HomeSort by relevance Sort by last modified time
    Searched full:payload (Results 651 - 675 of 1940) sorted by null

<<21222324252627282930>>

  /external/wpa_supplicant_8/src/tls/
tlsv1_server_write.c 506 u8 payload[4]; local
513 pos = payload;
522 *msgpos, end - *msgpos, payload, pos - payload,
530 tls_verify_hash_add(&conn->verify, payload, pos - payload);
542 u8 payload[1]; local
546 payload[0] = TLS_CHANGE_CIPHER_SPEC;
549 *msgpos, end - *msgpos, payload, sizeof(payload),
    [all...]
tlsv1_cred.c 377 pos = hdr.payload;
390 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length);
397 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
399 pos = hdr.payload + hdr.length;
412 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length);
419 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
tlsv1_record.c 142 * @payload: Payload to be sent
143 * @payload_len: Length of the payload
151 size_t buf_size, const u8 *payload, size_t payload_len,
198 os_memmove(pos, payload, payload_len);
217 crypto_hash_update(hmac, payload, payload_len);
  /external/chromium_org/chrome/browser/policy/test/
policy_testserver.py 550 payload = self.server.ReadPolicyFromDataDir(policy_key, settings)
551 if payload is None:
553 payload = settings.SerializeToString()
556 payload = self.server.ReadPolicyFromDataDir(policy_key, settings)
557 if payload is None:
559 payload = settings.SerializeToString()
562 payload = self.server.ReadPolicyFromDataDir(policy_key, settings)
563 if payload is None:
564 payload = self.CreatePolicyForExternalPolicyData(policy_key)
591 policy_data.policy_value = payload
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
t1_lib.c 2494 unsigned int payload; local
2563 unsigned int payload = 18; \/* Sequence number + random bytes *\/ local
    [all...]
  /external/chromium/net/spdy/
spdy_framer.cc 282 // control frame has too-large payload
412 // Does not buffer the control payload. Instead, either passes directly to the
472 // Note that the header block is held in the frame's payload, and is not
1240 const char* payload; local
1431 const char* payload; local
1499 const char* payload; local
    [all...]
  /external/aac/libSBRdec/include/
sbrdecoder.h 259 * be placed at the end of the SBR payload block. The remaining bits will be returned
260 * into *count if a payload length is given (byPayLen > 0). If no SBR payload length is
266 * \param count Pointer to an integer where the amount of parsed SBR payload bits is stored into.
267 * \param bsPayLen If > 0 this value is the SBR payload length. If < 0, the SBR payload length is unknown.
  /external/antlr/antlr-3.4/runtime/C/src/
antlr3commontree.c 224 // Pick up the payload we had in the supplied tree
244 // Pick up the payload we had in the supplied tree
296 // the payload and few functions that we
364 //Pick up the payload we had in the supplied tree
383 // The token is the payload of the common tree or other implementor
410 // This is a Nil tree if it has no payload (Token in our case)
  /external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime/Tree/
BaseTreeAdaptor.cs 67 * if no token payload but you might have to set token type for diff
362 * token DECL, but you need to create it as a payload or whatever for
367 * If you care what the token payload objects' type is, you should
376 * token DECL, but you need to create it as a payload or whatever for
387 * If you care what the token payload objects' type is, you should
393 public abstract object Create( IToken payload );
  /external/antlr/antlr-3.4/runtime/Python/antlr3/
exceptions.py 142 payload = adaptor.getToken(self.node)
143 if payload is not None:
144 self.token = payload
145 if payload.line <= 0:
162 self.line = payload.line
163 self.charPositionInLine = payload.charPositionInLine
  /external/chromium_org/third_party/opus/src/silk/
dec_API.c 106 /* Test if first frame in payload */
171 /* First decoder call for this payload */
368 const opus_uint8 *payload, /* I Payload data */
370 const opus_int nFramesPerPayload, /* I Number of SILK frames per payload */
386 flags = silk_RSHIFT( payload[ 0 ], 7 - nFramesPerPayload ) & ( silk_LSHIFT( 1, nFramesPerPayload + 1 ) - 1 );
  /external/libnfc-nxp/src/
phHciNfc_ISO15693.c 596 && ((ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i])
597 || (ISO_15693_SINGLE_TAG_FOUND == message->payload[i]))
605 if (ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i])
