/external/wpa_supplicant_8/src/tls/ |
tlsv1_server_write.c | 506 u8 payload[4]; local 513 pos = payload; 522 *msgpos, end - *msgpos, payload, pos - payload, 530 tls_verify_hash_add(&conn->verify, payload, pos - payload); 542 u8 payload[1]; local 546 payload[0] = TLS_CHANGE_CIPHER_SPEC; 549 *msgpos, end - *msgpos, payload, sizeof(payload), [all...] |
tlsv1_cred.c | 377 pos = hdr.payload; 390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); 397 os_memcpy(cred->dh_p, hdr.payload, hdr.length); 399 pos = hdr.payload + hdr.length; 412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length); 419 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
|
tlsv1_record.c | 142 * @payload: Payload to be sent 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 198 os_memmove(pos, payload, payload_len); 217 crypto_hash_update(hmac, payload, payload_len);
|
/external/chromium_org/chrome/browser/policy/test/ |
policy_testserver.py | 550 payload = self.server.ReadPolicyFromDataDir(policy_key, settings) 551 if payload is None: 553 payload = settings.SerializeToString() 556 payload = self.server.ReadPolicyFromDataDir(policy_key, settings) 557 if payload is None: 559 payload = settings.SerializeToString() 562 payload = self.server.ReadPolicyFromDataDir(policy_key, settings) 563 if payload is None: 564 payload = self.CreatePolicyForExternalPolicyData(policy_key) 591 policy_data.policy_value = payload [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
t1_lib.c | 2494 unsigned int payload; local 2563 unsigned int payload = 18; \/* Sequence number + random bytes *\/ local [all...] |
/external/chromium/net/spdy/ |
spdy_framer.cc | 282 // control frame has too-large payload 412 // Does not buffer the control payload. Instead, either passes directly to the 472 // Note that the header block is held in the frame's payload, and is not 1240 const char* payload; local 1431 const char* payload; local 1499 const char* payload; local [all...] |
/external/aac/libSBRdec/include/ |
sbrdecoder.h | 259 * be placed at the end of the SBR payload block. The remaining bits will be returned 260 * into *count if a payload length is given (byPayLen > 0). If no SBR payload length is 266 * \param count Pointer to an integer where the amount of parsed SBR payload bits is stored into. 267 * \param bsPayLen If > 0 this value is the SBR payload length. If < 0, the SBR payload length is unknown.
|
/external/antlr/antlr-3.4/runtime/C/src/ |
antlr3commontree.c | 224 // Pick up the payload we had in the supplied tree 244 // Pick up the payload we had in the supplied tree 296 // the payload and few functions that we 364 //Pick up the payload we had in the supplied tree 383 // The token is the payload of the common tree or other implementor 410 // This is a Nil tree if it has no payload (Token in our case)
|
/external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime/Tree/ |
BaseTreeAdaptor.cs | 67 * if no token payload but you might have to set token type for diff 362 * token DECL, but you need to create it as a payload or whatever for 367 * If you care what the token payload objects' type is, you should 376 * token DECL, but you need to create it as a payload or whatever for 387 * If you care what the token payload objects' type is, you should 393 public abstract object Create( IToken payload );
|
/external/antlr/antlr-3.4/runtime/Python/antlr3/ |
exceptions.py | 142 payload = adaptor.getToken(self.node) 143 if payload is not None: 144 self.token = payload 145 if payload.line <= 0: 162 self.line = payload.line 163 self.charPositionInLine = payload.charPositionInLine
|
/external/chromium_org/third_party/opus/src/silk/ |
dec_API.c | 106 /* Test if first frame in payload */ 171 /* First decoder call for this payload */ 368 const opus_uint8 *payload, /* I Payload data */ 370 const opus_int nFramesPerPayload, /* I Number of SILK frames per payload */ 386 flags = silk_RSHIFT( payload[ 0 ], 7 - nFramesPerPayload ) & ( silk_LSHIFT( 1, nFramesPerPayload + 1 ) - 1 );
|
/external/libnfc-nxp/src/ |
phHciNfc_ISO15693.c | 596 && ((ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i]) 597 || (ISO_15693_SINGLE_TAG_FOUND == message->payload[i])) 605 if (ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i]) 692 hcp_message->payload[i++] = 695 hcp_message->payload[i++] = 698 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
