/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 502 "encrypted payload"); 524 wpa_printf(MSG_INFO, "IKEV2: Too short IDr payload"); 690 u8 *payload, size_t payload_len) 696 if (ikev2_parse_payloads(&pl, next_payload, payload, payload + 912 wpa_printf(MSG_DEBUG, "IKEV2: Adding SAi payload"); 971 wpa_printf(MSG_DEBUG, "IKEV2: Adding KEi payload"); 1007 wpa_printf(MSG_DEBUG, "IKEV2: Adding Ni payload"); 1026 wpa_printf(MSG_DEBUG, "IKEV2: Adding IDi payload"); 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument [all...] |
H A D | tncs.c | 783 char *buf, *start, *end, *pos, *pos2, *payload; local 832 payload = start; 885 start = payload;
|
/external/android-clat/ |
H A D | clatd_test.cpp | 202 void *payload; local 215 payload = ip + 1; 234 payload = frag + 1; 240 // Since there are no extension headers except Fragment, this must be the payload. 242 payload = ip6 + 1; 257 // If we understand the payload, verify the checksum. 264 checksum = ip_checksum_finish(ip_checksum_add(pseudo_checksum, payload, payload_length)); 267 checksum = ip_checksum(payload, payload_length); 277 struct udphdr *udp = (struct udphdr *) payload; 346 // Copy the payload 522 const void *payload; local 812 uint8_t payload[] = { PAYLOAD }; local [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | isakmp.c | 394 * main processing to handle isakmp payload 1449 "invalid length of payload\n"); 1461 "invalid length of payload\n"); 2557 * save partner's(payload) data into phhandle. 2567 "ignore this payload, same payload type exist.\n"); 2651 * set values into allocated buffer of isakmp payload. 2662 plog(LLV_DEBUG, LOCATION, NULL, "add payload of len %zu, next type %d\n", 2952 isakmp_plist_append (struct payload_list *plist, vchar_t *payload, int payload_type) 2965 plist->payload 2951 isakmp_plist_append(struct payload_list *plist, vchar_t *payload, int payload_type) argument [all...] |
H A D | isakmp.h | 108 #define ISAKMP_NPTYPE_FRAG 132 /* IKE fragmentation payload */ 196 The value of the next payload field MUST only contain the value "2" 198 then this field will be 2. If the current Proposal payload is the 213 The value of the next payload field MUST only contain the value "3" 215 then this field will be 3. If the current Transform payload is the 386 vchar_t *payload; member in struct:payload_list 405 /* IKE fragmentation payload */
|
/external/libvncserver/libvncserver/ |
H A D | websockets.c | 616 char *buf, *payload; local 701 payload = buf + fhlen + 4; /* header length + mask */ 716 payload32 = (uint32_t *)payload; 722 payload[i] ^= mask.c[i % 4]; 727 rfbLog("got closure, reason %d\n", WS_NTOH16(((uint16_t *)payload)[0])); 731 if (-1 == (flength = __b64_pton(payload, (unsigned char *)wsctx->codeBuf, sizeof(wsctx->codeBuf)))) { 735 payload = wsctx->codeBuf; 739 memcpy(wsctx->readbuf, payload + len, flength - len); 744 memcpy(dst, payload, flength);
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
H A D | brw_wm.h | 46 * additional regs will inserted before the main payload in the WM 234 } payload; member in struct:brw_wm_compile
|
/external/mesa3d/src/mesa/main/ |
H A D | attrib.c | 185 * Allocate new attribute node of given type/kind. Attach payload data. 190 GLbitfield kind, void *payload) 195 n->data = payload; 189 save_attrib_data(struct gl_attrib_node **head, GLbitfield kind, void *payload) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | tncc.c | 690 char *buf, *start, *end, *pos, *pos2, *payload; local 741 payload = start; 794 start = payload;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | tncs.c | 783 char *buf, *start, *end, *pos, *pos2, *payload; local 832 payload = start; 885 start = payload;
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | tncc.c | 690 char *buf, *start, *end, *pos, *pos2, *payload; local 741 payload = start; 794 start = payload;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | tncs.c | 783 char *buf, *start, *end, *pos, *pos2, *payload; local 832 payload = start; 885 start = payload;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | tncc.c | 690 char *buf, *start, *end, *pos, *pos2, *payload; local 741 payload = start; 794 start = payload;
|
/external/kernel-headers/original/uapi/linux/wimax/ |
H A D | i2400m.h | 83 * (struct i2400m_tlv_hdr) and then the payload. 94 * no (TLV) payload. Execution of a command might cause 178 * @payload: the beginning of data attached to this header 185 char payload[0]; member in struct:i2400m_bootrom_header 220 * @reorder: if this payload has to be reorder or not (and how) 276 * Hardware payload descriptor 301 * in the file header about message header and payload descriptor 406 * TLVs stand for type-length-value and are the header for a payload 407 * composed of almost anything. Each payload has a type assigned 426 __le16 length; /* payload' [all...] |
/external/v8/src/ |
H A D | serialize.cc | 1789 List<byte> payload; local 1790 ListSnapshotSink list_sink(&payload); 1801 SerializedCodeData data(&payload, &cs); 1991 SnapshotByteSource payload(scd.Payload(), scd.PayloadLength()); 1992 Deserializer deserializer(&payload); 2023 SerializedCodeData::SerializedCodeData(List<byte>* payload, CodeSerializer* cs) argument 2031 int data_length = kHeaderSize + stub_keys_size + payload->length(); 2042 SetHeaderValue(kPayloadLengthOffset, payload->length()); 2053 CopyBytes(data + kHeaderSize + stub_keys_size, payload->begin(), 2054 static_cast<size_t>(payload [all...] |
