/external/chromium_org/chrome/browser/extensions/ |
extension_keybinding_registry.cc | 149 std::pair<const std::string, const std::string>* payload = local 155 extensions()->GetByID(payload->first); 163 AddExtensionKeybinding(extension, payload->second); 165 RemoveExtensionKeybinding(extension, payload->second);
|
/external/chromium_org/chrome/common/extensions/api/ |
diagnostics.idl | 17 // Size of the payload. If omitted, the system default value will be used.
|
/external/chromium_org/chrome/renderer/resources/extensions/ |
file_browser_handler_custom_bindings.js | 26 // The second parameter for this event's payload is file definition
|
/external/chromium_org/components/policy/core/common/cloud/ |
component_cloud_policy_store.h | 102 // and the parsed ExternalPolicyData in |payload|. 103 // If |proto| validates successfully then its |payload| can be trusted, and 109 enterprise_management::ExternalPolicyData* payload); 118 enterprise_management::ExternalPolicyData* payload,
|
/external/chromium_org/jingle/notifier/listener/ |
notification_defines.h | 56 // The notification data payload.
|
/external/chromium_org/mojo/public/bindings/lib/ |
message.h | 24 uint8_t payload[1]; member in struct:mojo::MessageData
|
/external/chromium_org/net/quic/crypto/ |
null_encrypter_test.cc | 22 // payload
|
/external/chromium_org/sync/notifier/ |
sync_invalidation_listener_unittest.cc | 169 return it->second.back().payload(); 401 // |payload| can be NULL. 403 int64 version, const char* payload) { 405 if (payload) { 406 inv = invalidation::Invalidation(object_id, version, payload); 416 // |payload| can be NULL, but not |type_name|. 486 // Fire an invalidation without a payload. It should be processed, 487 // the payload should remain empty, and the version should be updated. 499 // Fire an invalidation with an empty payload. It should be 500 // processed, the payload should remain empty, and the version shoul [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
WebSocketDeflateFramer.cpp | 179 if (!m_deflater->addBytes(frame.payload, frame.payloadLength) || !m_deflater->finish()) { 184 frame.payload = m_deflater->data(); 206 if (!m_inflater->addBytes(frame.payload, frame.payloadLength) || !m_inflater->finish()) { 211 frame.payload = m_inflater->data();
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
pubsubtasks.cc | 73 // Creates <pubsub node="node"><publish><item id="itemid">payload</item>... 74 // Takes ownership of payload. 93 // Creates <pubsub node="node"><publish><item id="itemid">payload</item>... 94 // Takes ownership of payload.
|
/external/chromium_org/third_party/libxslt/libxslt/ |
pattern.h | 48 xsltNormalizeCompSteps (void *payload,
|
/external/chromium_org/tools/grit/grit/gather/ |
chrome_scaled_image_unittest.py | 41 chunks = [pack_int32(len(payload)) + type + payload + pack_int32(zlib.crc32(type + payload)) 42 for type, payload in chunks]
|
/external/dexmaker/src/dx/java/com/android/dx/io/instructions/ |
CodeCursor.java | 35 * addresses to switch data payload instructions, whose relative
|
PackedSwitchPayloadDecodedInstruction.java | 20 * A decoded Dalvik instruction which contains the payload for
|
SparseSwitchPayloadDecodedInstruction.java | 20 * A decoded Dalvik instruction which contains the payload for
|
/external/dropbear/ |
cli-authpubkey.c | 72 algotype = buf_getstring(ses.payload, &algolen); 79 remotelen = buf_getint(ses.payload); 106 buf_getptr(ses.payload, remotelen), remotelen) != 0) { 160 * the contents of the write payload to this point */
|
svr-chansession.c | 320 type = buf_getstring(ses.payload, &typelen); 321 wantreply = buf_getbool(ses.payload); 383 signame = buf_getstring(ses.payload, NULL); 419 termc = buf_getint(ses.payload); 420 termr = buf_getint(ses.payload); 421 termw = buf_getint(ses.payload); 422 termh = buf_getint(ses.payload); 446 len = buf_getint(ses.payload); 448 len, ses.payload->len , ses.payload->pos)) [all...] |
svr-x11fwd.c | 55 chansess->x11singleconn = buf_getbool(ses.payload); 56 chansess->x11authprot = buf_getstring(ses.payload, NULL); 57 chansess->x11authcookie = buf_getstring(ses.payload, NULL); 58 chansess->x11screennum = buf_getint(ses.payload);
|
/external/iptables/extensions/ |
libip6t_ipv6header.man | 28 Encapsulating Security Payload header
|
/external/iptables/include/linux/netfilter_ipv4/ |
ipt_ULOG.h | 46 unsigned char payload[0]; member in struct:ulog_packet_msg
|
/external/kernel-headers/original/linux/netfilter_ipv4/ |
ipt_ULOG.h | 46 unsigned char payload[0]; member in struct:ulog_packet_msg
|
/external/libvpx/libvpx/vpx_mem/memory_manager/ |
hmm_largest.c | 51 /* Convert largest size to AAUs and subract head size leaving payload
|
/external/libxslt/libxslt/ |
pattern.h | 48 xsltNormalizeCompSteps (void *payload,
|
/external/smack/src/org/jivesoftware/smackx/pubsub/ |
Item.java | 27 * <li>Will have a payload if the node configuration has {@link ConfigureForm#isDeliverPayloads()} set
34 * <li>Will require payload if the node configuration has {@link ConfigureForm#isDeliverPayloads()} set
37 * <p>To customise the payload object being returned from the {@link #getPayload()} method, you can
59 * Create an <tt>Item</tt> with an id but no payload. This is a valid item for nodes which are configured
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.h | 65 size_t buf_size, const u8 *payload, size_t payload_len,
|