/packages/apps/Settings/tests/robotests/src/com/android/settings/search/ |
InlineSwitchPayloadTest.java | 62 InlineSwitchPayload payload = local 64 final Intent retainedIntent = payload.getIntent(); 65 assertThat(payload.getKey()).isEqualTo(uri); 66 assertThat(payload.getType()).isEqualTo(type); 67 assertThat(payload.mSettingSource).isEqualTo(source); 68 assertThat(payload.isStandard()).isTrue(); 69 assertThat(payload.getAvailability()).isEqualTo(ResultPayload.Availability.AVAILABLE); 91 InlineSwitchPayload payload = InlineSwitchPayload.CREATOR.createFromParcel(parcel); local 93 final Intent builtIntent = payload.getIntent(); 94 assertThat(payload.getKey()).isEqualTo(uri) 105 InlineSwitchPayload payload = new InlineSwitchPayload(DUMMY_SETTING, SettingsSource.SYSTEM, local 118 InlineSwitchPayload payload = new InlineSwitchPayload(DUMMY_SETTING, SettingsSource.SYSTEM, local 132 InlineSwitchPayload payload = new InlineSwitchPayload(DUMMY_SETTING, SettingsSource.SYSTEM, local 140 InlineSwitchPayload payload = new InlineSwitchPayload(DUMMY_SETTING, SettingsSource.SYSTEM, local [all...] |
InlinePayloadTest.java | 33 InlinePayload payload = getDummyPayload(SettingsSource.SECURE); local 37 int newValue = payload.getValue(mContext); 44 InlinePayload payload = getDummyPayload(SettingsSource.GLOBAL); local 48 int newValue = payload.getValue(mContext); 55 InlinePayload payload = getDummyPayload(SettingsSource.SYSTEM); local 59 int newValue = payload.getValue(mContext); 66 InlinePayload payload = getDummyPayload(SettingsSource.SECURE); local 71 payload.setValue(mContext, newValue); 79 InlinePayload payload = getDummyPayload(SettingsSource.GLOBAL); local 84 payload.setValue(mContext, newValue) 92 InlinePayload payload = getDummyPayload(SettingsSource.SECURE); local [all...] |
/system/nvram/messages/ |
nvram_messages.cpp | 147 MakeOneOfField(1, &Request::payload, COMMAND_GET_INFO), 148 MakeOneOfField(2, &Request::payload, COMMAND_CREATE_SPACE), 149 MakeOneOfField(3, &Request::payload, COMMAND_GET_SPACE_INFO), 150 MakeOneOfField(4, &Request::payload, COMMAND_DELETE_SPACE), 151 MakeOneOfField(5, &Request::payload, COMMAND_DISABLE_CREATE), 152 MakeOneOfField(6, &Request::payload, COMMAND_WRITE_SPACE), 153 MakeOneOfField(7, &Request::payload, COMMAND_READ_SPACE), 154 MakeOneOfField(8, &Request::payload, COMMAND_LOCK_SPACE_WRITE), 155 MakeOneOfField(9, &Request::payload, COMMAND_LOCK_SPACE_READ), 156 MakeOneOfField(10, &Request::payload, COMMAND_WIPE_STORAGE) [all...] |
/external/libese/tools/ese_replay/ |
main.c | 33 #include "payload.h" 96 struct Payload payload; local 97 if (!payload_init(&payload, 10 * 1024 * 1024, 1024 * 4)) { 98 ALOGE("Failed to initialize payload."); 104 while (!feof(stdin) && payload_read(&payload, stdin)) { 105 payload_dump(&payload, stdout); 107 &ese, payload.tx.buffer, payload.tx.len, reply.buffer, reply.size); 118 if (reply.len < payload.expected.len) [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
dm-log-userspace.h | 39 * you will see 'Payload-to-userspace' and 'Payload-to-kernel'. The 40 * 'Payload-to-userspace' is what the kernel sends in 'additional data' as 41 * necessary parameters to complete the request. The 'Payload-to-kernel' is 44 * structure denotes the availability and amount of payload data. 52 * Payload-to-userspace: 54 * Payload-to-kernel: 76 * Payload-to-userspace: 78 * Payload-to-kernel: 83 * payload data [all...] |
/development/samples/training/testingfun/app/src/com/example/android/testingfun/lesson4/ |
