Home
last modified time | relevance | path

Searched refs:uint8_t (Results 1 – 25 of 101) sorted by relevance

12345

/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-0844/
Dlocal_poc.h92 uint8_t platform_type_valid;
94 uint8_t hdr_tbl_info_valid;
96 uint8_t v4_route_tbl_info_valid;
98 uint8_t v6_route_tbl_info_valid;
100 uint8_t v4_filter_tbl_start_addr_valid;
102 uint8_t v6_filter_tbl_start_addr_valid;
104 uint8_t modem_mem_info_valid;
106 uint8_t ctrl_comm_dest_end_pt_valid;
108 uint8_t is_ssr_bootup_valid;
109 uint8_t is_ssr_bootup;
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2014/
Dpoc.cpp29 void cback(uint8_t, tRW_DATA *) {} in cback() argument
31 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
33 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
49 uint8_t nci_status = NCI_STATUS_OK; in main()
50 uint8_t num_responses = 1; in main()
51 uint8_t sensf_res_buf_size = in main()
53 uint8_t *p_sensf_res_buf = in main()
54 (uint8_t *)malloc(RW_T3T_SENSF_RES_RD_OFFSET + RW_T3T_SENSF_RES_RD_LEN); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2115/
Dpoc.cpp25 const uint8_t *authTokenKey = nullptr;
40 bool GetAuthTokenKey(const uint8_t **auth_token_key, in GetAuthTokenKey()
42 *auth_token_key = (const uint8_t *)(new uint8_t()); in GetAuthTokenKey()
46 void GetPasswordKey(const uint8_t **password_key __attribute__((unused)), in GetPasswordKey()
48 void ComputePasswordSignature(uint8_t *signature __attribute__((unused)), in ComputePasswordSignature()
50 const uint8_t *key __attribute__((unused)), in ComputePasswordSignature()
52 const uint8_t *password __attribute__((unused)), in ComputePasswordSignature()
57 void ComputeSignature(uint8_t *signature __attribute__((unused)), in ComputeSignature()
59 const uint8_t *key __attribute__((unused)), in ComputeSignature()
61 const uint8_t *message __attribute__((unused)), in ComputeSignature()
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0473/
Dpoc.cpp29 tNFC_STATUS rw_t3t_select(uint8_t peerNfcID[NCI_RF_F_UID_LEN],
30 uint8_t mrtiCheck, uint8_t mrtiUpdate);
33 static void *(*real_GKI_getpoolbuf)(uint8_t pool_id) = nullptr;
52 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
54 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
62 (void *(*)(uint8_t))dlsym(RTLD_NEXT, "_Z14GKI_getpoolbufh"); in init()
69 void *GKI_getpoolbuf(uint8_t pool_id) { in GKI_getpoolbuf()
107 uint8_t peerNfcID[NCI_RF_F_UID_LEN]; in main()
108 uint8_t mrtiCheck = 1, mrtiUpdate = 1; in main()
118 uint8_t conn_id = NFC_RF_CONN_ID; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0925/
Dstubs.cpp42 uint8_t NFC_GetNCIVersion() { in NFC_GetNCIVersion()
46 tNFC_STATUS NFC_SendData(uint8_t conn_id, NFC_HDR* p_data) { in NFC_SendData()
47 uint8_t* p = (uint8_t*)(p_data + 1) + p_data->offset; in NFC_SendData()
48 uint8_t len = (uint8_t)p_data->len; in NFC_SendData()
55 uint8_t nci_snd_t3t_polling(uint16_t system_code, uint8_t rc, uint8_t tsn) { in nci_snd_t3t_polling()
Dpoc.cpp25 extern void Type4_Fuzz(uint8_t SubType, const std::vector<bytes_t> &Packets);
53 static std::vector<bytes_t> UnpackPackets(const uint8_t *Data, size_t Size) { in UnpackPackets()
88 std::vector<uint8_t> bufVector(size); in main()
92 const uint8_t *data = (const uint8_t *)bufVector.data(); in main()
/cts/apps/CtsVerifier/jni/midi/
DMidiTestManager.cpp38 static const uint8_t kMIDIChanCmd_KeyDown = 9;
39 static const uint8_t kMIDIChanCmd_KeyUp = 8;
40 static const uint8_t kMIDIChanCmd_PolyPress = 10;
41 static const uint8_t kMIDIChanCmd_Control = 11;
42 static const uint8_t kMIDIChanCmd_ProgramChange = 12;
