/external/chromium/base/ |
pickle.cc | 20 // Payload is uint32 aligned. 113 *iter = const_cast<char*>(payload()); 130 *iter = const_cast<char*>(payload()); 146 *iter = const_cast<char*>(payload()); 163 *iter = const_cast<char*>(payload()); 177 *iter = const_cast<char*>(payload()); 191 *iter = const_cast<char*>(payload()); 205 *iter = const_cast<char*>(payload()); 285 *iter = const_cast<char*>(payload()); 374 // Update the payload size and variable buffer siz [all...] |
/external/chromium/chrome/browser/debugger/ |
devtools_remote_listen_socket.h | 47 PAYLOAD = 3 // Receiving payload
|
devtools_remote_listen_socket.cc | 65 state_ = PAYLOAD; 66 if (remaining_payload_length_ == 0) { // no payload 72 case PAYLOAD: 114 if (state_ != PAYLOAD) { 138 } else { // PAYLOAD 179 case PAYLOAD:
|
/external/chromium/chrome/browser/sync/glue/ |
http_bridge_unittest.cc | 179 std::string payload = "this should be echoed back"; local 183 payload.length() + 1, payload.c_str()); 191 EXPECT_EQ(payload.length() + 1, 193 EXPECT_EQ(payload, std::string(http_bridge->GetResponseContent())); 206 std::string test_payload = "###TEST PAYLOAD###"; 234 std::string test_payload = "###TEST PAYLOAD###"; 260 std::string test_payload = "###TEST PAYLOAD###";
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
ip_queue.h | 34 unsigned char payload[0]; /* Optional packet data */ member in struct:ipq_packet_msg 47 unsigned char payload[0]; /* Optional replacement packet */ member in struct:ipq_verdict_msg
|
/external/libnl-headers/netlink/ |
attr.h | 64 /** Minimal length of payload required */ 67 /** Maximal length of payload allowed */ 72 extern int nla_attr_size(int payload); 73 extern int nla_total_size(int payload); 74 extern int nla_padlen(int payload); 140 * @arg attrlen Length of attribute payload. 141 * @arg data Head of attribute payload. 155 * @arg value Head of attribute payload.
|
/external/webkit/Source/JavaScriptCore/API/ |
JSBasePrivate.h | 38 @abstract Reports an object's non-GC memory payload to the garbage collector. 40 @param size The payload's size, in bytes.
|
/external/webkit/Source/WebKit/qt/WebCoreSupport/ |
InspectorServerQt.h | 86 virtual int webSocketSend(QByteArray payload); 87 virtual int webSocketSend(const char *payload, size_t length);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.h | 56 /* EAP-pwd-ID payload */ 67 u8 identity[0]; /* length inferred from payload */
|
ikev2_common.c | 327 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u", 331 "payload header (left=%ld)", 337 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " 342 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x" 343 " Payload Length: %d", 351 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security " 357 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key " 363 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi"); 368 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr"); 373 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate") [all...] |
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter_ipv4/ |
ip_queue.h | 26 unsigned char payload[0]; /* Optional packet data */ member in struct:ipq_packet_msg 39 unsigned char payload[0]; /* Optional replacement packet */ member in struct:ipq_verdict_msg
|
/external/wpa_supplicant/ |
x509v3.c | 205 pos = hdr.payload; 247 pos = hdr.payload; 268 pos = hdr.payload; 323 pos = hdr.payload; 341 set_pos = hdr.payload; 342 pos = set_end = hdr.payload + hdr.length; 354 seq_pos = hdr.payload; 355 seq_end = hdr.payload + hdr.length; 422 hdr.payload, hdr.length); 432 os_memcpy(*fieldp, hdr.payload, hdr.length) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
x509v3.c | 205 pos = hdr.payload; 247 pos = hdr.payload; 268 pos = hdr.payload; 323 pos = hdr.payload; 341 set_pos = hdr.payload; 342 pos = set_end = hdr.payload + hdr.length; 354 seq_pos = hdr.payload; 355 seq_end = hdr.payload + hdr.length; 422 hdr.payload, hdr.length); 432 os_memcpy(*fieldp, hdr.payload, hdr.length) [all...] |
/external/antlr/src/org/antlr/runtime/tree/ |
CommonTreeAdaptor.java | 55 public Object create(Token payload) { 56 return new CommonTree(payload); 61 * token DECL, but you need to create it as a payload or whatever for 64 * If you care what the token payload objects' type is, you should 73 * token DECL, but you need to create it as a payload or whatever for 82 * If you care what the token payload objects' type is, you should
|
/external/bluetooth/bluez/tools/ |
ubcsp.c | 132 /* This is where the receive header is stored before the payload arrives */
312 /** Check the payload of this packet, and determine which of the four **/
318 static uint32 ubcsp_which_le_payload (const uint8 *payload)
331 if (payload[octet] != ubcsp_le_buffer[loop][octet])
443 /* If this packet had a CRC, then the length of the payload
444 should be 2 less than the received size of the payload */
454 /* If we have a payload length error, send an ack in return
476 /* CRC the packet payload - without the CRC bytes */
480 crc = ubcsp_calc_crc (ubcsp_config.receive_packet->payload[loop], crc);
491 (((crc & 0xff00) >> 8) != ubcsp_config.receive_packet->payload[ubcsp_config.receive_index]) || [all...] |
/external/chromium/net/spdy/ |
spdy_frame_builder.h | 52 // Methods for reading the payload of the SpdyFrameBuilder. To read from the 62 // Methods for adding to the payload. These values are appended to the end 63 // of the SpdyFrameBuilder payload. When reading values, you must read them 104 // payload, returns false. 147 // Initial size of the payload. 152 size_t capacity_; // Allocation size of payload (or -1 if buffer is const).
