Home
last modified time | relevance | path

Searched refs:uint8_t (Results 1 – 25 of 119) sorted by relevance

12345

/cts/hostsidetests/securitybulletin/securityPatch/CVE-2016-0844/
Dlocal_poc.h92 uint8_t platform_type_valid;
94 uint8_t hdr_tbl_info_valid;
96 uint8_t v4_route_tbl_info_valid;
98 uint8_t v6_route_tbl_info_valid;
100 uint8_t v4_filter_tbl_start_addr_valid;
102 uint8_t v6_filter_tbl_start_addr_valid;
104 uint8_t modem_mem_info_valid;
106 uint8_t ctrl_comm_dest_end_pt_valid;
108 uint8_t is_ssr_bootup_valid;
109 uint8_t is_ssr_bootup;
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2014/
Dpoc.cpp29 void cback(uint8_t, tRW_DATA *) {} in cback() argument
31 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
33 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
49 uint8_t nci_status = NCI_STATUS_OK; in main()
50 uint8_t num_responses = 1; in main()
51 uint8_t sensf_res_buf_size = in main()
53 uint8_t *p_sensf_res_buf = in main()
54 (uint8_t *)malloc(RW_T3T_SENSF_RES_RD_OFFSET + RW_T3T_SENSF_RES_RD_LEN); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2115/
Dpoc.cpp25 const uint8_t *authTokenKey = nullptr;
40 bool GetAuthTokenKey(const uint8_t **auth_token_key, in GetAuthTokenKey()
42 *auth_token_key = (const uint8_t *)(new uint8_t()); in GetAuthTokenKey()
46 void GetPasswordKey(const uint8_t **password_key __attribute__((unused)), in GetPasswordKey()
48 void ComputePasswordSignature(uint8_t *signature __attribute__((unused)), in ComputePasswordSignature()
50 const uint8_t *key __attribute__((unused)), in ComputePasswordSignature()
52 const uint8_t *password __attribute__((unused)), in ComputePasswordSignature()
57 void ComputeSignature(uint8_t *signature __attribute__((unused)), in ComputeSignature()
59 const uint8_t *key __attribute__((unused)), in ComputeSignature()
61 const uint8_t *message __attribute__((unused)), in ComputeSignature()
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0473/
Dpoc.cpp29 tNFC_STATUS rw_t3t_select(uint8_t peerNfcID[NCI_RF_F_UID_LEN],
30 uint8_t mrtiCheck, uint8_t mrtiUpdate);
33 static void *(*real_GKI_getpoolbuf)(uint8_t pool_id) = nullptr;
52 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
54 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
62 (void *(*)(uint8_t))dlsym(RTLD_NEXT, "_Z14GKI_getpoolbufh"); in init()
69 void *GKI_getpoolbuf(uint8_t pool_id) { in GKI_getpoolbuf()
107 uint8_t peerNfcID[NCI_RF_F_UID_LEN]; in main()
108 uint8_t mrtiCheck = 1, mrtiUpdate = 1; in main()
118 uint8_t conn_id = NFC_RF_CONN_ID; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2018-9410/
Dpoc.cpp44 uint8_t majorVersion = 1; in main()
45 uint8_t minorVersion = 0; in main()
46 uint8_t axisOffset = 0x10; in main()
47 uint8_t axisCount = 0xFF; in main()
48 uint8_t axisSize = 0x14; in main()
50 size_t allocatedSize = sizeof(uint8_t) * 16; in main()
52 uint8_t* fvarData = (uint8_t*) malloc(allocatedSize); in main()
/cts/apps/CtsVerifier/jni/midi/
DMidiTestManager.cpp42 static const uint8_t kMIDIChanCmd_KeyDown = 9;
43 static const uint8_t kMIDIChanCmd_KeyUp = 8;
44 static const uint8_t kMIDIChanCmd_PolyPress = 10;
45 static const uint8_t kMIDIChanCmd_Control = 11;
46 static const uint8_t kMIDIChanCmd_ProgramChange = 12;
47 static const uint8_t kMIDIChanCmd_ChannelPress = 13;
48 static const uint8_t kMIDIChanCmd_PitchWheel = 14;
50 static const uint8_t kMIDISysCmd_SysEx = 0xF0;
51 static const uint8_t kMIDISysCmd_EndOfSysEx = 0xF7;
52 static const uint8_t kMIDISysCmd_ActiveSensing = 0xFE;
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/Bug-137878930/
Dpoc.cpp39 static Vector<uint8_t> sessionId;
50 static const Vector<uint8_t> toVector(const hidl_vec<uint8_t> &vec) { in toVector()
51 Vector<uint8_t> vector; in toVector()
53 return *const_cast<const Vector<uint8_t> *>(&vector); in toVector()
56 static hidl_vec<uint8_t> toHidlVec(const Vector<uint8_t> &vector) { in toHidlVec()