43 static const uint8_t kMIDIChanCmd_ChannelPress = 13;
44 static const uint8_t kMIDIChanCmd_PitchWheel = 14;
46 static const uint8_t kMIDISysCmd_SysEx = 0xF0;
47 static const uint8_t kMIDISysCmd_EndOfSysEx = 0xF7;
48 static const uint8_t kMIDISysCmd_ActiveSensing = 0xFE;
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9410/
Dpoc.cpp44 uint8_t majorVersion = 1; in main()
45 uint8_t minorVersion = 0; in main()
46 uint8_t axisOffset = 0x10; in main()
47 uint8_t axisCount = 0xFF; in main()
48 uint8_t axisSize = 0x14; in main()
50 size_t allocatedSize = sizeof(uint8_t) * 16; in main()
52 uint8_t* fvarData = (uint8_t*) malloc(allocatedSize); in main()
/cts/hostsidetests/securitybulletin/securityPatch/Bug-137878930/
Dpoc.cpp39 static Vector<uint8_t> sessionId;
50 static const Vector<uint8_t> toVector(const hidl_vec<uint8_t> &vec) { in toVector()
51 Vector<uint8_t> vector; in toVector()
53 return *const_cast<const Vector<uint8_t> *>(&vector); in toVector()
56 static hidl_vec<uint8_t> toHidlVec(const Vector<uint8_t> &vector) { in toHidlVec()
57 hidl_vec<uint8_t> vec; in toHidlVec()
58 vec.setToExternal(const_cast<uint8_t *>(vector.array()), vector.size()); in toHidlVec()
97 const uint8_t uuid[16], in makeDrmPlugin()
111 const uint8_t uuid[16] = {0x10, 0x77, 0xef, 0xec, 0xc0, 0xb2, 0x4d, 0x02, in createPlugin()
134 [&](Status status, const hidl_vec<uint8_t> &id) { in openSession()
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0430/
Dpoc.cpp28 void GKI_start_timer(uint8_t, int32_t, bool) { in GKI_start_timer() argument
31 void GKI_stop_timer(uint8_t) { in GKI_stop_timer() argument
43 uint8_t selres = 1; in main()
44 uint8_t uid[MFC_UID_LEN] = { 1 }; in main()
59 p_data->data.p_data = (NFC_HDR*) malloc(sizeof(uint8_t) * 16); in main()
72 p_mfc->p_ndef_buffer = (uint8_t*) malloc(sizeof(uint8_t) * 16); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2022/
Dpoc.cpp53 tNFC_STATUS rw_t3t_select(uint8_t peer_nfcid2[NCI_RF_F_UID_LEN],
54 uint8_t mrti_check, uint8_t mrti_update);
112 void GKI_start_timer(uint8_t, int32_t, bool) { in GKI_start_timer() argument
115 void GKI_stop_timer(uint8_t) { in GKI_stop_timer() argument
128 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in trigger_OOB_via_rw_t3t_act_handle_fmt_rsp()
129 uint8_t mrti_check = 1, mrti_update = 1; in trigger_OOB_via_rw_t3t_act_handle_fmt_rsp()
152 uint8_t* p_t3t_rsp = (uint8_t*) (p_msg + 1) + (p_msg->offset + 1); in trigger_OOB_via_rw_t3t_act_handle_fmt_rsp()
156 uint8_t* p_mc = &p_t3t_rsp[T3T_MSG_RSP_OFFSET_CHECK_DATA]; in trigger_OOB_via_rw_t3t_act_handle_fmt_rsp()
178 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in trigger_OOB_via_rw_t3t_act_handle_sro_rsp()
179 uint8_t mrti_check = 1, mrti_update = 1; in trigger_OOB_via_rw_t3t_act_handle_sro_rsp()
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2021/
Dpoc.cpp48 tNFC_STATUS rw_t3t_select(uint8_t peer_nfcid2[NCI_RF_F_UID_LEN],
49 uint8_t mrti_check, uint8_t mrti_update);
86 void GKI_start_timer(uint8_t, int32_t, bool) { in GKI_start_timer() argument
89 void GKI_stop_timer(uint8_t) { in GKI_stop_timer() argument
103 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in main()
104 uint8_t mrti_check = 1, mrti_update = 1; in main()
127 uint8_t* p_t3t_rsp = (uint8_t*) (p_msg + 1) + (p_msg->offset + 1); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9563/
Dpoc.cpp25 extern tLLCP_STATUS llcp_util_parse_cc(uint8_t* p_bytes, uint16_t length,
26 uint16_t* p_miu, uint8_t* p_rw);
30 uint8_t* p_bytes = (uint8_t *)malloc(SIZE); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0596/
