/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | IccIoResult.java | 28 public byte[] payload; field in class:IccIoResult 30 public IccIoResult(int sw1, int sw2, byte[] payload) { argument 33 this.payload = payload;
|
/frameworks/base/packages/Osu/src/com/android/anqp/ |
H A D | HSIconFileElement.java | 23 public HSIconFileElement(Constants.ANQPElementType infoID, ByteBuffer payload) argument 27 if (payload.remaining() < 4) { 28 throw new ProtocolException("Truncated icon file: " + payload.remaining()); 31 int statusID = payload.get() & BYTE_MASK; 33 mType = Constants.getPrefixedString(payload, 1, StandardCharsets.US_ASCII); 35 int dataLength = payload.getShort() & SHORT_MASK; 37 payload.get(mIconData);
|
H A D | IconInfo.java | 21 public IconInfo(ByteBuffer payload) throws ProtocolException { argument 22 if (payload.remaining() < 9) { 26 mWidth = payload.getShort() & SHORT_MASK; 27 mHeight = payload.getShort() & SHORT_MASK; 28 mLanguage = Constants.getTrimmedString(payload, 30 mIconType = Constants.getPrefixedString(payload, 1, StandardCharsets.US_ASCII); 31 mFileName = Constants.getPrefixedString(payload, 1, StandardCharsets.UTF_8);
|
H A D | OSUProvider.java | 31 public OSUProvider(String ssid, ByteBuffer payload) throws ProtocolException { argument 32 if (payload.remaining() < 11) { 33 throw new ProtocolException("Truncated OSU provider: " + payload.remaining()); 38 int length = payload.getShort() & SHORT_MASK; 39 int namesLength = payload.getShort() & SHORT_MASK; 41 ByteBuffer namesBuffer = payload.duplicate().order(ByteOrder.LITTLE_ENDIAN); 43 payload.position(payload.position() + namesLength); 51 mOSUServer = Constants.getPrefixedString(payload, 1, StandardCharsets.UTF_8); 52 int methodLength = payload [all...] |
/frameworks/base/packages/Osu/src/com/android/anqp/eap/ |
H A D | ExpandedEAPMethod.java | 20 public ExpandedEAPMethod(EAP.AuthInfoID authInfoID, int length, ByteBuffer payload) argument 23 throw new ProtocolException("Bad length: " + payload.remaining()); 28 ByteBuffer vndBuffer = payload.duplicate().order(ByteOrder.BIG_ENDIAN); 35 payload.position(payload.position()+7);
|
H A D | Credential.java | 29 public Credential(EAP.AuthInfoID infoID, int length, ByteBuffer payload) argument 36 int typeID = payload.get() & BYTE_MASK;
|
H A D | EAPMethod.java | 24 public EAPMethod(ByteBuffer payload) throws ProtocolException { argument 25 if (payload.remaining() < 3) { 26 throw new ProtocolException("Runt EAP Method: " + payload.remaining()); 29 int length = payload.get() & Constants.BYTE_MASK; 30 int methodID = payload.get() & Constants.BYTE_MASK; 31 int count = payload.get() & Constants.BYTE_MASK; 38 ByteBuffer paramPayload = payload.duplicate().order(ByteOrder.LITTLE_ENDIAN); 40 payload.position(payload.position() + length - 2);
|
H A D | NonEAPInnerAuth.java | 33 public NonEAPInnerAuth(int length, ByteBuffer payload) throws ProtocolException { argument 35 throw new ProtocolException("Bad length: " + payload.remaining()); 38 int typeID = payload.get() & BYTE_MASK;
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/asn1/ |
H A D | Asn1Constructed.java | 11 ByteBuffer payload, int tagPosition) { 12 super(tag, asn1Class, true, length, payload); 10 Asn1Constructed(int tag, Asn1Class asn1Class, int length, ByteBuffer payload, int tagPosition) argument
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/ |
H A D | HSIconFileElement.java | 23 public HSIconFileElement(Constants.ANQPElementType infoID, ByteBuffer payload) argument 27 if (payload.remaining() < 4) { 28 throw new ProtocolException("Truncated icon file: " + payload.remaining()); 31 int statusID = payload.get() & BYTE_MASK; 33 mType = Constants.getPrefixedString(payload, 1, StandardCharsets.US_ASCII); 35 int dataLength = payload.getShort() & SHORT_MASK; 37 payload.get(mIconData);
|
H A D | I18Name.java | 20 public I18Name(ByteBuffer payload) throws ProtocolException { argument 21 if (payload.remaining() < Constants.LANG_CODE_LENGTH + 1) { 22 throw new ProtocolException("Truncated I18Name: " + payload.remaining()); 24 int nameLength = payload.get() & BYTE_MASK; 28 mLanguage = Constants.getTrimmedString(payload, 31 mText = Constants.getString(payload, nameLength -
|
H A D | HSConnectionCapabilityElement.java | 25 private ProtocolTuple(ByteBuffer payload) throws ProtocolException { argument 26 if (payload.remaining() < 4) { 27 throw new ProtocolException("Runt protocol tuple: " + payload.remaining()); 29 mProtocol = payload.get() & Constants.BYTE_MASK; 30 mPort = payload.getShort() & Constants.SHORT_MASK; 31 int statusNumber = payload.get() & Constants.BYTE_MASK; 59 public HSConnectionCapabilityElement(Constants.ANQPElementType infoID, ByteBuffer payload) argument 64 while (payload.hasRemaining()) { 65 mStatusList.add(new ProtocolTuple(payload));