57 hidl_vec<uint8_t> vec; in toHidlVec()
58 vec.setToExternal(const_cast<uint8_t *>(vector.array()), vector.size()); in toHidlVec()
97 const uint8_t uuid[16], in makeDrmPlugin()
111 const uint8_t uuid[16] = {0x10, 0x77, 0xef, 0xec, 0xc0, 0xb2, 0x4d, 0x02, in createPlugin()
134 [&](Status status, const hidl_vec<uint8_t> &id) { in openSession()
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0925/
Dstubs.cpp42 uint8_t NFC_GetNCIVersion() { in NFC_GetNCIVersion()
46 tNFC_STATUS NFC_SendData(uint8_t conn_id, NFC_HDR* p_data) { in NFC_SendData()
47 uint8_t len = (uint8_t)p_data->len; in NFC_SendData()
54 uint8_t nci_snd_t3t_polling(uint16_t system_code, uint8_t rc, uint8_t tsn) { in nci_snd_t3t_polling()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2022/
Dpoc.cpp54 tNFC_STATUS rw_t3t_select(uint8_t peer_nfcid2[NCI_RF_F_UID_LEN],
55 uint8_t mrti_check, uint8_t mrti_update);
113 void GKI_start_timer(uint8_t, int32_t, bool) { in GKI_start_timer() argument
116 void GKI_stop_timer(uint8_t) { in GKI_stop_timer() argument
129 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in trigger_OOB_via_rw_t3t_act_handle_fmt_rsp()
130 uint8_t mrti_check = 1, mrti_update = 1; in trigger_OOB_via_rw_t3t_act_handle_fmt_rsp()
153 uint8_t* p_t3t_rsp = (uint8_t*) (p_msg + 1) + (p_msg->offset + 1); in trigger_OOB_via_rw_t3t_act_handle_fmt_rsp()
157 uint8_t* p_mc = &p_t3t_rsp[T3T_MSG_RSP_OFFSET_CHECK_DATA]; in trigger_OOB_via_rw_t3t_act_handle_fmt_rsp()
179 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in trigger_OOB_via_rw_t3t_act_handle_sro_rsp()
180 uint8_t mrti_check = 1, mrti_update = 1; in trigger_OOB_via_rw_t3t_act_handle_sro_rsp()
[all …]
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2015/
Dpoc.cpp65 extern void rw_t3t_data_cback(__attribute__((unused)) uint8_t conn_id,
74 extern void rw_t2t_handle_rsp(uint8_t *p_data);
78 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
80 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
87 void p_conn_cback(uint8_t event, tNFA_CONN_EVT_DATA *p_rw_data) { in p_conn_cback()
144 nfa_rw_cb.p_ndef_buf = (uint8_t *)calloc(1, sizeof(uint8_t)); in main()
159 uint8_t *p = (uint8_t *)(p_msg + 1) + p_msg->offset; in main()
162 uint8_t *p_t3t_rsp = p + 1; in main()
166 uint8_t conn_id = 0; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2012/
Dpoc.cpp44 tNFC_STATUS rw_t3t_select(uint8_t peer_nfcid2[NCI_RF_F_UID_LEN],
45 uint8_t mrti_check, uint8_t mrti_update);
109 void GKI_start_timer(uint8_t, int32_t, bool) { in GKI_start_timer() argument
112 void GKI_stop_timer(uint8_t) { in GKI_stop_timer() argument
144 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in main()
145 uint8_t mrti_check = 1, mrti_update = 1; in main()
160 uint8_t *p_t3t_rsp = (uint8_t *) (p_msg + 1) + (p_msg->offset + 1); in main()
163 uint8_t *p_mc = &p_t3t_rsp[T3T_MSG_RSP_OFFSET_CHECK_DATA]; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2021/
Dpoc.cpp49 tNFC_STATUS rw_t3t_select(uint8_t peer_nfcid2[NCI_RF_F_UID_LEN],
50 uint8_t mrti_check, uint8_t mrti_update);
87 void GKI_start_timer(uint8_t, int32_t, bool) { in GKI_start_timer() argument
90 void GKI_stop_timer(uint8_t) { in GKI_stop_timer() argument
104 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in main()
105 uint8_t mrti_check = 1, mrti_update = 1; in main()
128 uint8_t* p_t3t_rsp = (uint8_t*) (p_msg + 1) + (p_msg->offset + 1); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2031/
Dpoc.cpp43 tNFC_STATUS rw_t3t_select(uint8_t peer_nfcid2[NCI_RF_F_UID_LEN],
44 uint8_t mrti_check, uint8_t mrti_update);
102 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
104 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
138 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in main()
139 uint8_t mrti_check = 1, mrti_update = 1; in main()
160 uint8_t *p_t3t_rsp = (uint8_t *)(p_msg + 1) + p_msg->offset; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2035/