NextActivity.java | 27 * This activity is started from LaunchActivity. It reads the payload from the given bundle and 33 * Extras key for the payload. 42 * @param payload the payload data that should be added for this intent 43 * @return a configured intent to launch this activity with a String payload. 45 public static Intent makeIntent(Context context, String payload) { 46 return new Intent(context, NextActivity.class).putExtra(EXTRAS_PAYLOAD_KEY, payload);
|
/external/python/cpython3/Lib/test/test_email/ |
test_inversion.py | 52 'plain_text': dict(payload='This is a test\n'*20), 53 'base64_text': dict(payload=(('xy a'*40+'\n')*5), cte='base64'), 54 'qp_text': dict(payload=(('xy a'*40+'\n')*5), cte='quoted-printable'), 57 def payload_as_body(self, payload, **kw): 61 msg['Subject'] = 'payload round trip test' 62 msg.set_content(payload, **kw) 66 self.assertEqual(msg2.get_content(), payload)
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/anqp/ |
RawByteElement.java | 31 public RawByteElement(Constants.ANQPElementType infoID, byte[] payload) { 33 mPayload = payload; 39 * @param payload The byte buffer to read from 42 public static RawByteElement parse(Constants.ANQPElementType infoID, ByteBuffer payload) { 43 byte[] rawBytes = new byte[payload.remaining()]; 44 if (payload.hasRemaining()) { 45 payload.get(rawBytes);
|
/external/webrtc/webrtc/modules/rtp_rtcp/source/ |
rtp_format_h264_unittest.cc | 392 parsed_payload->payload, 393 parsed_payload->payload + parsed_payload->payload_length), 402 RtpDepacketizer::ParsedPayload payload; local 404 ASSERT_TRUE(depacketizer_->Parse(&payload, packet, sizeof(packet))); 405 ExpectPacket(&payload, packet, sizeof(packet)); 406 EXPECT_EQ(kVideoFrameKey, payload.frame_type); 407 EXPECT_EQ(kRtpVideoH264, payload.type.Video.codec); 408 EXPECT_TRUE(payload.type.Video.isFirstPacket); 410 payload.type.Video.codecHeader.H264.packetization_type); 411 EXPECT_EQ(kIdr, payload.type.Video.codecHeader.H264.nalu_type) 418 RtpDepacketizer::ParsedPayload payload; local 437 RtpDepacketizer::ParsedPayload payload; local 457 RtpDepacketizer::ParsedPayload payload; local 474 RtpDepacketizer::ParsedPayload payload; local 508 RtpDepacketizer::ParsedPayload payload; local 544 RtpDepacketizer::ParsedPayload payload; local 550 RtpDepacketizer::ParsedPayload payload; local 556 RtpDepacketizer::ParsedPayload payload; local 562 RtpDepacketizer::ParsedPayload payload; local 568 RtpDepacketizer::ParsedPayload payload; local [all...] |
rtp_receiver_strategy.cc | 26 PayloadUnion* payload) const { 28 memcpy(payload, &last_payload_, sizeof(*payload)); 32 const PayloadUnion& payload) { 34 memcpy(&last_payload_, &payload, sizeof(last_payload_));
|
rtp_format_vp9.h | 14 // constructor is called with the payload data and size. 46 // The payload data must be one encoded VP9 frame. 47 void SetPayloadData(const uint8_t* payload, 51 // Gets the next payload with VP9 payload header. 74 // Writes the payload descriptor header and copies payload to the |buffer|. 75 // |packet_info| determines which part of the payload to write. 82 // Writes payload descriptor header to |buffer|. 90 const uint8_t* payload_; // The payload data to be packetized [all...] |
/system/update_engine/scripts/update_payload/ |
block_tracer.py | 5 """Tracing block data source through a Chrome OS update payload. 7 This module is used internally by the main Payload class for tracing block 8 content through an update payload. This is a useful feature in debugging 9 payload applying functionality in this package. The interface for invoking the 12 tracer = PayloadBlockTracer(payload) 23 # Payload block tracing. 33 def __init__(self, payload): 34 assert payload.is_init, 'uninitialized update payload' 35 self.payload = payloa [all...] |
