/external/libese/tools/ese_replay/ |
payload.c | 25 #include "payload.h" 27 bool payload_init(struct Payload *p, uint32_t tx_len, uint32_t exp_len) { 38 void payload_free(struct Payload *p) { 45 bool payload_read(struct Payload *p, FILE *fp) { 62 void payload_dump(const struct Payload *payload, FILE *fp) { 63 fprintf(fp, "Payload {\n"); 64 buffer_dump(&payload->tx, " ", "Transmit", 240, fp); 65 buffer_dump(&payload->expected, " ", "Expected", 240, fp);
|
/external/nanohttpd/websocket/src/main/java/fi/iki/elonen/ |
NanoWSD.java | 237 public void ping(byte[] payload) throws IOException { 238 sendFrame(new WebSocketFrame(OpCode.Ping, true, payload)); 262 public void send(byte[] payload) throws IOException { 263 sendFrame(new WebSocketFrame(OpCode.Binary, true, payload)); 266 public void send(String payload) throws IOException { 267 sendFrame(new WebSocketFrame(OpCode.Text, true, payload)); 348 byte[] payload = new byte[reasonBytes.length + 2]; 349 payload[0] = (byte) (code.getValue() >> 8 & 0xFF); 350 payload[1] = (byte) (code.getValue() & 0xFF); 351 System.arraycopy(reasonBytes, 0, payload, 2, reasonBytes.length) 466 private byte[] payload; field in class:NanoWSD.WebSocketFrame 514 System.arraycopy(inter.getBinaryPayload(), 0, payload, offset, inter.getBinaryPayload().length); local [all...] |
/external/python/cpython2/Lib/email/ |
iterators.py | 43 payload = subpart.get_payload(decode=decode) 44 if isinstance(payload, basestring): 45 for line in StringIO(payload):
|
/external/python/cpython3/Lib/email/ |
iterators.py | 42 payload = subpart.get_payload(decode=decode) 43 if isinstance(payload, str): 44 yield from StringIO(payload)
|
/external/webrtc/webrtc/modules/audio_coding/neteq/ |
payload_splitter_unittest.cc | 47 void CreateOpusFecPayload(uint8_t* payload, size_t payload_length, 52 payload[0] = 0x08; 53 payload[1] = 0x40; 54 memset(&payload[2], payload_value, payload_length - 2); 71 // Creates a RED packet, with |num_payloads| payloads, with payload types given 73 // |num_payloads|). Each redundant payload is |timestamp_offset| samples 74 // "behind" the the previous payload. 85 uint8_t* payload = new uint8_t[packet->payload_length]; local 86 uint8_t* payload_ptr = payload; 90 // Special case for last payload 130 uint8_t* payload = new uint8_t[packet->payload_length]; local [all...] |
/external/webrtc/webrtc/modules/audio_coding/neteq/test/ |
neteq_isac_quality_test.cc | 47 uint8_t* payload, size_t max_bytes); 81 uint8_t* payload, size_t max_bytes) { 92 value = WebRtcIsacfix_Encode(isac_encoder_, &in_data[pointer], payload);
|
/external/webrtc/webrtc/modules/rtp_rtcp/source/ |
rtp_receiver_strategy.h | 36 // Parses the RTP packet and calls the data callback with the payload data. 45 const uint8_t* payload, 59 // Returns true if we should report CSRC changes for this payload type. 60 // TODO(phoglund): should move out of here along with other payload stuff. 63 // Notifies the strategy that we have created a new non-RED payload type in 64 // the payload registry. 77 // Checks if the payload type has changed, and returns whether we should 85 // Stores / retrieves the last media specific payload for later reference. 86 void GetLastMediaSpecificPayload(PayloadUnion* payload) const; 87 void SetLastMediaSpecificPayload(const PayloadUnion& payload); [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.c | 467 pos = hdr.payload; 468 end = hdr.payload + hdr.length; 494 if (asn1_get_next(hdr.payload, hdr.length, &hdr) < 0 || 504 hdr.payload, hdr.length); 509 cert = x509_certificate_parse(hdr.payload, hdr.length); 519 return tlsv1_set_cert(cred, NULL, hdr.payload, hdr.length); 545 hdr.payload, hdr.length); 572 hdr.payload, hdr.length); 608 hdr.payload, hdr.length); 609 pos = hdr.payload; [all...] |
/frameworks/native/libs/vr/libpdx_uds/private/uds/ |
ipc_helper.h | 17 // Test interfaces used for unit-testing payload sending/receiving over sockets. 165 SendPayload payload; local 166 rpc::Serialize(data, &payload); 167 return payload.Send(socket_fd, nullptr, data_vec, vec_count); 175 SendPayload payload; local 176 rpc::Serialize(request, &payload); 177 return payload.Send(socket_fd, &request.cred, data_vec, vec_count); 187 ReceivePayload payload; local 188 Status<void> status = payload.Receive(socket_fd); 189 if (status && rpc::Deserialize(data, &payload) != rpc::ErrorCode::NO_ERROR 197 ReceivePayload payload; local [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/anqp/ |
DomainNameElement.java | 52 * @param payload The byte buffer to read from 56 public static DomainNameElement parse(ByteBuffer payload) { 58 while (payload.hasRemaining()) { 61 payload, StandardCharsets.ISO_8859_1));
|
HSConnectionCapabilityElement.java | 48 * @param payload The byte buffer to read from 52 public static HSConnectionCapabilityElement parse(ByteBuffer payload) { 54 while (payload.hasRemaining()) { 55 statusList.add(ProtocolPortTuple.parse(payload));