|
/external/qemu/docs/ |
ANDROID-QEMUD.TXT | 74 2 4 4-char hex string giving the payload size 76 6 n the message payload 164 0 4 4-char hex string giving the payload size 166 4 n the message payload 202 0 4 4-char hex string giving the payload size 207 6 n the message payload
|
/frameworks/base/docs/html/guide/topics/connectivity/nfc/ |
nfc.jd | 86 <li>Parsing the NFC tag and figuring out the MIME type or a URI that identifies the data payload 88 <li>Encapsulating the MIME type or URI and the payload into an intent. These first two 141 <dt><strong>Variable length payload</strong></dt> 142 <dd>The actual data payload that you want to read or write. An NDEF 143 message can contain multiple NDEF records, so don't assume the full payload is in the first NDEF 150 android.nfc.NfcAdapter#ACTION_NDEF_DISCOVERED} intent along with the actual payload. However, there 154 android.nfc.Tag} object that has information about the tag's technologies and the payload are 167 such as the payload. On the other hand, if it encounters a record of type {@link 231 <td>URI based on parsing the payload.</td> 237 <td>URI based on payload.</td [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
IccFileHandler.java | 364 data = result.payload; 391 data = result.payload; 427 data = result.payload; 461 sendResult(response, result.payload, null); 463 lc.results.add(result.payload); 490 sendResult(response, result.payload, null);
|
/external/aac/libAACenc/src/ |
bitenc.cpp | 631 description: write extension payload to bitstream 801 /* write payload */ 816 description: write extension payload to bitstream 847 data is written before the SBR payload. */ 854 /* SBR payload is written in reverse */ 917 /* We have normal GA bitstream payload (AOT 2,5,29) so pack [all...] |
/external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Headers/ |
ANTLRBaseTreeAdaptor.h | 59 * if no token payload but you might have to set token type for diff 147 * token DECL, but you need to create it as a payload or whatever for 156 * If you care what the token payload objects' type is, you should
|
/external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Versions/A/Headers/ |
ANTLRBaseTreeAdaptor.h | 59 * if no token payload but you might have to set token type for diff 147 * token DECL, but you need to create it as a payload or whatever for 156 * If you care what the token payload objects' type is, you should
|
/external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Versions/Current/Headers/ |
ANTLRBaseTreeAdaptor.h | 59 * if no token payload but you might have to set token type for diff 147 * token DECL, but you need to create it as a payload or whatever for 156 * If you care what the token payload objects' type is, you should
|
/external/chromium/base/ |
pickle_unittest.cc | 198 iter = pickle.payload(); 213 // construct a message that will be exactly the size of one payload unit, 252 // this should not overwrite the 'int' payload
|
/external/chromium_org/chrome/browser/extensions/api/cast_channel/ |
cast_auth_util_nss.cc | 58 VLOG(1) << "Wrong payload type in challenge reply"; 62 VLOG(1) << "Payload type is binary but payload_binary field not set"; 66 VLOG(1) << "Cannot parse binary payload into DeviceAuthMessage";
|
/external/chromium_org/media/cast/rtcp/ |
test_rtcp_packet_builder.cc | 274 // and the payload type. Set aside room for the length field, 276 void TestRtcpPacketBuilder::AddRtcpHeader(int payload, int format_or_count) { 279 big_endian_writer_.WriteU8(payload);
|
/external/chromium_org/net/base/ |
io_buffer.h | 133 // // payload is the IOBuffer containing the data to be written. 134 // buf = new DrainableIOBuffer(payload, payload_size); 138 // // simply use the regular IOBuffer like payload->data() + offset.
|
/external/chromium_org/third_party/WebKit/Source/heap/ |
Heap.cpp | 147 // memory region) that is used for the actual heap page payload. 162 // [ guard os page | ... payload ... | guard os page ] 195 // after the payload.
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
pseudotcp.h | 157 // send payload or just an ACK packet. 162 // |len| is the number of bytes to read from |m_sbuf| as payload. If this 163 // value is 0 then this is an ACK packet, otherwise this packet has payload.
|