Searched refs:payload (Results 201 - 225 of 348) sorted by relevance

1234567891011>>

/external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/tree/
H A DTreeAdaptor.java47 * then the token just becomes the payload. This is the most
52 public Object create(Token payload); argument
/external/antlr/antlr-3.4/runtime/ObjC/Framework/
H A DANTLRCommonTreeAdaptor.h42 - (ANTLRCommonTree *) create:(id<ANTLRToken>) payload;
/external/chromium/chrome/browser/sync/notifier/
H A Dchrome_invalidation_client.h98 const syncable::ModelTypeSet& types, const std::string& payload);
/external/chromium/third_party/libjingle/source/talk/p2p/base/
H A Dstunport.h92 const talk_base::SocketAddress& addr, bool payload);
H A Dudpport.cc83 const talk_base::SocketAddress& addr, bool payload) {
82 SendTo(const void* data, size_t size, const talk_base::SocketAddress& addr, bool payload) argument
/external/valgrind/main/helgrind/
H A Dhg_errors.h85 /*OUT*/Addr* payload,
/external/webkit/Source/WebKit/qt/WebCoreSupport/
H A DInspectorServerQt.cpp311 int InspectorServerRequestHandlerQt::webSocketSend(QByteArray payload) argument
315 int nBytes = m_tcpConnection->write(payload);
360 QByteArray payload = m_data.mid(1, length);
365 inspectorController->dispatchMessageFromFrontend(QString::fromUtf8(payload));
369 // Remove this WebSocket message from m_data (payload, start-of-frame byte, end-of-frame byte).
/external/dhcpcd/
H A Dbpf.c168 const unsigned char *payload; local
193 payload = iface->buffer + packet.bh_hdrlen + ETHER_HDR_LEN;
197 memcpy(data, payload, bytes);
/external/dropbear/
H A Dcli-chansession.c64 type = buf_getstring(ses.payload, NULL);
65 wantreply = buf_getbool(ses.payload);
68 cli_ses.retval = buf_getint(ses.payload);
H A Dcommon-channel.c168 * data packet (ses.payload must be positioned appropriately).
175 chan = buf_getint(ses.payload);
684 datalen = buf_getint(ses.payload);
698 * is payload data */
705 buf_getptr(ses.payload, buflen), buflen);
707 buf_incrpos(ses.payload, buflen);
728 incr = buf_getint(ses.payload);
768 type = buf_getstring(ses.payload, &typelen);
770 remotechan = buf_getint(ses.payload);
771 transwindow = buf_getint(ses.payload);
[all...]
H A Dcommon-session.c77 ses.payload = NULL;
133 dropbear_assert(ses.payload == NULL);
191 if (ses.payload != NULL) {
H A Dsvr-auth.c111 username = buf_getstring(ses.payload, &userlen);
112 servicename = buf_getstring(ses.payload, &servicelen);
113 methodname = buf_getstring(ses.payload, &methodlen);
/external/kernel-headers/original/linux/
H A Dkey.h39 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */
40 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */
132 unsigned short datalen; /* payload data length
133 * - may not match RCU dereferenced payload
134 * - payload should contain own length
173 } payload; member in struct:key
187 /* default payload length for quota precalculation (optional)
195 * user's quota will hold the payload
299 const void *payload,
304 const void *payload,
[all...]
/external/libnfc-nxp/src/
H A DphHciNfc_AdminMgmt.c743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */
744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id;
745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id;
746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id;
773 hcp_message->payload[i++] = pipe_id ;
892 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET];
997 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET];
1004 hcp_message->payload[index++];
1007 hcp_message->payload[index++];
1010 hcp_message->payload[inde
[all...]
H A DphHciNfc_RFReaderA.c836 HCI_DEBUG ("HCI : Multiple tag found : %02X\n", message->payload[i]);
839 && ((RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i] )
840 || (RDR_A_SINGLE_TAG_FOUND == message->payload[i]))
845 if (RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i])
1041 hcp_message->payload[i++] = nxp_nfc_mifareraw_timeout;
1043 hcp_message->payload[i++] = RDR_A_MIFARE_STATUS;
1050 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
1081 hcp_message->payload[i++] =
1084 hcp_message->payload[i++] =
1086 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
[all...]
H A DphHciNfc_ISO15693.c596 && ((ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i])
597 || (ISO_15693_SINGLE_TAG_FOUND == message->payload[i]))
605 if (ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i])
692 hcp_message->payload[i++] =
695 hcp_message->payload[i++] =
698 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
/external/openssl/ssl/
H A Dd1_both.c1452 unsigned int payload; local
1455 /* Read type and payload length first */
1457 n2s(p, payload);
1471 * message type, plus 2 bytes payload length, plus
1472 * payload, plus padding
