/external/wpa_supplicant_8/src/tls/ |
pkcs8.c | 37 pos = hdr.payload; 53 if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) { 58 pos = hdr.payload + hdr.length; 81 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { 103 pos = hdr.payload + hdr.length; 117 crypto_rsa_import_private_key(hdr.payload, hdr.length); 150 pos = hdr.payload; 163 enc_alg = hdr.payload; 165 pos = hdr.payload + hdr.length; 177 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length [all...] |
/external/syslinux/gpxe/src/core/ |
gdbstub.c | 36 SIZEOF_PAYLOAD = 256, /* buffer size of GDB payload data */ 49 /* Buffer for payload data when parsing a packet. Once the 51 * the reply payload. */ 52 char buf [ SIZEOF_PAYLOAD + 4 ]; /* $...PAYLOAD...#XX */ 53 char *payload; /* start of payload */ member in struct:gdbstub 54 int len; /* length of payload */ 139 uint8_t cksum = gdbstub_cksum ( stub->payload, stub->len ); 150 stub->payload [ 0 ] = 'O'; 151 stub->payload [ 1 ] = 'K' [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/anqp/ |
HSIconFileElement.java | 69 * @param payload The buffer to read from 74 public static HSIconFileElement parse(ByteBuffer payload) 77 int status = payload.get() & 0xFF; 86 ByteBufferReader.readStringWithByteLength(payload, StandardCharsets.US_ASCII); 90 (int) ByteBufferReader.readInteger(payload, ByteOrder.LITTLE_ENDIAN, 2) & 0xFFFF; 92 payload.get(iconData);
|
HSOsuProvidersElement.java | 63 * @param payload The buffer to read from 68 public static HSOsuProvidersElement parse(ByteBuffer payload) 70 int ssidLength = payload.get() & 0xFF; 75 payload.get(ssidBytes); 77 int numProviders = payload.get() & 0xFF; 80 providers.add(OsuProviderInfo.parse(payload));
|
IconInfo.java | 61 * @param payload The buffer to read from 65 public static IconInfo parse(ByteBuffer payload) { 66 int width = (int) ByteBufferReader.readInteger(payload, ByteOrder.LITTLE_ENDIAN, 2) 68 int height = (int) ByteBufferReader.readInteger(payload, ByteOrder.LITTLE_ENDIAN, 2) 73 payload, LANGUAGE_CODE_LENGTH, StandardCharsets.US_ASCII).trim(); 76 ByteBufferReader.readStringWithByteLength(payload, StandardCharsets.US_ASCII); 78 ByteBufferReader.readStringWithByteLength(payload, StandardCharsets.UTF_8);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
IccIoResult.java | 176 public byte[] payload; field in class:IccIoResult 178 public IccIoResult(int sw1, int sw2, byte[] payload) { 181 this.payload = payload; 191 + Integer.toHexString(sw2) + " Payload: " 192 + ((Build.IS_DEBUGGABLE && Build.IS_ENG) ? payload : "*******")
|
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 67 curTag = packet->payload; 68 while(curTag - packet->payload < len) { 75 if ((curTag - packet->payload) + tagLen + TAG_HDR_SIZE > len) { 99 unsigned char *cursor = packet.payload; 127 memcpy(hostUniq.payload, &pid, sizeof(pid)); 139 strcpy(err.payload, msg); 147 CHECK_ROOM(cursor, packet.payload, 155 CHECK_ROOM(cursor, packet.payload, 218 tag = (packet->payload[i] << 8) + packet->payload[i+1] [all...] |
/external/autotest/scheduler/ |
rdb_unittest.py | 117 payload = {'status': 'Ready'} 119 self.update_manager.add_request(host_id=host_id, payload=payload) 122 [host_id], **payload) 130 self.update_manager.add_request(host_id=host_id, payload=payload_1) 131 self.update_manager.add_request(host_id=host_id, payload=payload_2) 142 self.update_manager.add_request(host_id=host_id, payload=payload_1) 143 self.update_manager.add_request(host_id=host_id, payload=payload_2) 150 """Test same payload for 2 hosts only hits the db once.""" 151 payload = {'status': 'Ready' [all...] |
