/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 386 * Key Exchange Payload: 398 wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload"); 409 /* Reject message with Notify payload of type 502 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload"); 626 wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload"); 632 "Payload"); 658 u8 *payload, size_t payload_len) 664 if (ikev2_parse_payloads(&pl, next_payload, payload, payload + 784 wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Version: 0x%x [all...] |
/frameworks/av/media/libstagefright/wifi-display/source/ |
TSPacketizer.cpp | 490 // -- payload follows 518 // payload) must contain a multiple of 16 bytes of payload per HDCP spec. 531 followed by the payload 538 followed by the payload 569 ALOGV("packet 1 contains %zd padding bytes and %zd bytes of payload", 592 ALOGI("packet %zd contains %zd padding bytes and %zd bytes of payload", 599 // This is how many bytes of payload each subsequent TS packet 620 // There wasn't enough payload left to form a full aligned payload, [all...] |
/external/libnfc-nxp/src/ |
phFriNfc_NdefRecord.h | 74 #define PH_FRINFC_NDEFRECORD_TNF_EMPTY ((uint8_t)0x00) /**< Empty Record, no type, ID or payload present. */ 96 #define PH_FRINFC_NDEFRECORD_FLAGS_SR ((uint8_t)0x10) /**< Short Record: Payload Length is encoded in ONE byte only. */ 114 #define PH_FRINFC_NDEFRECORD_BUF_TNF_VALUE ((uint8_t)0x00) /** \internal If TNF = Empty, Unknown and Unchanged, the id, type and payload length is ZERO */ 210 * The length of the Payload, in bytes. The maximum length is 2^32 - 1. 220 * Payload Data, pointer to a buffer containing the payload data. 222 * \li \b Extraction: The pointer is set to the beginning of the payload. 280 *<br>10.TNF bits are set to 0x00 (Empty), but Payload Length is not equal to zero. 344 *<br>3. TNF bits are set to 0x00 (Empty),but Payload Length is not equal to 0. 473 * Type Length, Payload Length and ID Length for the respective Type, Payload and ID Data [all...] |
phHciNfc_AdminMgmt.c | 743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */ 744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id; 745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id; 746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id; 773 hcp_message->payload[i++] = pipe_id ; [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 422 const u8 *payload, size_t payloadlen) 434 pos = payload; 435 end = payload + payloadlen; 438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload"); 518 const u8 *payload, size_t payloadlen) 530 pos = payload; 531 end = payload + payloadlen; 591 const u8 *payload, size_t payloadlen) 613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len, 638 if (os_memcmp(auth_p, payload + data->sess.pnonce_len [all...] |
/cts/suite/audio_quality/lib/include/audio/ |
AudioProtocol.h | 67 /// default implementation, no param, no payload 69 /// default implementation, no param, no payload
|
/dalvik/dx/src/com/android/dx/io/ |
Opcodes.java | 25 * pseudo-opcode used for nonstandard format payload "instructions". TODO: 26 * Retire this concept, and start treating the payload instructions 264 // TODO: Generate these payload opcodes with opcode-gen. 267 * special pseudo-opcode value for packed-switch data payload 272 /** special pseudo-opcode value for packed-switch data payload 277 /** special pseudo-opcode value for fill-array-data data payload 309 * * (byteValue << 8) -- nop and data payload opcodes 332 * payload opcodes). Extended opcodes require a full 16-bit code
|
/external/antlr/antlr-3.4/runtime/ActionScript/project/src/org/antlr/runtime/tree/ |
Tree.as | 10 * This is a tree node without any payload; just navigation and factory stuff. 87 /** In case we don't have a token payload, what is the line for errors? */
|
/external/antlr/antlr-3.4/runtime/CSharp2/Sources/Antlr3.Runtime/Antlr.Runtime.Debug/ |
ParseTreeBuilder.cs | 65 public virtual ParseTree Create(object payload) { 66 return new ParseTree(payload);
|
/external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime.Debug/ |
ParseTreeBuilder.cs | 70 public virtual ParseTree Create( object payload ) 72 return new ParseTree( payload );
|
/external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/debug/ |
ParseTreeBuilder.java | 60 public ParseTree create(Object payload) { 61 return new ParseTree(payload);
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/tree/ |
debug.rb | 21 def create_with_payload( payload ) 23 @debug_listener.create_node( node, payload )
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
extensions.py | 224 original_payload_size = len(frame.payload) 233 frame.payload = self._deflater.filter(frame.payload) 236 filtered_payload_size = len(frame.payload) 249 received_payload_size = len(frame.payload) 257 frame.payload = self._inflater.filter(frame.payload) 260 filtered_payload_size = len(frame.payload)
|
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/sync/ |
ChromiumSyncAdapterTest.java | 52 public void requestSync(int objectSource, String objectId, long version, String payload) { 56 mPayload = payload;
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
attestation_policy_observer.h | 76 // Gets the payload associated with the EMK and sends it to |callback|. 83 // Marks a key as uploaded in the payload proto.
|
/external/chromium_org/chrome/browser/extensions/api/push_messaging/ |
push_messaging_api.h | 41 const std::string& payload); 47 const std::string& payload) OVERRIDE;
|
/external/chromium_org/chrome/browser/web_resource/ |
notification_promo_mobile_ntp.h | 48 const base::DictionaryValue* payload() const { return payload_; } function in class:NotificationPromoMobileNtp 81 // The entire payload for the promo.
|
/external/chromium_org/components/policy/core/common/cloud/ |
policy_builder.h | 112 // Returns a reference to the payload protobuf being built. 113 PayloadProto& payload() { function in class:policy::TypedPolicyBuilder
|
/external/chromium_org/media/cast/net/rtp_sender/rtp_packetizer/ |
rtp_packetizer.cc | 87 // Split the payload evenly (round number up). 116 // Copy payload data.
|
/external/chromium_org/net/quic/ |
quic_data_reader.cc | 124 StringPiece payload = PeekRemainingPayload(); local 126 return payload;
|
/external/chromium_org/sync/internal_api/ |
http_bridge_unittest.cc | 218 std::string payload = "this should be echoed back"; local 222 payload.length() + 1, payload.c_str()); 230 EXPECT_EQ(payload.length() + 1, 232 EXPECT_EQ(payload, std::string(http_bridge->GetResponseContent())); 244 std::string test_payload = "###TEST PAYLOAD###"; 272 std::string test_payload = "###TEST PAYLOAD###"; 298 std::string test_payload = "###TEST PAYLOAD###";
|
/external/chromium_org/sync/sessions/ |
data_type_tracker.cc | 39 pending_payloads_.push_back(it->payload()); 41 // Drop the oldest payload if we've overflowed.
|
/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
WebSocketPerMessageDeflate.h | 57 // If the compression is done, the payload member of the frame will point the internal buffer 69 // If the decompression is done, the payload member of the frame will point the internal buffer
|
/external/chromium_org/third_party/leveldatabase/src/db/ |
log_writer.cc | 85 // Compute the crc of the record type and the payload. 90 // Write the header and the payload
|
/external/chromium_org/third_party/libjingle/source/talk/media/base/ |
constants.h | 73 // http://tools.ietf.org/html/draft-spittka-payload-rtp-opus-03 81 // values in http://tools.ietf.org/html/draft-spittka-payload-rtp-opus-03
|