Dpoc.cpp41 uint8_t NFC_GetNCIVersion() { in NFC_GetNCIVersion()
51 uint8_t *buffer = (uint8_t*) memalign(16, 16 * sizeof(uint8_t)); in main()
56 uint8_t bufferSize = 1; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2035/
Dpoc.cpp24 tNFC_STATUS rw_i93_select(uint8_t* p_uid);
29 void GKI_start_timer(uint8_t, int32_t, bool) { in GKI_start_timer() argument
32 void GKI_stop_timer(uint8_t) { in GKI_stop_timer() argument
41 uint8_t p_uid = 1; in main()
54 p_data->data.p_data = (NFC_HDR *) malloc(sizeof(uint8_t) * 32); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9558/
Dpoc.cpp28 void rw_t2t_handle_rsp(uint8_t *p_data);
45 uint8_t *base_ptr = (uint8_t *)(p_t2t->lockbyte + RW_T1T_MAX_LOCK_BYTES); in main()
47 uint8_t data[T2T_READ_DATA_LEN]; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2039/
Dpoc.cpp30 tNFC_STATUS rw_i93_select(uint8_t* p_uid);
34 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
36 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
44 uint8_t p_uid = 1; in main()
57 p_data->data.p_data = (NFC_HDR*)malloc(sizeof(uint8_t) * 16); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2206/
Dpoc.cpp31 tNFC_STATUS rw_i93_select(uint8_t *p_uid);
35 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
37 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
45 uint8_t p_uid = 1; in main()
60 (NFC_HDR *)malloc(sizeof(uint8_t) * (OFFSET + PLENGTH) * 2); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2207/
Dpoc.cpp27 uint8_t data_len = SIZE * 6; in main()
28 uint8_t *data = (uint8_t *)malloc(SIZE); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2013/
Dpoc.cpp50 tNFC_STATUS rw_t3t_select(uint8_t peer_nfcid2[NCI_RF_F_UID_LEN],
51 uint8_t mrti_check, uint8_t mrti_update);
145 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in main()
146 uint8_t mrti_check = 1, mrti_update = 1; in main()
172 uint8_t* p_t3t_rsp = (uint8_t*) (p_msg + 1) + (p_msg->offset + 1); in main()
176 uint8_t* p_mc = &p_t3t_rsp[T3T_MSG_RSP_OFFSET_CHECK_DATA]; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9564/
Dpoc.cpp25 extern bool llcp_util_parse_link_params(uint16_t length, uint8_t* p_bytes);
29 uint8_t* p_bytes = (uint8_t *)malloc(SIZE); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0450/
Dpoc.cpp38 tNFC_STATUS rw_i93_select(uint8_t *p_uid);
45 uint8_t *p_data) = nullptr;
52 (tNFC_STATUS(*)(uint16_t, uint8_t *))dlsym(RTLD_NEXT, in init()
98 size_t rw_i93_send_cmd_write_single_block(uint16_t block_number, uint8_t *p_data) { in rw_i93_send_cmd_write_single_block()
124 uint8_t p_uid = 1; in main()
138 p_data->data.p_data = (NFC_HDR *)GKI_getbuf(sizeof(uint8_t) * 16); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9561/
Dpoc.cpp25 extern tLLCP_STATUS llcp_util_parse_connect(uint8_t* p_bytes, uint16_t length,
30 uint8_t* p_bytes = (uint8_t *)malloc(SIZE); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2038/
Dpoc.cpp26 tNFC_STATUS rw_i93_select(uint8_t* p_uid);
30 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
32 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
40 uint8_t p_uid = 1; in main()
/cts/tests/tests/media/libaudiojni/
Daudio-metadata-native.cpp55 const uint8_t* bytes = in Java_android_media_cts_AudioMetadataTest_nativeGetByteBuffer()
56 reinterpret_cast<const uint8_t*>(env->GetDirectBufferAddress(javaByteBuffer)); in Java_android_media_cts_AudioMetadataTest_nativeGetByteBuffer()
77 uint8_t* byteBufferAddr = (uint8_t*)env->GetDirectBufferAddress(byteBuffer); in Java_android_media_cts_AudioMetadataTest_nativeGetByteBuffer()

12345