|
/external/dropbear/ |
common-kex.c | 417 + ses.transkexinit->len + ses.payload->len 433 /* I_C, the payload of the client's SSH_MSG_KEXINIT */ 436 /* I_S, the payload of the server's SSH_MSG_KEXINIT */ 437 buf_setpos(ses.payload, 0); 438 buf_putstring(ses.kexhashbuf, ses.payload->data, ses.payload->len); 451 /* I_C, the payload of the client's SSH_MSG_KEXINIT */ 452 buf_setpos(ses.payload, 0); 453 buf_putstring(ses.kexhashbuf, ses.payload->data, ses.payload->len) [all...] |
svr-authpubkey.c | 67 testkey = (buf_getbool(ses.payload) == 0); 69 algo = buf_getstring(ses.payload, &algolen); 70 keybloblen = buf_getint(ses.payload); 71 keyblob = buf_getptr(ses.payload, keybloblen); 90 if (buf_get_pub_key(ses.payload, key, &type) == DROPBEAR_FAILURE) { 96 * session_id, concatenated with the payload packet up to the signature */ 97 signbuf = buf_new(ses.payload->pos + 4 + SHA1_HASH_SIZE); 99 buf_putbytes(signbuf, ses.payload->data, ses.payload->pos); 104 if (buf_verify(ses.payload, key, buf_getptr(signbuf, signbuf->len) [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_newg.c | 82 /* validate the type of next payload */ 104 "received multiple payload type %d.\n", 115 "received multiple payload type %d.\n", 129 "received unexpecting payload type %d.\n", 140 "no HASH, or no SA payload.\n"); 190 /* check SA payload and get new one for use */
|
/external/qemu/android/ |
hw-qemud.c | 41 /* max framed data payload. Must be < (1 << 16) 82 * unframe messages (i.e. extract payload length + channel id from header, 83 * then the payload itself), before sending them to a generic receiver. 185 * It parses the header to extract the channel id and payload length, 236 QemudSink payload[1]; member in struct:QemudSerial 264 qemud_sink_save(f, s->payload); 283 qemud_sink_load(f, s->payload); 285 /* s->header and s->payload are only ever connected to s->data0 */ 286 s->header->buff = s->payload->buff = s->data0; 290 D("%s: load failed: size of saved payload buffer (%d) exceeds 663 QemudSink payload[1]; member in struct:QemudClient [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
ikev2_common.c | 326 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u", 330 "payload header (left=%ld)", 336 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header " 341 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x" 342 " Payload Length: %d", 350 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security " 356 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key " 362 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi"); 367 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr"); 372 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate") [all...] |
/external/chromium/chrome/browser/sync/sessions/ |
sync_session_unittest.cc | 306 std::string payload = "test"; local 309 payload); 315 payload = "test2"; 316 types_with_payloads = syncable::ModelTypePayloadMapFromBitSet(types, payload); 319 EXPECT_EQ(types_with_payloads[syncable::BOOKMARKS], payload); 320 EXPECT_EQ(types_with_payloads[syncable::PASSWORDS], payload); 321 EXPECT_EQ(types_with_payloads[syncable::AUTOFILL], payload); 325 std::string payload = "test"; local 327 = syncable::ModelTypePayloadMapFromRoutingInfo(routes_, payload); 332 EXPECT_EQ(payload, types_with_payloads[iter->first]) [all...] |
/external/kernel-headers/original/linux/ |
key.h | 39 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */ 40 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */ 132 unsigned short datalen; /* payload data length 133 * - may not match RCU dereferenced payload 134 * - payload should contain own length 173 } payload; member in struct:key 187 /* default payload length for quota precalculation (optional) 195 * user's quota will hold the payload 299 const void *payload, 304 const void *payload, [all...] |
/external/libxml2/ |
hash.c | 44 void *payload; member in struct:_xmlHashEntry 306 if ((f != NULL) && (iter->payload != NULL)) 307 f(iter->payload, iter->name); 316 iter->payload = NULL; 570 entry->payload = userdata; 647 f(insert->payload, insert->name); 648 insert->payload = userdata; 656 f(insert->payload, insert->name); 657 insert->payload = userdata; 667 f(insert->payload, insert->name) [all...] |
/development/tools/emulator/system/camera/ |
QemuClient.cpp | 266 * don't need to provide payload size prior to payload when we're writing to 289 /* The way the service replies to a query, it sends payload size first, and 290 * then it sends the payload itself. Note that payload size is sent as a 291 * string, containing 8 characters representing a hexadecimal payload size 297 LOGE("%s: Unable to obtain payload size: %s", 302 /* Convert payload size. */ 307 LOGE("%s: Invalid payload size '%s'", __FUNCTION__, payload_size_str); 311 /* Allocate payload data buffer, and read the payload there. * [all...] |