/external/chromium_org/net/http/ |
http_stream_parser.h | 86 // Encodes the given |payload| in the chunked format to |output|. 88 // be large enough to store the encoded chunk, which is payload.size() + 92 // The output will look like: "HEX\r\n[payload]\r\n" 94 static int EncodeChunk(const base::StringPiece& payload,
|
/external/chromium_org/net/websockets/ |
websocket_frame.cc | 95 // - Optional extended payload length 96 // (2 or 8 bytes, present if actual payload length is more than 125 bytes) 98 // - Actual payload (XOR masked with masking key if MASK bit is on) 131 // Writes "extended payload length" field.
|
/external/chromium_org/sync/internal_api/ |
syncapi_server_connection_manager.h | 32 const std::string& payload,
|
/external/chromium_org/sync/protocol/ |
app_notification_specifics.proto | 36 // Payload - these fields are visible to the user content is defined by the
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/mod_pywebsocket/ |
_stream_hixie75.py | 116 """Receive a WebSocket frame and return its payload an unicode string. 119 payload unicode string in a WebSocket frame. 140 # The payload length is specified in the frame. 167 # The payload is delimited with \xff.
|
/external/chromium_org/third_party/libjingle/source/talk/media/base/ |
testutils.h | 80 char payload[16]; member in struct:cricket::RawRtpPacket 91 char payload[16]; member in struct:cricket::RawRtcpPacket 107 // payload. If the stream is a RTCP stream, verify the RTCP header and 108 // payload.
|
/external/dexmaker/src/dx/java/com/android/dx/io/instructions/ |
FillArrayDataPayloadDecodedInstruction.java | 20 * A decoded Dalvik instruction which contains the payload for
|
/external/dropbear/ |
cli-auth.c | 72 banner = buf_getstring(ses.payload, &bannerlen); 73 buf_eatstring(ses.payload); /* The language string */ 173 methods = buf_getstring(ses.payload, &methlen); 175 partial = buf_getbool(ses.payload);
|
cli-channel.c | 48 datatype = buf_getint(ses.payload);
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample | 14 # if the certificate/certificate request payload is received.
|
/external/iptables/extensions/ |
libxt_u32.man | 107 of the ICMP payload, of which byte 0 is the ICMP type. Therefore, we simply 113 TCP payload bytes 8-12 is any of 1, 2, 5 or 8 128 start of the TCP payload. Finally, 8 reads bytes 8-12 of the payload and
|
/external/libnfc-nci/src/nfa/include/ |
nfa_cho_api.h | 283 ** Payload ID must be unique and Payload ID length must be less than 310 ** Payload ID must be unique and Payload ID length must be less than
|
/external/ppp/pppd/plugins/rp-pppoe/ |
pppoe.h | 217 unsigned int length:16; /* Payload length */ 218 unsigned char payload[ETH_DATA_LEN]; /* A bit of room to spare */ member in struct:PPPoEPacketStruct 231 unsigned int length:16; /* Length of payload */ 232 unsigned char payload[ETH_DATA_LEN]; /* A LOT of room to spare */ member in struct:PPPoETagStruct
|
/external/tcpdump/ |
print-atm.c | 308 u_int16_t cell_type, func_type,vpi,vci,payload,clp; local 316 payload = (cell_header>>1)&0x7; 319 printf("%s, vpi %u, vci %u, payload %u, clp %u, ", 321 vpi, vci, payload, clp);
|
print-beep.c | 70 printf(" BEEP (payload or undecoded)");
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 51 /* Encapsulate EAP packet in EAP-Payload TLV */ 52 wpa_printf(MSG_DEBUG, "EAP-FAST: Add EAP-Payload TLV"); 181 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP-Payload TLV", 185 "EAP-Payload TLV in the message");
|
eap_pax_common.h | 22 /* Followed by variable length payload and ICV */
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 369 * Key Exchange Payload: 381 wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload"); 496 wpa_printf(MSG_DEBUG, "IKEV2: Encrypted payload in SA_INIT - " 502 "encrypted payload"); 524 wpa_printf(MSG_INFO, "IKEV2: Too short IDr payload"); 658 wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload"); 664 "Payload"); 690 u8 *payload, size_t payload_len) 696 if (ikev2_parse_payloads(&pl, next_payload, payload, payload [all...] |
/external/wpa_supplicant_8/src/tls/ |
asn1.h | 47 const u8 *payload; member in struct:asn1_hdr
|
/frameworks/base/core/java/android/nfc/tech/ |
IsoDep.java | 152 * <p>Applications must only send the INF payload, and not the start of frame and 153 * end of frame indicators. Applications do not need to fragment the payload, it 185 * 255 payload bytes, which results in a maximum APDU length of 261 bytes. 188 * payload bytes.
|
/frameworks/base/core/java/android/util/ |
EventLog.java | 41 * They carry a payload of one or more int, long, or String values. The 42 * event-log-tags file defines the payload contents for each type code. 110 Log.wtf(TAG, "Illegal entry payload: tag=" + getTag(), e); 113 Log.wtf(TAG, "Truncated entry payload: tag=" + getTag(), e);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter/ |
nfnetlink_compat.h | 25 * bit to indicate whether the payload is nested */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter/ |
nfnetlink_compat.h | 25 * bit to indicate whether the payload is nested */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter/ |
nfnetlink_compat.h | 25 * bit to indicate whether the payload is nested */
|
/system/core/liblog/ |
logd_write.c | 264 int __android_log_bwrite(int32_t tag, const void *payload, size_t len) 270 vec[1].iov_base = (void*)payload; 281 int __android_log_btwrite(int32_t tag, char type, const void *payload, 290 vec[2].iov_base = (void*)payload;
|