|
HSFriendlyNameElement.java | 45 * @param payload The buffer to read from 50 public static HSFriendlyNameElement parse(ByteBuffer payload) 53 while (payload.hasRemaining()) { 54 I18Name name = I18Name.parse(payload);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/anqp/eap/ |
ExpandedEAPMethod.java | 51 * @param payload The byte buffer to read from 58 public static ExpandedEAPMethod parse(ByteBuffer payload, int length, boolean inner) 66 int vendorID = (int) ByteBufferReader.readInteger(payload, ByteOrder.BIG_ENDIAN, 3) 68 long vendorType = ByteBufferReader.readInteger(payload, ByteOrder.BIG_ENDIAN, 4)
|
/hardware/intel/img/hwcomposer/merrifield/ips/common/ |
RotationBufferProvider.h | 46 bool setupRotationBuffer(VideoPayloadBuffer *payload, int transform); 51 bool startVA(VideoPayloadBuffer *payload, int transform); 57 bool createVaSurface(VideoPayloadBuffer *payload, int transform, bool isTarget);
|
/hardware/intel/img/hwcomposer/moorefield_hdmi/ips/common/ |
RotationBufferProvider.h | 46 bool setupRotationBuffer(VideoPayloadBuffer *payload, int transform); 51 bool startVA(VideoPayloadBuffer *payload, int transform); 57 bool createVaSurface(VideoPayloadBuffer *payload, int transform, bool isTarget);
|
/prebuilts/gdb/darwin-x86/lib/python2.7/email/ |
iterators.py | 43 payload = subpart.get_payload(decode=decode) 44 if isinstance(payload, basestring): 45 for line in StringIO(payload):
|
/prebuilts/gdb/linux-x86/lib/python2.7/email/ |
iterators.py | 43 payload = subpart.get_payload(decode=decode) 44 if isinstance(payload, basestring): 45 for line in StringIO(payload):
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/email/ |
iterators.py | 43 payload = subpart.get_payload(decode=decode) 44 if isinstance(payload, basestring): 45 for line in StringIO(payload):
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/email/ |
iterators.py | 43 payload = subpart.get_payload(decode=decode) 44 if isinstance(payload, basestring): 45 for line in StringIO(payload):
|
/system/gatekeeper/ |
gatekeeper_messages.cpp | 105 gatekeeper_error_t GateKeeperMessage::Deserialize(const uint8_t *payload, const uint8_t *end) { 106 if (payload + sizeof(uint32_t) > end) return ERROR_INVALID; 107 const serial_header_t *header = reinterpret_cast<const serial_header_t *>(payload); 109 if (payload == end) return ERROR_INVALID; 111 error = nonErrorDeserialize(payload + sizeof(*header), end); 116 if (payload + sizeof(serial_header_t) < end) { 117 memcpy(&retry_timeout, payload + sizeof(serial_header_t), sizeof(retry_timeout)); 170 gatekeeper_error_t VerifyRequest::nonErrorDeserialize(const uint8_t *payload, const uint8_t *end) { 182 memcpy(&challenge, payload, sizeof(challenge)); 183 payload += sizeof(challenge) [all...] |
/external/syslinux/core/lwip/src/core/snmp/ |
asn1_enc.c | 193 msg_ptr = (u8_t*)p->payload; 225 msg_ptr = (u8_t*)p->payload; 242 msg_ptr = (u8_t*)p->payload; 268 msg_ptr = (u8_t*)p->payload; 320 msg_ptr = (u8_t*)p->payload; 334 msg_ptr = (u8_t*)p->payload; 353 msg_ptr = (u8_t*)p->payload; 396 msg_ptr = (u8_t*)p->payload; 409 msg_ptr = (u8_t*)p->payload; 450 msg_ptr = (u8_t*)p->payload; [all...] |
/external/android-clat/ |
translate.h | 70 uint32_t checksum, const uint8_t *payload, size_t payload_size); 72 const uint8_t *payload, size_t payload_size); 75 int generic_packet(clat_packet out, clat_packet_index pos, const uint8_t *payload, size_t len); 85 const uint8_t *payload, size_t payload_size); 88 const uint8_t *payload, size_t payload_size);
|
/external/ltp/testcases/kernel/syscalls/request_key/ |
request_key03.c | 59 static void test_with_key_type(const char *type, const char *payload, 72 TEST(add_key(type, "desc", payload, strlen(payload), 92 * payload is valid), or it should fail with EINVAL (if the payload 94 * types because they have a quirk where the payload syntax differs 109 TEST(add_key(type, "desc", payload, strlen(payload), 196 test_with_key_type("user", "payload", 20);
|
/external/syslinux/com32/gdbstub/ |
gdbstub.c | 34 SIZEOF_PAYLOAD = 256, /* buffer size of GDB payload data */ 80 /* Buffer for payload data when parsing a packet. Once the 82 * the reply payload. */ 83 char buf[SIZEOF_PAYLOAD + 4]; /* $...PAYLOAD...#XX */ 84 char *payload; /* start of payload */ member in struct:gdbstub 85 int len; /* length of payload */ 314 uint8_t cksum = gdbstub_cksum(stub->payload, stub->len); 326 stub->payload[0] = 'O'; 327 stub->payload[1] = 'K' [all...] |
/external/webrtc/webrtc/modules/rtp_rtcp/source/rtcp_packet/ |
bye.cc | 36 bool Bye::Parse(const RtcpCommonHeader& header, const uint8_t* payload) { 49 reason_length = payload[4u * src_count]; 60 sender_ssrc_ = ByteReader<uint32_t>::ReadBigEndian(payload); 63 csrcs_[i - 1] = ByteReader<uint32_t>::ReadBigEndian(&payload[4 * i]); 67 reason_.assign(reinterpret_cast<const char*>(&payload[4u * src_count + 1]),
|