HomeSort by relevance Sort by last modified time
    Searched full:payload (Results 101 - 125 of 776) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/chromium/base/
pickle.cc 20 // Payload is uint32 aligned.
113 *iter = const_cast<char*>(payload());
130 *iter = const_cast<char*>(payload());
146 *iter = const_cast<char*>(payload());
163 *iter = const_cast<char*>(payload());
177 *iter = const_cast<char*>(payload());
191 *iter = const_cast<char*>(payload());
205 *iter = const_cast<char*>(payload());
285 *iter = const_cast<char*>(payload());
374 // Update the payload size and variable buffer siz
    [all...]
  /external/chromium/chrome/browser/debugger/
devtools_remote_listen_socket.h 47 PAYLOAD = 3 // Receiving payload
devtools_remote_listen_socket.cc 65 state_ = PAYLOAD;
66 if (remaining_payload_length_ == 0) { // no payload
72 case PAYLOAD:
114 if (state_ != PAYLOAD) {
138 } else { // PAYLOAD
179 case PAYLOAD:
  /external/chromium/chrome/browser/sync/glue/
http_bridge_unittest.cc 179 std::string payload = "this should be echoed back"; local
183 payload.length() + 1, payload.c_str());
191 EXPECT_EQ(payload.length() + 1,
193 EXPECT_EQ(payload, std::string(http_bridge->GetResponseContent()));
206 std::string test_payload = "###TEST PAYLOAD###";
234 std::string test_payload = "###TEST PAYLOAD###";
260 std::string test_payload = "###TEST PAYLOAD###";
  /external/kernel-headers/original/linux/netfilter_ipv4/
ip_queue.h 34 unsigned char payload[0]; /* Optional packet data */ member in struct:ipq_packet_msg
47 unsigned char payload[0]; /* Optional replacement packet */ member in struct:ipq_verdict_msg
  /external/libnl-headers/netlink/
attr.h 64 /** Minimal length of payload required */
67 /** Maximal length of payload allowed */
72 extern int nla_attr_size(int payload);
73 extern int nla_total_size(int payload);
74 extern int nla_padlen(int payload);
140 * @arg attrlen Length of attribute payload.
141 * @arg data Head of attribute payload.
155 * @arg value Head of attribute payload.
  /external/webkit/Source/JavaScriptCore/API/
JSBasePrivate.h 38 @abstract Reports an object's non-GC memory payload to the garbage collector.
40 @param size The payload's size, in bytes.
  /external/webkit/Source/WebKit/qt/WebCoreSupport/
InspectorServerQt.h 86 virtual int webSocketSend(QByteArray payload);
87 virtual int webSocketSend(const char *payload, size_t length);
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.h 56 /* EAP-pwd-ID payload */
67 u8 identity[0]; /* length inferred from payload */
ikev2_common.c 327 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
331 "payload header (left=%ld)",
337 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header "
342 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x"
343 " Payload Length: %d",
351 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security "
357 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key "
363 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi");
368 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr");
373 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate")
    [all...]
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter_ipv4/
ip_queue.h 26 unsigned char payload[0]; /* Optional packet data */ member in struct:ipq_packet_msg
39 unsigned char payload[0]; /* Optional replacement packet */ member in struct:ipq_verdict_msg
  /external/wpa_supplicant/
x509v3.c 205 pos = hdr.payload;
247 pos = hdr.payload;
268 pos = hdr.payload;
323 pos = hdr.payload;
341 set_pos = hdr.payload;
342 pos = set_end = hdr.payload + hdr.length;
354 seq_pos = hdr.payload;
355 seq_end = hdr.payload + hdr.length;
422 hdr.payload, hdr.length);
432 os_memcpy(*fieldp, hdr.payload, hdr.length)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
x509v3.c 205 pos = hdr.payload;
247 pos = hdr.payload;
268 pos = hdr.payload;
323 pos = hdr.payload;
341 set_pos = hdr.payload;
342 pos = set_end = hdr.payload + hdr.length;
354 seq_pos = hdr.payload;
355 seq_end = hdr.payload + hdr.length;
422 hdr.payload, hdr.length);
432 os_memcpy(*fieldp, hdr.payload, hdr.length)
    [all...]
  /external/antlr/src/org/antlr/runtime/tree/
CommonTreeAdaptor.java 55 public Object create(Token payload) {
56 return new CommonTree(payload);
61 * token DECL, but you need to create it as a payload or whatever for
64 * If you care what the token payload objects' type is, you should
73 * token DECL, but you need to create it as a payload or whatever for
82 * If you care what the token payload objects' type is, you should
  /external/bluetooth/bluez/tools/
ubcsp.c 132 /* This is where the receive header is stored before the payload arrives */
312 /** Check the payload of this packet, and determine which of the four **/
318 static uint32 ubcsp_which_le_payload (const uint8 *payload)
331 if (payload[octet] != ubcsp_le_buffer[loop][octet])
443 /* If this packet had a CRC, then the length of the payload
444 should be 2 less than the received size of the payload */
454 /* If we have a payload length error, send an ack in return
476 /* CRC the packet payload - without the CRC bytes */
480 crc = ubcsp_calc_crc (ubcsp_config.receive_packet->payload[loop], crc);
491 (((crc & 0xff00) >> 8) != ubcsp_config.receive_packet->payload[ubcsp_config.receive_index]) ||
    [all...]