692 hcp_message->payload[i++] =
695 hcp_message->payload[i++] =
698 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
  /external/qemu/docs/
ANDROID-QEMUD.TXT 74 2 4 4-char hex string giving the payload size
76 6 n the message payload
164 0 4 4-char hex string giving the payload size
166 4 n the message payload
202 0 4 4-char hex string giving the payload size
207 6 n the message payload
  /frameworks/base/docs/html/guide/topics/connectivity/nfc/
nfc.jd 86 <li>Parsing the NFC tag and figuring out the MIME type or a URI that identifies the data payload
88 <li>Encapsulating the MIME type or URI and the payload into an intent. These first two
141 <dt><strong>Variable length payload</strong></dt>
142 <dd>The actual data payload that you want to read or write. An NDEF
143 message can contain multiple NDEF records, so don't assume the full payload is in the first NDEF
150 android.nfc.NfcAdapter#ACTION_NDEF_DISCOVERED} intent along with the actual payload. However, there
154 android.nfc.Tag} object that has information about the tag's technologies and the payload are
167 such as the payload. On the other hand, if it encounters a record of type {@link
231 <td>URI based on parsing the payload.</td>
237 <td>URI based on payload.</td
    [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
IccFileHandler.java 364 data = result.payload;
391 data = result.payload;
427 data = result.payload;
461 sendResult(response, result.payload, null);
463 lc.results.add(result.payload);
490 sendResult(response, result.payload, null);
  /external/aac/libAACenc/src/
bitenc.cpp 631 description: write extension payload to bitstream
801 /* write payload */
816 description: write extension payload to bitstream
847 data is written before the SBR payload. */
854 /* SBR payload is written in reverse */
917 /* We have normal GA bitstream payload (AOT 2,5,29) so pack
    [all...]
  /external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Headers/
ANTLRBaseTreeAdaptor.h 59 * if no token payload but you might have to set token type for diff
147 * token DECL, but you need to create it as a payload or whatever for
156 * If you care what the token payload objects' type is, you should
  /external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Versions/A/Headers/
ANTLRBaseTreeAdaptor.h 59 * if no token payload but you might have to set token type for diff
147 * token DECL, but you need to create it as a payload or whatever for
156 * If you care what the token payload objects' type is, you should
  /external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Versions/Current/Headers/
ANTLRBaseTreeAdaptor.h 59 * if no token payload but you might have to set token type for diff
147 * token DECL, but you need to create it as a payload or whatever for
156 * If you care what the token payload objects' type is, you should
  /external/chromium/base/
pickle_unittest.cc 198 iter = pickle.payload();
213 // construct a message that will be exactly the size of one payload unit,
252 // this should not overwrite the 'int' payload
  /external/chromium_org/chrome/browser/extensions/api/cast_channel/
cast_auth_util_nss.cc 58 VLOG(1) << "Wrong payload type in challenge reply";
62 VLOG(1) << "Payload type is binary but payload_binary field not set";
66 VLOG(1) << "Cannot parse binary payload into DeviceAuthMessage";
  /external/chromium_org/media/cast/rtcp/
test_rtcp_packet_builder.cc 274 // and the payload type. Set aside room for the length field,
276 void TestRtcpPacketBuilder::AddRtcpHeader(int payload, int format_or_count) {
279 big_endian_writer_.WriteU8(payload);
  /external/chromium_org/net/base/
io_buffer.h 133 // // payload is the IOBuffer containing the data to be written.
134 // buf = new DrainableIOBuffer(payload, payload_size);
138 // // simply use the regular IOBuffer like payload->data() + offset.
  /external/chromium_org/third_party/WebKit/Source/heap/
Heap.cpp 147 // memory region) that is used for the actual heap page payload.
162 // [ guard os page | ... payload ... | guard os page ]
195 // after the payload.
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
pseudotcp.h 157 // send payload or just an ACK packet.
162 // |len| is the number of bytes to read from |m_sbuf| as payload. If this
163 // value is 0 then this is an ACK packet, otherwise this packet has payload.

Completed in 1196 milliseconds

<<21222324252627282930>>