/external/webkit/Source/JavaScriptCore/runtime/ |
JSValue.h | 76 int32_t payload; member in struct:JSC::EncodedValueDescriptor::__anon12917 80 int32_t payload; member in struct:JSC::EncodedValueDescriptor::__anon12918 257 * can encode a 51-bit payload. Hardware produced and C-library payloads typically 258 * have a payload of zero. We assume that non-zero payloads are available to encode 260 * all set represents a NaN with a non-zero payload, we can use this space in the NaN 266 * cell, integer and bool values the lower 32 bits (the 'payload') contain the pointer 267 * integer or boolean value; in the case of all other tags the payload is 0. 280 int32_t payload() const; 288 * can encode a 51-bit payload. Hardware produced and C-library payloads typically 289 * have a payload of zero. We assume that non-zero payloads are available to encod [all...] |
/dalvik/dx/src/com/android/dx/io/instructions/ |
CodeCursor.java | 35 * addresses to switch data payload instructions, whose relative
|
PackedSwitchPayloadDecodedInstruction.java | 20 * A decoded Dalvik instruction which contains the payload for
|
SparseSwitchPayloadDecodedInstruction.java | 20 * A decoded Dalvik instruction which contains the payload for
|
/external/chromium/chrome/browser/chromeos/login/ |
client_login_response_handler.h | 41 std::string payload() { return payload_; } function in class:chromeos::ClientLoginResponseHandler
|
/external/chromium/chrome/browser/sync/engine/net/ |
syncapi_server_connection_manager.h | 30 const std::string& payload,
|
/external/dropbear/ |
cli-authpubkey.c | 72 algotype = buf_getstring(ses.payload, &algolen); 79 remotelen = buf_getint(ses.payload); 106 buf_getptr(ses.payload, remotelen), remotelen) != 0) { 160 * the contents of the write payload to this point */
|
svr-chansession.c | 320 type = buf_getstring(ses.payload, &typelen); 321 wantreply = buf_getbool(ses.payload); 383 signame = buf_getstring(ses.payload, NULL); 419 termc = buf_getint(ses.payload); 420 termr = buf_getint(ses.payload); 421 termw = buf_getint(ses.payload); 422 termh = buf_getint(ses.payload); 446 len = buf_getint(ses.payload); 448 len, ses.payload->len , ses.payload->pos)) [all...] |
svr-x11fwd.c | 55 chansess->x11singleconn = buf_getbool(ses.payload); 56 chansess->x11authprot = buf_getstring(ses.payload, NULL); 57 chansess->x11authcookie = buf_getstring(ses.payload, NULL); 58 chansess->x11screennum = buf_getint(ses.payload);
|
packet.c | 281 /* payload length */ 293 ses.payload = buf_decompress(ses.decryptreadbuf, len); 298 /* copy payload */ 299 ses.payload = buf_new(len); 300 memcpy(ses.payload->data, buf_getptr(ses.decryptreadbuf, len), len); 301 buf_incrlen(ses.payload, len); 306 buf_setpos(ses.payload, 0); 376 /* decompress the payload, incrementally resizing the output buffer */ 422 /* Encrypted packet len is payload+5, then worst case is if we are 3 away 448 /* finished with payload */ [all...] |
/external/ipsec-tools/src/racoon/ |
isakmp_var.h | 110 struct payload_list *plist, vchar_t *payload, 113 static inline struct payload_list *isakmp_plist_append(plist, payload, payload_type) 115 vchar_t *payload; variable 118 return isakmp_plist_append_full(plist, payload, payload_type, 0);
|
/external/iptables/extensions/ |
libip6t_ipv6header.man | 28 Encapsulating Security Payload header
|
/external/iptables/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 46 unsigned char payload[0]; member in struct:ulog_packet_msg
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
ipt_ULOG.h | 46 unsigned char payload[0]; member in struct:ulog_packet_msg
|
/external/libvpx/vpx_mem/memory_manager/ |
hmm_largest.c | 54 /* Convert largest size to AAUs and subract head size leaving payload
|
/external/libxslt/libxslt/ |
pattern.h | 48 xsltNormalizeCompSteps (void *payload,
|
/frameworks/base/voip/java/android/net/rtp/ |
AudioStream.java | 130 * Returns the RTP payload type for dual-tone multi-frequency (DTMF) digits, 140 * Sets the RTP payload type for dual-tone multi-frequency (DTMF) digits. 143 * RTP payload type for DTMF is assigned dynamically, so it must be in the 148 * @param type The RTP payload type to be used or {@code -1} to disable it.
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter/ |
nfnetlink_log.h | 45 NFULA_PAYLOAD, /* opaque data payload */
|
nfnetlink_queue.h | 43 NFQA_PAYLOAD, /* opaque data payload */
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 46 unsigned char payload[0]; member in struct:ulog_packet_msg
|
/external/chromium/net/spdy/ |
spdy_framer.h | 96 SPDY_CONTROL_PAYLOAD_TOO_LARGE, // Control frame payload was too large. 225 // On success, returns a new SpdyFrame with the payload compressed. 232 // On success, returns a new SpdyFrame with the payload decompressed. 323 // Expands the control frame buffer to accomodate a particular payload size. 326 // Given a frame, breakdown the variable payload length, the static header 327 // header length, and variable payload pointer. 329 int* header_length, const char** payload) const;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 260 const u8 *payload, 274 end = payload + payload_len; 276 pos = eap_gpsk_process_id_server(data, payload, end); 514 const u8 *payload, 532 data->specifier, payload, pos - payload, mic) 553 const u8 *payload, 566 end = payload + payload_len; 568 pos = eap_gpsk_validate_rand(data, payload, end); 572 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, pos, end) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 252 const u8 *payload, size_t payloadlen) 265 pos = payload; 266 end = payload + payloadlen; 443 data->specifier, payload, pos - payload, mic) 470 const u8 *payload, size_t payloadlen) 482 pos = payload; 483 end = payload + payloadlen; 512 data->specifier, payload, pos - payload, mic [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 261 const u8 *payload, 275 end = payload + payload_len; 277 pos = eap_gpsk_process_id_server(data, payload, end); 515 const u8 *payload, 533 data->specifier, payload, pos - payload, mic) 554 const u8 *payload, 567 end = payload + payload_len; 569 pos = eap_gpsk_validate_rand(data, payload, end); 573 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, pos, end) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 253 const u8 *payload, size_t payloadlen) 266 pos = payload; 267 end = payload + payloadlen; 444 data->specifier, payload, pos - payload, mic) 471 const u8 *payload, size_t payloadlen) 483 pos = payload; 484 end = payload + payloadlen; 513 data->specifier, payload, pos - payload, mic [all...] |