/prebuilts/ndk/9/platforms/android-9/arch-mips/usr/include/linux/ |
if_arcnet.h | 43 uint8_t payload[0]; member in struct:arc_rfc1201 50 uint8_t payload[0]; member in struct:arc_rfc1051 58 uint8_t payload[0]; member in struct:arc_eth_encap
|
/prebuilts/ndk/9/platforms/android-9/arch-x86/usr/include/linux/ |
if_arcnet.h | 43 uint8_t payload[0]; member in struct:arc_rfc1201 50 uint8_t payload[0]; member in struct:arc_rfc1051 58 uint8_t payload[0]; member in struct:arc_eth_encap
|
/external/chromium/chrome/browser/sessions/ |
tab_restore_service.cc | 84 // Payload structures. 88 // Payload used for the start of a window close. This is the old struct that is 97 // Payload used for the start of a tab close. This is the old struct that is 104 // Payload used for the start of a window close. This struct must be POD, 110 // Payload used for the start of a tab close. 616 PinnedStatePayload payload = true; local 618 new SessionCommand(kCommandPinnedState, sizeof(payload)); 619 memcpy(command->contents(), &payload, sizeof(payload)); 649 WindowPayload2 payload; local 668 SelectedNavigationInTabPayload2 payload; local 680 RestoredEntryPayload payload = entry_id; local 754 RestoredEntryPayload payload; local 762 WindowPayload2 payload; local 802 SelectedNavigationInTabPayload2 payload; local [all...] |
/external/chromium_org/chrome/browser/sessions/ |
persistent_tab_restore_service.cc | 38 // Payload used for the start of a tab close. This is the old struct that is 45 // Payload used for the start of a window close. This is the old struct that is 54 // Payload used for the start of a window close. This struct must be POD, 60 // Payload used for the start of a tab close. 446 PinnedStatePayload payload = true; local 448 new SessionCommand(kCommandPinnedState, sizeof(payload)); 449 memcpy(command->contents(), &payload, sizeof(payload)); 482 WindowPayload2 payload; local 485 memset(&payload, 0, sizeof(payload)) 503 SelectedNavigationInTabPayload2 payload; local 517 RestoredEntryPayload payload = entry_id; local 591 RestoredEntryPayload payload; local 599 WindowPayload2 payload; local 640 SelectedNavigationInTabPayload2 payload; local [all...] |
/external/chromium_org/net/websockets/ |
websocket_frame_parser.h | 33 // If the parser encounters invalid payload length format, Decode() fails 37 // Payload data of parsed WebSocket frames may be incomplete; see comments in 58 // Decodes frame payload and creates a WebSocketFrameChunk object. 60 // parsing. This function returns a frame object even if no payload data is 77 // Amount of payload data read so far for the current frame.
|
/external/chromium_org/third_party/WebKit/ManualTests/inspector/ |
duplicate-resource-urls.html | 19 <b>Request Payload</b> tree elements above the content. One of the resources 20 will not have a <b>Request Payload</b>. 25 <li><p>One with a Request Method: GET and no Request Payload 26 <li><p>One with a Request Method: POST and Request Payload of "123" 27 <li><p>One with a Request Method: POST and Request Payload of "456"
|
/system/core/include/log/ |
logger.h | 21 uint16_t len; /* length of the payload */ 27 char msg[0]; /* the entry's payload */ 36 uint16_t len; /* length of the payload */ 43 char msg[0]; /* the entry's payload */ 52 * The maximum size of the log entry payload that can be
|
/external/chromium/chrome/browser/sync/notifier/ |
chrome_invalidation_client_unittest.cc | 80 // |payload| can be NULL, but not |type_name|. 82 int64 version, const char* payload) { 85 std::string payload_tmp = payload ? payload : ""; 87 object_id, version, payload ? &payload_tmp : NULL, NULL); 109 const std::string& payload) { 111 type_payloads[model_type] = payload; 116 const std::string& payload) { 120 type_payloads[*it] = payload; 144 OnInvalidate(MakeMap(syncable::PREFERENCES, "payload"))); [all...] |
/external/chromium_org/chrome/browser/extensions/api/push_messaging/ |
push_messaging_invalidation_handler.cc | 137 std::string payload; local 139 payload = std::string(); 141 payload = list.back().payload(); 151 << " and payload is:" << payload; 163 << "and payload was lost"; 167 // If we receive a new max version for this object, forward its payload. 174 << ", and payload is " << max_invalidation.payload(); [all...] |