/external/valgrind/exp-dhat/ |
H A D | dh_main.c | 73 Addr payload; member in struct:__anon16271 79 /* Approx histogram, one byte per payload byte. Counts latch up 99 if (b1->payload + b1->req_szB <= b2->payload) return -1; 100 if (b2->payload + b2->req_szB <= b1->payload) return 1; 115 && fbc_cache0->payload <= a 116 && a < fbc_cache0->payload + fbc_cache0->req_szB)) { 122 && fbc_cache1->payload <= a 123 && a < fbc_cache1->payload [all...] |
/external/webp/src/demux/ |
H A D | demux.c | 282 // enough data ('min_size') to parse the payload. 377 // the user to request the payload via a fourcc string. 'size' includes the 378 // header and the unpadded payload size. 538 // Store only the chunk header and unpadded size as only the payload 851 const uint8_t* const payload = local 853 if (payload == NULL) return 0; 869 iter->fragment.bytes = payload;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | events.c | 3030 const u8 *payload; local 3038 payload = frame + IEEE80211_HDRLEN; 3039 category = *payload++; 3047 wmm_ac_rx_action(wpa_s, mgmt->da, mgmt->sa, payload, plen); 3053 ft_rx_action(wpa_s, payload, plen); 3061 sme_sa_query_rx(wpa_s, mgmt->sa, payload, plen); 3079 payload, plen, freq) == 0) 3085 payload[0] == WLAN_TDLS_DISCOVERY_RESPONSE) { 3095 payload[0] == QOS_QOS_MAP_CONFIG) { 3096 const u8 *pos = payload [all...] |
/external/blktrace/ |
H A D | blkparse.c | 575 void *payload = (caddr_t) bit + sizeof(*bit); local 580 add_ppm_hash(bit->pid, payload); 586 memcpy(two32, payload, sizeof(two32)); 605 memcpy(msg, (char *)payload, bit->pdu_len);
|
/external/libnfc-nxp/src/ |
H A D | phHciNfc_Generic.h | 524 uint8_t payload[PHHCINFC_MAX_PACKET_DATA - 1]; member in struct:phHciNfc_HCP_Message 537 uint8_t payload[PHHCINFC_MAX_PACKET_DATA]; member in union:phHciNfc_HCP_Packet::__anon8894 1140 * payload to which the data is to be
|
/external/libvpx/libvpx/third_party/libwebm/ |
H A D | mkvmuxer.cpp | 356 const uint64 payload = PayloadSize(); local 358 EbmlMasterElementSize(kMkvContentEncAESSettings, payload) + payload; 363 const uint64 payload = PayloadSize(); local 365 if (!WriteEbmlMasterElement(writer, kMkvContentEncAESSettings, payload)) 377 stop_position - payload_position != static_cast<int64>(payload))
|
/external/lldb/source/Plugins/LanguageRuntime/ObjC/AppleObjCRuntime/ |
H A D | AppleObjCRuntimeV2.cpp | 913 uint64_t* payload = NULL) 1472 uint64_t payload) 1481 m_payload = payload; 1487 uint64_t payload) 1501 m_payload = payload; 1542 uint64_t* payload = NULL) 1548 if (payload) 1549 *payload = GetPayload(); 1471 ClassDescriptorV2Tagged(ConstString class_name, uint64_t payload) argument 1486 ClassDescriptorV2Tagged(ObjCLanguageRuntime::ClassDescriptorSP actual_class_sp, uint64_t payload) argument
|
/external/lldb/tools/debugserver/source/ |
H A D | RNBRemote.cpp | 102 // followed by the payload and then '#' and checksum, then you are done 105 // - modify the switch statement for the first character in the payload 108 // - modify the switch statement for the first character in the payload 109 // in RNBRemote::GetPacketPayload and make sure the payload of the packet 180 t.push_back (Packet (set_max_payload_size, &RNBRemote::HandlePacket_QSetMaxPayloadSize , NULL, "QSetMaxPayloadSize:", "Tell " DEBUGSERVER_PROGRAM_NAME " the max sized payload gdb can handle")); 461 std::string payload; local 462 rnb_err_t err = GetPacketPayload (payload); 479 err = GetPacketPayload (payload); 501 if (payload.compare (0, it->abbrev.size(), it->abbrev) == 0) 510 DNBLogThreadedIf (LOG_RNB_PACKETS, "unimplemented packet: '%s'", payload [all...] |
/external/openssh/ |
H A D | packet.c | 108 struct sshbuf *payload; member in struct:packet 836 * If using packet compression, compress the payload of the outgoing 1086 /* skip header, compress only payload */ 1103 /* sizeof (packet_len + pad_len + payload) */ 1134 /* sizeof (packet_len + pad_len + payload + padding) */ 1141 /* packet_length includes payload, padding and padding length field */ 1147 /* compute MAC over seqnr and packet(length fields, payload, padding) */ 1221 p->payload = state->outgoing_packet; 1245 state->outgoing_packet = p->payload; 1612 /* only the payload i [all...] |
/external/v8/src/arm64/ |
H A D | simulator-arm64.cc | 2783 // - The payload (mantissa) is transferred entirely, except that the top 2785 // (low-order) payload bits are set to 0. 2790 uint64_t payload = unsigned_bitextract_64(21, 0, raw); local 2791 payload <<= (52 - 23); // The unused low-order bits should be 0. 2792 payload |= (1L << 51); // Force a quiet NaN. 2794 return rawbits_to_double((sign << 63) | (exponent << 52) | payload); 2824 // - The payload (mantissa) is transferred as much as possible, except 2830 uint32_t payload = unsigned_bitextract_64(50, 52 - 23, raw); local 2831 payload |= (1 << 22); // Force a quiet NaN. 2833 return rawbits_to_float((sign << 31) | (exponent << 23) | payload); [all...] |