HomeSort by relevance Sort by last modified time
    Searched full:payload (Results 151 - 175 of 776) sorted by null

1 2 3 4 5 67 8 91011>>

  /external/webkit/Source/JavaScriptCore/runtime/
JSValue.h 76 int32_t payload; member in struct:JSC::EncodedValueDescriptor::__anon12917
80 int32_t payload; member in struct:JSC::EncodedValueDescriptor::__anon12918
257 * can encode a 51-bit payload. Hardware produced and C-library payloads typically
258 * have a payload of zero. We assume that non-zero payloads are available to encode
260 * all set represents a NaN with a non-zero payload, we can use this space in the NaN
266 * cell, integer and bool values the lower 32 bits (the 'payload') contain the pointer
267 * integer or boolean value; in the case of all other tags the payload is 0.
280 int32_t payload() const;
288 * can encode a 51-bit payload. Hardware produced and C-library payloads typically
289 * have a payload of zero. We assume that non-zero payloads are available to encod
    [all...]
  /dalvik/dx/src/com/android/dx/io/instructions/
CodeCursor.java 35 * addresses to switch data payload instructions, whose relative
PackedSwitchPayloadDecodedInstruction.java 20 * A decoded Dalvik instruction which contains the payload for
SparseSwitchPayloadDecodedInstruction.java 20 * A decoded Dalvik instruction which contains the payload for
  /external/chromium/chrome/browser/chromeos/login/
client_login_response_handler.h 41 std::string payload() { return payload_; } function in class:chromeos::ClientLoginResponseHandler
  /external/chromium/chrome/browser/sync/engine/net/
syncapi_server_connection_manager.h 30 const std::string& payload,
  /external/dropbear/
cli-authpubkey.c 72 algotype = buf_getstring(ses.payload, &algolen);
79 remotelen = buf_getint(ses.payload);
106 buf_getptr(ses.payload, remotelen), remotelen) != 0) {
160 * the contents of the write payload to this point */
svr-chansession.c 320 type = buf_getstring(ses.payload, &typelen);
321 wantreply = buf_getbool(ses.payload);
383 signame = buf_getstring(ses.payload, NULL);
419 termc = buf_getint(ses.payload);
420 termr = buf_getint(ses.payload);
421 termw = buf_getint(ses.payload);
422 termh = buf_getint(ses.payload);
446 len = buf_getint(ses.payload);
448 len, ses.payload->len , ses.payload->pos))
    [all...]
svr-x11fwd.c 55 chansess->x11singleconn = buf_getbool(ses.payload);
56 chansess->x11authprot = buf_getstring(ses.payload, NULL);
57 chansess->x11authcookie = buf_getstring(ses.payload, NULL);
58 chansess->x11screennum = buf_getint(ses.payload);
packet.c 281 /* payload length */
293 ses.payload = buf_decompress(ses.decryptreadbuf, len);
298 /* copy payload */
299 ses.payload = buf_new(len);
300 memcpy(ses.payload->data, buf_getptr(ses.decryptreadbuf, len), len);
301 buf_incrlen(ses.payload, len);
306 buf_setpos(ses.payload, 0);
376 /* decompress the payload, incrementally resizing the output buffer */
422 /* Encrypted packet len is payload+5, then worst case is if we are 3 away
448 /* finished with payload */
    [all...]
  /external/ipsec-tools/src/racoon/
isakmp_var.h 110 struct payload_list *plist, vchar_t *payload,
113 static inline struct payload_list *isakmp_plist_append(plist, payload, payload_type)
115 vchar_t *payload; variable
118 return isakmp_plist_append_full(plist, payload, payload_type, 0);
  /external/iptables/extensions/
libip6t_ipv6header.man 28 Encapsulating Security Payload header
  /external/iptables/include/linux/netfilter_ipv4/
ipt_ULOG.h 46 unsigned char payload[0]; member in struct:ulog_packet_msg
  /external/kernel-headers/original/linux/netfilter_ipv4/
ipt_ULOG.h 46 unsigned char payload[0]; member in struct:ulog_packet_msg
  /external/libvpx/vpx_mem/memory_manager/
hmm_largest.c 54 /* Convert largest size to AAUs and subract head size leaving payload
  /external/libxslt/libxslt/
pattern.h 48 xsltNormalizeCompSteps (void *payload,
  /frameworks/base/voip/java/android/net/rtp/
AudioStream.java 130 * Returns the RTP payload type for dual-tone multi-frequency (DTMF) digits,
140 * Sets the RTP payload type for dual-tone multi-frequency (DTMF) digits.
143 * RTP payload type for DTMF is assigned dynamically, so it must be in the
148 * @param type The RTP payload type to be used or {@code -1} to disable it.
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter/
nfnetlink_log.h 45 NFULA_PAYLOAD, /* opaque data payload */
nfnetlink_queue.h 43 NFQA_PAYLOAD, /* opaque data payload */
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter_ipv4/
ipt_ULOG.h 46 unsigned char payload[0]; member in struct:ulog_packet_msg
  /external/chromium/net/spdy/
spdy_framer.h 96 SPDY_CONTROL_PAYLOAD_TOO_LARGE, // Control frame payload was too large.
225 // On success, returns a new SpdyFrame with the payload compressed.
232 // On success, returns a new SpdyFrame with the payload decompressed.
323 // Expands the control frame buffer to accomodate a particular payload size.
326 // Given a frame, breakdown the variable payload length, the static header
327 // header length, and variable payload pointer.
329 int* header_length, const char** payload) const;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gpsk.c 260 const u8 *payload,
274 end = payload + payload_len;
276 pos = eap_gpsk_process_id_server(data, payload, end);
514 const u8 *payload,
532 data->specifier, payload, pos - payload, mic)
553 const u8 *payload,
566 end = payload + payload_len;
568 pos = eap_gpsk_validate_rand(data, payload, end);
572 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, pos, end)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_gpsk.c 252 const u8 *payload, size_t payloadlen)
265 pos = payload;
266 end = payload + payloadlen;
443 data->specifier, payload, pos - payload, mic)
470 const u8 *payload, size_t payloadlen)
482 pos = payload;
483 end = payload + payloadlen;
512 data->specifier, payload, pos - payload, mic
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 261 const u8 *payload,
275 end = payload + payload_len;
277 pos = eap_gpsk_process_id_server(data, payload, end);
515 const u8 *payload,
533 data->specifier, payload, pos - payload, mic)
554 const u8 *payload,
567 end = payload + payload_len;
569 pos = eap_gpsk_validate_rand(data, payload, end);
573 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, pos, end)
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gpsk.c 253 const u8 *payload, size_t payloadlen)
266 pos = payload;
267 end = payload + payloadlen;
444 data->specifier, payload, pos - payload, mic)
471 const u8 *payload, size_t payloadlen)
483 pos = payload;
484 end = payload + payloadlen;
513 data->specifier, payload, pos - payload, mic
    [all...]

Completed in 4567 milliseconds

1 2 3 4 5 67 8 91011>>