/device/google/marlin/camera/QCamera2/HAL/ |
QCameraStateMachine.h | 129 // definition for payload type of setting callback 138 // definition for payload type of sending command 145 // definition for payload type of sending command 229 void *evt_payload; // ptr to payload 232 int32_t stateMachine(qcamera_sm_evt_enum_t evt, void *payload); 233 int32_t procEvtPreviewStoppedState(qcamera_sm_evt_enum_t evt, void *payload); 234 int32_t procEvtPreviewReadyState(qcamera_sm_evt_enum_t evt, void *payload); 235 int32_t procEvtPreviewingState(qcamera_sm_evt_enum_t evt, void *payload); 236 int32_t procEvtPrepareSnapshotState(qcamera_sm_evt_enum_t evt, void *payload); 237 int32_t procEvtPicTakingState(qcamera_sm_evt_enum_t evt, void *payload); [all...] |
/hardware/qcom/camera/msm8998/QCamera2/HAL/ |
QCameraStateMachine.h | 129 // definition for payload type of setting callback 138 // definition for payload type of sending command 145 // definition for payload type of sending command 232 void *evt_payload; // ptr to payload 235 int32_t stateMachine(qcamera_sm_evt_enum_t evt, void *payload); 236 int32_t procEvtPreviewStoppedState(qcamera_sm_evt_enum_t evt, void *payload); 237 int32_t procEvtPreviewReadyState(qcamera_sm_evt_enum_t evt, void *payload); 238 int32_t procEvtPreviewingState(qcamera_sm_evt_enum_t evt, void *payload); 239 int32_t procEvtPrepareSnapshotState(qcamera_sm_evt_enum_t evt, void *payload); 240 int32_t procEvtPicTakingState(qcamera_sm_evt_enum_t evt, void *payload); [all...] |
/external/antlr/antlr-3.4/runtime/ActionScript/project/src/org/antlr/runtime/ |
RecognitionException.as | 127 var payload:Token = adaptor.getToken(node); 128 if ( payload!=null ) { 129 this.token = payload; 130 if ( payload.line<= 0 ) { 148 this.line = payload.line; 149 this.charPositionInLine = payload.charPositionInLine;
|
/external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/ |
RecognitionException.java | 127 Token payload = adaptor.getToken(node); local 128 if ( payload!=null ) { 129 this.token = payload; 130 if ( payload.getLine()<= 0 ) { 148 this.line = payload.getLine(); 149 this.charPositionInLine = payload.getCharPositionInLine();
|
/external/antlr/antlr-3.4/runtime/JavaScript/src/org/antlr/runtime/ |
RecognitionException.js | 126 payload = adaptor.getToken(this.node); 127 if ( payload ) { 128 this.token = payload; 129 if ( payload.getLine()<= 0 ) { 147 this.line = payload.getLine(); 148 this.charPositionInLine = payload.getCharPositionInLine();
|
/external/honggfuzz/linux/ |
pt.c | 53 switch (packet->payload.ip.ipc) { 55 ip = packet->payload.ip.ip & 0xFFFF; 58 ip = packet->payload.ip.ip & 0xFFFFFFFF; 61 ip = packet->payload.ip.ip & 0xFFFFFFFFFFFF; 64 ip = sext(packet->payload.ip.ip, 48); 67 ip = packet->payload.ip.ip;
|
/system/gatekeeper/include/gatekeeper/ |
gatekeeper_messages.h | 89 * Expects payload to be allocated with GetSerializedSize bytes. 93 uint32_t Serialize(uint8_t *payload, const uint8_t *end) const; 98 gatekeeper_error_t Deserialize(const uint8_t *payload, const uint8_t *end); 126 * Deserializes subclass specific data from payload without reading past end. 148 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end); 164 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end); 178 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end); 205 virtual gatekeeper_error_t nonErrorDeserialize(const uint8_t *payload, const uint8_t *end);
|
/hardware/interfaces/bluetooth/1.0/default/test/ |