/external/chromium_org/sync/notifier/ |
unacked_invalidation_set_unittest.cc | 45 Invalidation inv1 = Invalidation::Init(kObjectId_, 10, "payload"); 55 Invalidation inv1 = Invalidation::Init(kObjectId_, 10, "payload"); 64 Invalidation inv1 = Invalidation::Init(kObjectId_, 10, "payload"); 81 Invalidation inv = Invalidation::Init(kObjectId_, i, "payload"); 97 Invalidation inv = Invalidation::Init(kObjectId_, i, "payload"); 115 Invalidation inv = Invalidation::Init(kObjectId_, i, "payload"); 143 Invalidation inv1 = Invalidation::Init(kObjectId_, 10, "payload"); 166 Invalidation inv1 = Invalidation::Init(kObjectId_, 10, "payload"); 167 Invalidation inv2 = Invalidation::Init(kObjectId_, 15, "payload"); 198 Invalidation inv = Invalidation::Init(kObjectId_, 10, "payload"); [all...] |
/system/core/libnl_2/ |
attr.c | 25 /* Return payload of string attribute. */ 31 /* Return payload of 16 bit integer attribute. */ 37 /* Return payload of 32 bit integer attribute. */ 49 /* Return payload of uint64_t attribute. */ 57 /* Head of payload */ 63 /* Return length of the payload . */ 69 int nla_padlen(int payload) 71 return NLA_ALIGN(payload) - payload; 111 /* Check if the attribute header and payload can be accessed safely. * [all...] |
msg.c | 25 /* Allocate a new netlink message with the default maximum payload size. */ 28 /* Whole page will store nl_msg + nlmsghdr + genlmsghdr + payload */ 62 /* Return pointer to message payload. */ 91 /* Return head of attributes data / payload section */ 147 int nlmsg_padlen(int payload) 149 return NLMSG_ALIGN(payload) - payload;
|
/external/chromium_org/third_party/sqlite/src/tool/ |
space_used.tcl | 26 payload int, -- Total amount of data stored in this table or index 61 set payload [btree_payload_size $cursor] 62 incr size $payload 67 if {$payload>238} { 68 set n [expr {($payload-238+1019)/1020}] 70 incr unused_ovfl [expr {$n*1020+238-$payload}] 91 puts "-- Total payload size: $total_size"
|
/external/ipsec-tools/src/racoon/ |
isakmp.h | 57 ! Next Payload ! MjVer ! MnVer ! Exchange Type ! Flags ! 67 u_int8_t np; /* Next Payload Type */ 75 /* Next Payload Type */ 108 #define ISAKMP_NPTYPE_FRAG 132 /* IKE fragmentation payload */ 151 /* 3.2 Payload Generic Header 154 ! Next Payload ! RESERVED ! Payload Length ! 158 u_int8_t np; /* Next Payload */ 160 u_int16_t len; /* Payload Length */ 186 /* 3.4 Security Association Payload */ 386 vchar_t *payload; member in struct:payload_list [all...] |
isakmp_agg.c | 155 /* make ID payload into isakmp status */ 159 /* create SA payload for my proposal */ 235 /* set SA payload to propose */ 238 /* create isakmp KE payload */ 241 /* create isakmp NONCE payload */ 244 /* create isakmp ID payload */ 253 /* create isakmp CR payload */ 263 * set VID payload for NAT-T if NAT-T 360 vchar_t *payload; member in struct:natd_payload 374 /* validate the type of next payload */ [all...] |
/external/tcpdump/ |
isakmp.h | 93 ! Next Payload ! MjVer ! MnVer ! Exchange Type ! Flags ! 103 u_int8_t np; /* Next Payload Type */ 115 /* Next Payload Type */ 146 /* 3.2 Payload Generic Header 149 ! Next Payload ! RESERVED ! Payload Length ! 153 u_int8_t np; /* Next Payload */ 155 u_int16_t len; /* Payload Length */ 179 /* 3.4 Security Association Payload */ 182 If the current payload is the last in the message [all...] |
/external/chromium_org/third_party/libjingle/source/talk/media/base/ |
rtpdataengine_unittest.cc | 232 talk_base::Buffer payload(data, 4); 240 EXPECT_FALSE(dmc->SendData(params, payload, &result)); 246 EXPECT_FALSE(dmc->SendData(params, payload, &result)); 255 EXPECT_FALSE(dmc->SendData(params, payload, &result)); 274 EXPECT_TRUE(dmc->SendData(params, payload, &result)); 289 EXPECT_TRUE(dmc->SendData(params, payload, &result)); 337 talk_base::Buffer payload(data, 3); 340 EXPECT_TRUE(dmc1->SendData(params1, payload, &result)); 341 EXPECT_TRUE(dmc2->SendData(params2, payload, &result)); 348 EXPECT_TRUE(dmc1->SendData(params1, payload, &result)) [all...] |
