Ikev2 ID payload
179 // Identification Payload
194 // Encoding Type presented in IKEV2 Cert Payload
210 // IKEV2 Certificate Payload
223 // IKEV2 Certificate Request Payload
236 // Authentication Payload
    [all...]
  /packages/apps/Nfc/src/com/android/nfc/
NfcWifiProtectedSetup.java 77 // malformed payload
102 ByteBuffer payload = ByteBuffer.wrap(record.getPayload()); local
103 while (payload.hasRemaining()) {
104 short fieldId = payload.getShort();
105 int fieldSize = payload.getShort() & 0xFFFF;
107 return parseCredential(payload, fieldSize);
109 payload.position(payload.position() + fieldSize);
116 private static WifiConfiguration parseCredential(ByteBuffer payload, int size) {
117 int startPosition = payload.position()
    [all...]
  /packages/apps/Nfc/src/com/android/nfc/handover/
HandoverDataParser.java 126 byte[] payload = new byte[4];
127 payload[0] = (byte) (activating ? CARRIER_POWER_STATE_ACTIVATING :
129 payload[1] = 1; // length of carrier data reference
130 payload[2] = 'b'; // carrier data reference: ID for Bluetooth OOB data record
131 payload[3] = 0; // Auxiliary data reference count
133 payload);
137 byte[] payload = new byte[8];
142 payload[0] = (byte) (payload.length & 0xFF);
143 payload[1] = (byte) ((payload.length >> 8) & 0xFF)
189 ByteBuffer payload = ByteBuffer.allocate(nestedPayload.length + 1); local
209 ByteBuffer payload = ByteBuffer.allocate(nestedPayload.length + 1); local
    [all...]
  /device/linaro/bootloader/arm-trusted-firmware/include/common/tbbr/
tbbr_img_def.h 22 /* Secure Payload BL32 (Trusted OS) */
57 /* Secure Payload BL32_EXTRA1 (Trusted OS Extra1) */
60 /* Secure Payload BL32_EXTRA2 (Trusted OS Extra2) */
  /external/curl/tests/unit/
unit1309.c 83 size_t payload; variable
87 payload = (size_t) key.tv_usec;
89 nodes[i].payload = (void *)payload; /* for simplicity */
100 printf("remove pointer %d, payload %ld\n", rem,
101 (long)(nodes[rem].payload));
121 size_t payload = key.tv_usec*10 + j; variable
122 nodes[i * 3 + j].payload = (void *)payload; /* for simplicity */
133 printf("removed payload %ld[%ld]\n", (long)(removed->payload) / 10
    [all...]
  /external/vboot_reference/scripts/image_signing/
ensure_update_verification.sh 7 # Verify that update payload verification is enabled.
27 local key_location="/usr/share/update_engine/update-payload-key.pub.pem"
30 die "Update payload verification key not found at $key_location"
  /external/webrtc/webrtc/modules/audio_coding/neteq/
payload_splitter.h 44 // RED payload is packetized into a Packet. The original elements in
47 // RED headers according to RFC 2198 at the very beginning of the payload.
51 // Iterates through |packet_list| and, duplicate each audio payload that has
53 // get information about which payload type each packet contains.
58 // comfort noise payloads are kept. Except that, only one single payload type
59 // is accepted. Any packet with another payload type is discarded.
63 // Iterates through |packet_list| and, if possible, splits each audio payload
66 // payload type each packet contains.
71 // Splits the payload in |packet|. The payload is assumed to be from
    [all...]
  /hardware/qcom/msm8x09/kernel-headers/sound/
wcd-dsp-glink.h 31 __u8 payload[0]; member in struct:wdsp_reg_pkt
36 __u8 payload[0]; member in struct:wdsp_cmd_pkt
40 __u8 payload[0]; member in struct:wdsp_write_pkt
  /frameworks/opt/net/voip/src/jni/rtp/
GsmCodec.cpp 46 int encode(void *payload, int16_t *samples);
47 int decode(int16_t *samples, int count, void *payload, int length);
54 int GsmCodec::encode(void *payload, int16_t *samples)
56 gsm_encode(mEncode, samples, (unsigned char *)payload);
60 int GsmCodec::decode(int16_t *samples, int count, void *payload, int length)
62 unsigned char *bytes = (unsigned char *)payload;

Completed in 1314 milliseconds

1 23 4 5 6 7 8 91011>>