mct_protocol_unittest.cc | 48 MATCHER_P3(HidlVecMatches, preamble, preamble_length, payload, "") { 49 size_t length = strlen(payload) + preamble_length; 58 return memcmp(payload, arg.data() + preamble_length, 119 void WriteAndExpectInboundAclData(char* payload) { 122 int length = strlen(payload); 129 TEMP_FAILURE_RETRY(write(fake_uart_[CH_ACL_IN], payload, strlen(payload))); 135 Call(HidlVecMatches(preamble, sizeof(preamble), payload))) 147 void WriteAndExpectInboundEvent(char* payload) { 150 preamble[1] = strlen(payload) & 0xFF [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/wire/protobuf/ |
protobufwireadapter.cc | 201 ParseConfigurationMessage(outer.payload()); 204 ParseConfigurationAckMessage(outer.payload()); 207 ParseOptionsMessage(outer.payload()); 210 ParsePairingRequestMessage(outer.payload()); 213 ParsePairingRequestAckMessage(outer.payload()); 216 ParseSecretMessage(outer.payload()); 219 ParseSecretAckMessage(outer.payload()); 229 const std::string& payload) { 231 if (!configuration.ParseFromString(payload)) { 248 const std::string& payload) { [all...] |
/art/runtime/interpreter/mterp/x86_64/ |
op_fill_array_data.S | 6 call SYMBOL(MterpFillArrayData) # (obj, payload)
|
/development/samples/training/testingfun/app/src/com/example/android/testingfun/lesson4/ |
NextActivity.java | 27 * This activity is started from LaunchActivity. It reads the payload from the given bundle and 33 * Extras key for the payload. 42 * @param payload the payload data that should be added for this intent 43 * @return a configured intent to launch this activity with a String payload. 45 public static Intent makeIntent(Context context, String payload) { 46 return new Intent(context, NextActivity.class).putExtra(EXTRAS_PAYLOAD_KEY, payload);
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ANTLRParseTree.h | 38 __strong id<ANTLRToken> payload; variable 62 @property (retain) id<ANTLRToken> payload; variable
|
/external/autotest/client/site_tests/cellular_MbimComplianceDataTransfer/ |
cellular_MbimComplianceDTS01.py | 34 _, _, _, payload = loopback.run(ntb_format=mbim_constants.NTB_FORMAT_16) 37 # Let's check the first byte of the first received payload to verify 39 if payload[0][0] != 0x45:
|
/external/iptables/include/linux/netfilter_ipv4/ |
ip_queue.h | 34 unsigned char payload[0]; /* Optional packet data */ member in struct:ipq_packet_msg 47 unsigned char payload[0]; /* Optional replacement packet */ member in struct:ipq_verdict_msg
|
/external/syslinux/core/lwip/src/core/ |
pbuf.c | 161 * @param length size of the pbuf's payload 226 /* make the payload pointer point 'offset' bytes into pbuf data memory */ 227 p->payload = LWIP_MEM_ALIGN((void *)((u8_t *)p + (SIZEOF_STRUCT_PBUF + offset))); 228 LWIP_ASSERT("pbuf_alloc: pbuf p->payload properly aligned", 229 ((mem_ptr_t)p->payload % MEM_ALIGNMENT) == 0); 234 LWIP_ASSERT("check p->payload + p->len does not overflow pbuf", 235 ((u8_t*)p->payload + p->len <= 268 q->payload = (void *)((u8_t *)q + SIZEOF_STRUCT_PBUF); 269 LWIP_ASSERT("pbuf_alloc: pbuf q->payload properly aligned", 270 ((mem_ptr_t)q->payload % MEM_ALIGNMENT) == 0) 491 void *payload; local [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/anqp/eap/ |
InnerAuthEAP.java | 47 * @param payload The byte buffer to read from 53 public static InnerAuthEAP parse(ByteBuffer payload, int length) throws ProtocolException { 57 int eapMethodID = payload.get() & 0xFF;
|
VendorSpecificAuth.java | 44 * @param payload The byte buffer to read from 49 public static VendorSpecificAuth parse(ByteBuffer payload, int length) { 51 payload.get(data);
|