|
H A D | IPAddressTypeAvailabilityElement.java | 20 public IPAddressTypeAvailabilityElement(Constants.ANQPElementType infoID, ByteBuffer payload) argument 24 if (payload.remaining() != 1) 26 payload.remaining()); 28 int ipField = payload.get();
|
H A D | IconInfo.java | 22 public IconInfo(ByteBuffer payload) throws ProtocolException { argument 23 if (payload.remaining() < 9) { 27 mWidth = payload.getShort() & SHORT_MASK; 28 mHeight = payload.getShort() & SHORT_MASK; 29 mLanguage = Constants.getTrimmedString(payload, 31 mIconType = Constants.getPrefixedString(payload, 1, StandardCharsets.US_ASCII); 32 mFileName = Constants.getPrefixedString(payload, 1, StandardCharsets.UTF_8);
|
H A D | NetworkAuthenticationTypeElement.java | 53 public NetworkAuthenticationTypeElement(Constants.ANQPElementType infoID, ByteBuffer payload) argument 60 while (payload.hasRemaining()) { 61 int typeNumber = payload.get() & BYTE_MASK; 68 Constants.getPrefixedString(payload, 2, StandardCharsets.UTF_8)));
|
H A D | OSUProvider.java | 30 public OSUProvider(ByteBuffer payload) throws ProtocolException { argument 31 if (payload.remaining() < 11) { 32 throw new ProtocolException("Truncated OSU provider: " + payload.remaining()); 35 int length = payload.getShort() & SHORT_MASK; 36 int namesLength = payload.getShort() & SHORT_MASK; 38 ByteBuffer namesBuffer = payload.duplicate().order(ByteOrder.LITTLE_ENDIAN); 40 payload.position(payload.position() + namesLength); 48 mOSUServer = Constants.getPrefixedString(payload, 1, StandardCharsets.UTF_8); 49 int methodLength = payload [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/anqp/eap/ |
H A D | InnerAuthEAP.java | 15 public InnerAuthEAP(int length, ByteBuffer payload) throws ProtocolException { argument 19 int typeID = payload.get() & BYTE_MASK;
|
H A D | EAPMethod.java | 25 public EAPMethod(ByteBuffer payload) throws ProtocolException { argument 26 if (payload.remaining() < 3) { 27 throw new ProtocolException("Runt EAP Method: " + payload.remaining()); 30 int length = payload.get() & Constants.BYTE_MASK; 31 int methodID = payload.get() & Constants.BYTE_MASK; 32 int count = payload.get() & Constants.BYTE_MASK; 39 ByteBuffer paramPayload = payload.duplicate().order(ByteOrder.LITTLE_ENDIAN); 41 payload.position(payload.position() + length - 2);
|
H A D | ExpandedEAPMethod.java | 20 public ExpandedEAPMethod(EAP.AuthInfoID authInfoID, int length, ByteBuffer payload) argument 23 throw new ProtocolException("Bad length: " + payload.remaining()); 28 ByteBuffer vndBuffer = payload.duplicate().order(ByteOrder.BIG_ENDIAN); 35 payload.position(payload.position()+7);
|
H A D | NonEAPInnerAuth.java | 33 public NonEAPInnerAuth(int length, ByteBuffer payload) throws ProtocolException { argument 35 throw new ProtocolException("Bad length: " + payload.remaining()); 38 int typeID = payload.get() & BYTE_MASK;
|
/frameworks/base/core/java/android/service/gatekeeper/ |
H A D | GateKeeperResponse.java | 63 byte[] payload = new byte[size]; 64 source.readByteArray(payload); 65 response.setPayload(payload); 116 private void setPayload(byte[] payload) { argument 117 mPayload = payload;
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | VerifyCredentialResponse.java | 51 byte[] payload = new byte[size]; 52 source.readByteArray(payload); 53 response.setPayload(payload); 72 public VerifyCredentialResponse(byte[] payload) { argument 73 mPayload = payload; 83 private VerifyCredentialResponse(int responseCode, int timeout, byte[] payload) { argument 86 mPayload = payload; 123 private void setPayload(byte[] payload) { argument 124 mPayload = payload;
|
/frameworks/base/libs/hwui/renderthread/ |
H A D | RenderTask.h | 79 void* payload() { return mData; } function in class:android::uirenderer::renderthread::MethodInvokeRenderTask
|
/frameworks/opt/net/voip/src/jni/rtp/ |
H A D | G711Codec.cpp | 41 int encode(void *payload, int16_t *samples); 42 int decode(int16_t *samples, int count, void *payload, int length); 47 int UlawCodec::encode(void *payload, int16_t *samples) argument 49 int8_t *ulaws = (int8_t *)payload; 67 int UlawCodec::decode(int16_t *samples, int count, void *payload, int length) argument 69 int8_t *ulaws = (int8_t *)payload; 92 int encode(void *payload, int16_t *samples); 93 int decode(int16_t *samples, int count, void *payload, int length); 98 int AlawCodec::encode(void *payload, int16_t *samples) argument 100 int8_t *alaws = (int8_t *)payload; 117 decode(int16_t *samples, int count, void *payload, int length) argument [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiCertManager.java | 132 protected void writeConfigFile(byte[] payload) { argument 133 final byte[] data = payload;
|