Dpoc.cpp24 tNFC_STATUS rw_i93_select(uint8_t* p_uid);
29 void GKI_start_timer(uint8_t, int32_t, bool) { in GKI_start_timer() argument
32 void GKI_stop_timer(uint8_t) { in GKI_stop_timer() argument
41 uint8_t p_uid = 1; in main()
55 p_data->data.p_data = (NFC_HDR *) malloc(sizeof(uint8_t) * 32); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2039/
Dpoc.cpp30 tNFC_STATUS rw_i93_select(uint8_t* p_uid);
34 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
36 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
44 uint8_t p_uid = 1; in main()
58 p_data->data.p_data = (NFC_HDR*)malloc(sizeof(uint8_t) * 16); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2040/
Dpoc.cpp27 tNFC_STATUS rw_i93_select(uint8_t *p_uid);
29 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
31 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
41 uint8_t p_uid = 1; in main()
55 p_data->data.p_data = (NFC_HDR *)malloc(sizeof(uint8_t) * 16); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2021-0430/
Dpoc.cpp45 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
47 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
94 uint8_t selres = 1; in main()
95 uint8_t uid[MFC_UID_LEN] = {1}; in main()
109 p_data->data.p_data = (NFC_HDR *)malloc(sizeof(uint8_t) * 16); in main()
119 p_mfc->p_ndef_buffer = (uint8_t *)malloc(sizeof(uint8_t) * 16); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2206/
Dpoc.cpp31 tNFC_STATUS rw_i93_select(uint8_t *p_uid);
35 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
37 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
45 uint8_t p_uid = 1; in main()
61 (NFC_HDR *)malloc(sizeof(uint8_t) * (OFFSET + PLENGTH) * 2); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2017/
Dpoc.cpp31 uint8_t *p_data = nullptr;
34 extern void rw_t2t_handle_rsp(uint8_t *p_data);
36 void poc_cback(uint8_t, tRW_DATA *) {} in poc_cback() argument
65 p_data = (uint8_t *)malloc(sizeof(uint8_t)); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2013/
Dpoc.cpp51 tNFC_STATUS rw_t3t_select(uint8_t peer_nfcid2[NCI_RF_F_UID_LEN],
52 uint8_t mrti_check, uint8_t mrti_update);
146 uint8_t peer_nfcid2[NCI_RF_F_UID_LEN]; in main()
147 uint8_t mrti_check = 1, mrti_update = 1; in main()
173 uint8_t* p_t3t_rsp = (uint8_t*) (p_msg + 1) + (p_msg->offset + 1); in main()
177 uint8_t* p_mc = &p_t3t_rsp[T3T_MSG_RSP_OFFSET_CHECK_DATA]; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2207/
Dpoc.cpp27 uint8_t data_len = SIZE * 6; in main()
28 uint8_t *data = (uint8_t *)malloc(SIZE); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2020-0450/
Dpoc.cpp38 tNFC_STATUS rw_i93_select(uint8_t *p_uid);
45 uint8_t *p_data) = nullptr;
52 (tNFC_STATUS(*)(uint16_t, uint8_t *))dlsym(RTLD_NEXT, in init()
98 size_t rw_i93_send_cmd_write_single_block(uint16_t block_number, uint8_t *p_data) { in rw_i93_send_cmd_write_single_block()
124 uint8_t p_uid = 1; in main()
138 p_data->data.p_data = (NFC_HDR *)GKI_getbuf(sizeof(uint8_t) * 16); in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2019-2038/
Dpoc.cpp26 tNFC_STATUS rw_i93_select(uint8_t* p_uid);
30 void GKI_start_timer(uint8_t, int32_t, bool) {} in GKI_start_timer() argument
32 void GKI_stop_timer(uint8_t) {} in GKI_stop_timer() argument
40 uint8_t p_uid = 1; in main()
/cts/hostsidetests/securitybulletin/securityPatch/CVE-2022-20131/
Dpoc.cpp56 uint8_t* buffer = (uint8_t*)malloc(sizeof(uint8_t) * kBufferSize); in main()
58 uint8_t* buffer_ptr = buffer; in main()
/cts/tests/tests/media/audio/jni/
Daudio-metadata-native.cpp55 const uint8_t* bytes = in Java_android_media_audio_cts_AudioMetadataTest_nativeGetByteBuffer()
56 reinterpret_cast<const uint8_t*>(env->GetDirectBufferAddress(javaByteBuffer)); in Java_android_media_audio_cts_AudioMetadataTest_nativeGetByteBuffer()
77 uint8_t* byteBufferAddr = (uint8_t*)env->GetDirectBufferAddress(byteBuffer); in Java_android_media_audio_cts_AudioMetadataTest_nativeGetByteBuffer()

12345