/external/dropbear/ |
svr-tcpfwd.c | 80 reqname = buf_getstring(ses.payload, &namelen); 81 wantreply = buf_getbool(ses.payload); 148 bindaddr = buf_getstring(ses.payload, &addrlen); 154 port = buf_getint(ses.payload); 182 bindaddr = buf_getstring(ses.payload, &addrlen); 188 port = buf_getint(ses.payload); 244 desthost = buf_getstring(ses.payload, &len); 250 destport = buf_getint(ses.payload); 252 orighost = buf_getstring(ses.payload, &len); 258 origport = buf_getint(ses.payload); [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs8.c | 37 pos = hdr.payload; 53 if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) { 58 pos = hdr.payload + hdr.length; 81 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { 103 pos = hdr.payload + hdr.length; 117 crypto_rsa_import_private_key(hdr.payload, hdr.length); 150 pos = hdr.payload; 163 enc_alg = hdr.payload; 165 pos = hdr.payload + hdr.length; 177 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length [all...] |
/external/android-clat/ |
dump.c | 80 printf("payload len = %x\n",ntohs(header->ip6_plen)); 133 void dump_udp_generic(const struct udphdr *udp, uint32_t temp_checksum, const char *payload, size_t payload_size) { 137 temp_checksum = ip_checksum_add(temp_checksum, payload, payload_size); 148 void dump_udp(const struct udphdr *udp, const struct iphdr *ip, const char *payload, size_t payload_size) { 151 dump_udp_generic(udp, temp_checksum, payload, payload_size); 155 void dump_udp6(const struct udphdr *udp, const struct ip6_hdr *ip6, const char *payload, size_t payload_size) { 158 dump_udp_generic(udp, temp_checksum, payload, payload_size); 162 void dump_tcp_generic(const struct tcphdr *tcp, const char *options, size_t options_size, uint32_t temp_checksum, const char *payload, size_t payload_size) { 169 temp_checksum = ip_checksum_add(temp_checksum, payload, payload_size); 203 void dump_tcp(const struct tcphdr *tcp, const struct iphdr *ip, const char *payload, size_t payload_size, const char *options, size_t options_size) [all...] |
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/ |
ConsoleModel.js | 287 * @param {!ConsoleAgent.ConsoleMessage} payload 289 messageAdded: function(payload) 292 payload.source, 293 payload.level, 294 payload.text, 295 payload.type, 296 payload.url, 297 payload.line, 298 payload.column, 299 payload.repeatCount [all...] |
/external/libnfc-nci/src/nfc/ndef/ |
ndef_utils.c | 114 /* Payload length - can be 1 or 4 bytes */ 119 /* if less than 4 bytes payload length */ 177 /* An empty record must NOT have a type, ID or payload */ 239 /* Payload length - can be 1 or 4 bytes */ 283 /* Payload length - can be 1 or 4 bytes */ 336 /* Payload length - can be 1 or 4 bytes */ 384 /* Payload length - can be 1 or 4 bytes */ 433 /* Payload length - can be 1 or 4 bytes */ 479 /* Payload length - can be 1 or 4 bytes */ 540 /* Payload length - can be 1 or 4 bytes * [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/nfc/tech/ |
NdefTagTester.java | 35 * constant mime type and payload. 43 private static final String PAYLOAD = "CTS Verifier NDEF Tag"; 74 NfcUtils.displayByteArray(mimeRecord.getId()), MIME_TYPE, PAYLOAD); 103 byte[] payload = PAYLOAD.getBytes(Charset.forName("US-ASCII")); 104 return new NdefRecord(NdefRecord.TNF_MIME_MEDIA, mimeBytes, id, payload);
|
/external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Runtime/Antlr.Runtime.Tree/ |
ParseTree.cs | 47 public object payload; field in class:Antlr.Runtime.Tree.ParseTree 51 this.payload = label; 90 if (payload is IToken) { 91 IToken t = (IToken)payload; 97 return payload.ToString(); 131 if (payload is IToken) { // leaf node token?
|
/external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime/Tree/ |
CommonTreeAdaptor.cs | 52 public override object Create( IToken payload ) 54 return new CommonTree( payload ); 60 * token DECL, but you need to create it as a payload or whatever for 65 * If you care what the token payload objects' type is, you should 77 * token DECL, but you need to create it as a payload or whatever for 88 * If you care what the token payload objects' type is, you should
|