payload.py | 47 # Update payload. 49 class Payload(object): 50 """Chrome OS update payload processor.""" 53 """Update payload header struct.""" 68 """Reads the payload header from a file. 70 Reads the payload header from the |payload_file| and updates the |hasher| 87 raise PayloadError('invalid payload magic: %s' % magic) 105 """Initialize the payload object. 108 payload_file: update payload file object open for reading 109 payload_file_offset: the offset of the actual payload [all...] |
test_utils.py | 16 from update_payload import payload 21 """An error during testing of update payload code.""" 26 'payload-test-key.pem') 28 'payload-test-key.pub') 62 raise payload.PayloadError('error writing to file (%s): %s' % 100 """Generates a payload signatures data block.""" 124 """Generates an update payload allowing low-level control. 127 manifest: the protobuf containing the payload manifest 128 version: the payload version identifier 160 """Sets the payload's block size."" [all...] |
/external/tcpdump/tests/ |
dccp_partial_csum_v6_longer.out | 1 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0xd538 (correct)) DCCP-Request (service=0) seq 1559687427 <change_l ack_ratio 2, change_r ccid 2, change_l ccid 2> 2 IP6 (hlim 64, next-header DCCP (33) payload length: 48) 3ffe::2.5001 > 3ffe::1.55024: DCCP (CCVal 0, CsCov 0, cksum 0x81a3 (correct)) DCCP-Response (service=0) (ack=1559687427) seq 1585962456 <nop, nop, change_l ack_ratio 2, confirm_r ccid 2 2, confirm_l ccid 2 2, confirm_r ack_ratio 2> 3 IP6 (hlim 64, next-header DCCP (33) payload length: 36) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0xc692 (correct)) DCCP-Ack (ack=1585962456) seq 1559687428 <nop, confirm_r ack_ratio 2, ack_vector0 0x00, elapsed_time 1> 4 IP6 (hlim 64, next-header DCCP (33) payload length: 164) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 10, cksum 0xe362 (correct)) DCCP-DataAck (ack=1585962456) seq 1559687429 <nop, nop, ack_vector0 0x00, elapsed_time 7282, ndp_count 1> 5 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::2.5001 > 3ffe::1.55024: DCCP (CCVal 0, CsCov 0, cksum 0xcdbb (correct)) DCCP-Ack (ack=1559687429) seq 1585962457 <nop, ack_vector0 0x01, elapsed_time 1> 6 IP6 (hlim 64, next-header DCCP (33) payload length: 160) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 10, cksum 0x5574 (correct)) DCCP-DataAck (ack=1585962457) seq 1559687430 <nop, ack_vector0 0x00, elapsed_time 55> 7 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::1.55024 > 3ffe::2.5001: DCCP (CCVal 0, CsCov 0, cksum 0xc778 (correct)) DCCP-Close (ack=1585962457) seq 1559687431 <nop, ack_vector0 0x00, elapsed_time 67> 8 IP6 (hlim 64, next-header DCCP (33) payload length: 32) 3ffe::2.5001 > 3ffe::1.55024: DCCP (CCVal 0, CsCov 0, cksum 0xd2bc (correct)) DCCP-Ack (ack=1559687430) seq 1585962458 <nop, nop, ack_vector0 0x00, ndp_count 1> 9 IP6 (hlim 64, next-header DCCP (33) payload length: 40) 3ffe::2.5001 > 3ffe::1.55024: DCCP (CCVal 0, CsCov 0, cksum 0xc186 (correct)) DCCP-Reset (code=closed) (ack=1559687431) seq 1585962459 <nop, nop, ack_vector0 0x01, elapsed_time 1, ndp_count 2>
|
/external/webrtc/talk/media/base/ |
rtputils.h | 47 kRtcpTypeSR = 200, // Sender report payload type. 48 kRtcpTypeRR = 201, // Receiver report payload type. 49 kRtcpTypeSDES = 202, // SDES payload type. 50 kRtcpTypeBye = 203, // BYE payload type. 51 kRtcpTypeApp = 204, // APP payload type. 52 kRtcpTypeRTPFB = 205, // Transport layer Feedback message payload type. 53 kRtcpTypePSFB = 206, // Payload-specific Feedback message payload type. 71 // True if |payload type| is 0-127.
|
/device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/ |
Payload.h | 2 The Definitions related to IKEv2 payload.