1474 buffer = OPENSSL_malloc(1 + 2 + payload + padding);
1477 /* Enter response type, length and copy payload */
1479 s2n(payload, bp);
1480 memcpy(bp, pl, payload);
1481 bp += payload;
1522 unsigned int payload = 18; /* Sequence number + random bytes */ local
[all...]
/external/webkit/Source/JavaScriptCore/jit/
H A DJSInterfaceJIT.h192 inline Jump emitLoadJSCell(unsigned virtualRegisterIndex, RegisterID payload);
225 inline JSInterfaceJIT::Jump JSInterfaceJIT::emitLoadJSCell(unsigned virtualRegisterIndex, RegisterID payload) argument
227 loadPtr(payloadFor(virtualRegisterIndex), payload); local
253 return Address(base, (static_cast<unsigned>(virtualRegisterIndex) * sizeof(Register)) + OBJECT_OFFSETOF(JSValue, u.asBits.payload));
335 return Address(base, (static_cast<unsigned>(virtualRegisterIndex) * sizeof(Register)) + OBJECT_OFFSETOF(EncodedValueDescriptor, asBits.payload));
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sake.c310 const u8 *payload, size_t payloadlen)
324 const u8 *payload, size_t payloadlen)
334 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
387 const u8 *payload, size_t payloadlen)
397 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
422 const u8 *payload, size_t payloadlen)
307 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
321 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
384 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
419 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sake.c305 const u8 *payload, size_t payloadlen)
319 const u8 *payload, size_t payloadlen)
329 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
382 const u8 *payload, size_t payloadlen)
392 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
417 const u8 *payload, size_t payloadlen)
302 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
316 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
379 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
414 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sake.c305 const u8 *payload, size_t payloadlen)
319 const u8 *payload, size_t payloadlen)
329 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
382 const u8 *payload, size_t payloadlen)
392 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
417 const u8 *payload, size_t payloadlen)
302 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
316 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
379 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
414 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sake.c305 const u8 *payload, size_t payloadlen)
319 const u8 *payload, size_t payloadlen)
329 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
382 const u8 *payload, size_t payloadlen)
392 if (eap_sake_parse_attributes(payload, payloadlen, &attr))
417 const u8 *payload, size_t payloadlen)
302 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
316 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
379 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
414 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
/external/antlr/antlr-3.4/runtime/ActionScript/project/src/org/antlr/runtime/tree/
H A DBaseTreeAdaptor.as27 * if no token payload but you might have to set token type for diff
215 * token DECL, but you need to create it as a payload or whatever for
218 * If you care what the token payload objects' type is, you should
227 * token DECL, but you need to create it as a payload or whatever for
236 * If you care what the token payload objects' type is, you should
244 public function createWithPayload(payload:Token):Object {
/external/webkit/Source/JavaScriptCore/runtime/
H A DJSValue.h76 int32_t payload; member in struct:JSC::EncodedValueDescriptor::__anon13022
80 int32_t payload; member in struct:JSC::EncodedValueDescriptor::__anon13023
257 * can encode a 51-bit payload. Hardware produced and C-library payloads typically
258 * have a payload of zero. We assume that non-zero payloads are available to encode
260 * all set represents a NaN with a non-zero payload, we can use this space in the NaN
266 * cell, integer and bool values the lower 32 bits (the 'payload') contain the pointer
267 * integer or boolean value; in the case of all other tags the payload is 0.
280 int32_t payload() const;
288 * can encode a 51-bit payload. Hardware produced and C-library payloads typically
289 * have a payload o
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_record.c142 * @payload: Payload to be sent
143 * @payload_len: Length of the payload
151 size_t buf_size, const u8 *payload, size_t payload_len,
198 os_memmove(pos, payload, payload_len);
217 crypto_hash_update(hmac, payload, payload_len);
150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument

Completed in 424 milliseconds

1234567891011>>