  /external/chromium/net/spdy/
spdy_frame_builder.h 52 // Methods for reading the payload of the SpdyFrameBuilder. To read from the
62 // Methods for adding to the payload. These values are appended to the end
63 // of the SpdyFrameBuilder payload. When reading values, you must read them
104 // payload, returns false.
147 // Initial size of the payload.
152 size_t capacity_; // Allocation size of payload (or -1 if buffer is const).
  /external/dropbear/
common-kex.c 417 + ses.transkexinit->len + ses.payload->len
433 /* I_C, the payload of the client's SSH_MSG_KEXINIT */
436 /* I_S, the payload of the server's SSH_MSG_KEXINIT */
437 buf_setpos(ses.payload, 0);
438 buf_putstring(ses.kexhashbuf, ses.payload->data, ses.payload->len);
451 /* I_C, the payload of the client's SSH_MSG_KEXINIT */
452 buf_setpos(ses.payload, 0);
453 buf_putstring(ses.kexhashbuf, ses.payload->data, ses.payload->len)
    [all...]
svr-authpubkey.c 67 testkey = (buf_getbool(ses.payload) == 0);
69 algo = buf_getstring(ses.payload, &algolen);
70 keybloblen = buf_getint(ses.payload);
71 keyblob = buf_getptr(ses.payload, keybloblen);
90 if (buf_get_pub_key(ses.payload, key, &type) == DROPBEAR_FAILURE) {
96 * session_id, concatenated with the payload packet up to the signature */
97 signbuf = buf_new(ses.payload->pos + 4 + SHA1_HASH_SIZE);
99 buf_putbytes(signbuf, ses.payload->data, ses.payload->pos);
104 if (buf_verify(ses.payload, key, buf_getptr(signbuf, signbuf->len)
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_newg.c 82 /* validate the type of next payload */
104 "received multiple payload type %d.\n",
115 "received multiple payload type %d.\n",
129 "received unexpecting payload type %d.\n",
140 "no HASH, or no SA payload.\n");
190 /* check SA payload and get new one for use */
  /external/qemu/android/
hw-qemud.c 41 /* max framed data payload. Must be < (1 << 16)
82 * unframe messages (i.e. extract payload length + channel id from header,
83 * then the payload itself), before sending them to a generic receiver.
185 * It parses the header to extract the channel id and payload length,
236 QemudSink payload[1]; member in struct:QemudSerial
264 qemud_sink_save(f, s->payload);
283 qemud_sink_load(f, s->payload);
285 /* s->header and s->payload are only ever connected to s->data0 */
286 s->header->buff = s->payload->buff = s->data0;
290 D("%s: load failed: size of saved payload buffer (%d) exceeds
663 QemudSink payload[1]; member in struct:QemudClient
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
ikev2_common.c 326 wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
330 "payload header (left=%ld)",
336 wpa_printf(MSG_INFO, "IKEV2: Invalid payload header "
341 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x"
342 " Payload Length: %d",
350 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security "
356 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key "
362 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi");
367 wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr");
372 wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate")
    [all...]
  /external/chromium/chrome/browser/sync/sessions/
sync_session_unittest.cc 306 std::string payload = "test"; local
309 payload);
315 payload = "test2";
316 types_with_payloads = syncable::ModelTypePayloadMapFromBitSet(types, payload);
319 EXPECT_EQ(types_with_payloads[syncable::BOOKMARKS], payload);
320 EXPECT_EQ(types_with_payloads[syncable::PASSWORDS], payload);
321 EXPECT_EQ(types_with_payloads[syncable::AUTOFILL], payload);
325 std::string payload = "test"; local
327 = syncable::ModelTypePayloadMapFromRoutingInfo(routes_, payload);
332 EXPECT_EQ(payload, types_with_payloads[iter->first])
    [all...]
  /external/kernel-headers/original/linux/
key.h 39 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */
40 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */
132 unsigned short datalen; /* payload data length
133 * - may not match RCU dereferenced payload
134 * - payload should contain own length
173 } payload; member in struct:key
187 /* default payload length for quota precalculation (optional)
195 * user's quota will hold the payload
299 const void *payload,
304 const void *payload,
    [all...]
  /external/libxml2/
hash.c 44 void *payload; member in struct:_xmlHashEntry
306 if ((f != NULL) && (iter->payload != NULL))
307 f(iter->payload, iter->name);
316 iter->payload = NULL;
570 entry->payload = userdata;
647 f(insert->payload, insert->name);
648 insert->payload = userdata;
656 f(insert->payload, insert->name);
657 insert->payload = userdata;
667 f(insert->payload, insert->name)
    [all...]
  /development/tools/emulator/system/camera/
QemuClient.cpp 266 * don't need to provide payload size prior to payload when we're writing to
289 /* The way the service replies to a query, it sends payload size first, and
290 * then it sends the payload itself. Note that payload size is sent as a
291 * string, containing 8 characters representing a hexadecimal payload size
297 LOGE("%s: Unable to obtain payload size: %s",
302 /* Convert payload size. */
307 LOGE("%s: Invalid payload size '%s'", __FUNCTION__, payload_size_str);
311 /* Allocate payload data buffer, and read the payload there. *
    [all...]

Completed in 2012 milliseconds

1 2 3 45 6 7 8 91011>>