19 // Payload Type for IKEv2
87 // IKEv2 Transform Type Values presented within Transform Payload
142 // Transform Payload
168 // Identification Type Values presented within Ikev2 ID payload
179 // Identification Payload
194 // Encoding Type presented in IKEV2 Cert Payload
210 // IKEV2 Certificate Payload
223 // IKEV2 Certificate Request Payload
236 // Authentication Payload
[all...] |
/packages/apps/Nfc/src/com/android/nfc/ |
NfcWifiProtectedSetup.java | 77 // malformed payload 102 ByteBuffer payload = ByteBuffer.wrap(record.getPayload()); local 103 while (payload.hasRemaining()) { 104 short fieldId = payload.getShort(); 105 int fieldSize = payload.getShort() & 0xFFFF; 107 return parseCredential(payload, fieldSize); 109 payload.position(payload.position() + fieldSize); 116 private static WifiConfiguration parseCredential(ByteBuffer payload, int size) { 117 int startPosition = payload.position() [all...] |
/packages/apps/Nfc/src/com/android/nfc/handover/ |
HandoverDataParser.java | 126 byte[] payload = new byte[4]; 127 payload[0] = (byte) (activating ? CARRIER_POWER_STATE_ACTIVATING : 129 payload[1] = 1; // length of carrier data reference 130 payload[2] = 'b'; // carrier data reference: ID for Bluetooth OOB data record 131 payload[3] = 0; // Auxiliary data reference count 133 payload); 137 byte[] payload = new byte[8]; 142 payload[0] = (byte) (payload.length & 0xFF); 143 payload[1] = (byte) ((payload.length >> 8) & 0xFF) 189 ByteBuffer payload = ByteBuffer.allocate(nestedPayload.length + 1); local 209 ByteBuffer payload = ByteBuffer.allocate(nestedPayload.length + 1); local [all...] |
/device/linaro/bootloader/arm-trusted-firmware/include/common/tbbr/ |
tbbr_img_def.h | 22 /* Secure Payload BL32 (Trusted OS) */ 57 /* Secure Payload BL32_EXTRA1 (Trusted OS Extra1) */ 60 /* Secure Payload BL32_EXTRA2 (Trusted OS Extra2) */
|
/external/curl/tests/unit/ |
unit1309.c | 83 size_t payload; variable 87 payload = (size_t) key.tv_usec; 89 nodes[i].payload = (void *)payload; /* for simplicity */ 100 printf("remove pointer %d, payload %ld\n", rem, 101 (long)(nodes[rem].payload)); 121 size_t payload = key.tv_usec*10 + j; variable 122 nodes[i * 3 + j].payload = (void *)payload; /* for simplicity */ 133 printf("removed payload %ld[%ld]\n", (long)(removed->payload) / 10 [all...] |
/external/vboot_reference/scripts/image_signing/ |
ensure_update_verification.sh | 7 # Verify that update payload verification is enabled. 27 local key_location="/usr/share/update_engine/update-payload-key.pub.pem" 30 die "Update payload verification key not found at $key_location"
|
/external/webrtc/webrtc/modules/audio_coding/neteq/ |
payload_splitter.h | 44 // RED payload is packetized into a Packet. The original elements in 47 // RED headers according to RFC 2198 at the very beginning of the payload. 51 // Iterates through |packet_list| and, duplicate each audio payload that has 53 // get information about which payload type each packet contains. 58 // comfort noise payloads are kept. Except that, only one single payload type 59 // is accepted. Any packet with another payload type is discarded. 63 // Iterates through |packet_list| and, if possible, splits each audio payload 66 // payload type each packet contains. 71 // Splits the payload in |packet|. The payload is assumed to be from [all...] |
/hardware/qcom/msm8x09/kernel-headers/sound/ |
wcd-dsp-glink.h | 31 __u8 payload[0]; member in struct:wdsp_reg_pkt 36 __u8 payload[0]; member in struct:wdsp_cmd_pkt 40 __u8 payload[0]; member in struct:wdsp_write_pkt
|
/frameworks/opt/net/voip/src/jni/rtp/ |
GsmCodec.cpp | 46 int encode(void *payload, int16_t *samples); 47 int decode(int16_t *samples, int count, void *payload, int length); 54 int GsmCodec::encode(void *payload, int16_t *samples) 56 gsm_encode(mEncode, samples, (unsigned char *)payload); 60 int GsmCodec::decode(int16_t *samples, int count, void *payload, int length) 62 unsigned char *bytes = (unsigned char *)payload;
|