/external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/tree/ |
H A D | TreeAdaptor.java | 47 * then the token just becomes the payload. This is the most 52 public Object create(Token payload); argument
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
H A D | ANTLRCommonTreeAdaptor.h | 42 - (ANTLRCommonTree *) create:(id<ANTLRToken>) payload;
|
/external/chromium/chrome/browser/sync/notifier/ |
H A D | chrome_invalidation_client.h | 98 const syncable::ModelTypeSet& types, const std::string& payload);
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
H A D | stunport.h | 92 const talk_base::SocketAddress& addr, bool payload);
|
H A D | udpport.cc | 83 const talk_base::SocketAddress& addr, bool payload) { 82 SendTo(const void* data, size_t size, const talk_base::SocketAddress& addr, bool payload) argument
|
/external/valgrind/main/helgrind/ |
H A D | hg_errors.h | 85 /*OUT*/Addr* payload,
|
/external/webkit/Source/WebKit/qt/WebCoreSupport/ |
H A D | InspectorServerQt.cpp | 311 int InspectorServerRequestHandlerQt::webSocketSend(QByteArray payload) argument 315 int nBytes = m_tcpConnection->write(payload); 360 QByteArray payload = m_data.mid(1, length); 365 inspectorController->dispatchMessageFromFrontend(QString::fromUtf8(payload)); 369 // Remove this WebSocket message from m_data (payload, start-of-frame byte, end-of-frame byte).
|
/external/dhcpcd/ |
H A D | bpf.c | 168 const unsigned char *payload; local 193 payload = iface->buffer + packet.bh_hdrlen + ETHER_HDR_LEN; 197 memcpy(data, payload, bytes);
|
/external/dropbear/ |
H A D | cli-chansession.c | 64 type = buf_getstring(ses.payload, NULL); 65 wantreply = buf_getbool(ses.payload); 68 cli_ses.retval = buf_getint(ses.payload);
|
H A D | common-channel.c | 168 * data packet (ses.payload must be positioned appropriately). 175 chan = buf_getint(ses.payload); 684 datalen = buf_getint(ses.payload); 698 * is payload data */ 705 buf_getptr(ses.payload, buflen), buflen); 707 buf_incrpos(ses.payload, buflen); 728 incr = buf_getint(ses.payload); 768 type = buf_getstring(ses.payload, &typelen); 770 remotechan = buf_getint(ses.payload); 771 transwindow = buf_getint(ses.payload); [all...] |
H A D | common-session.c | 77 ses.payload = NULL; 133 dropbear_assert(ses.payload == NULL); 191 if (ses.payload != NULL) {
|
H A D | svr-auth.c | 111 username = buf_getstring(ses.payload, &userlen); 112 servicename = buf_getstring(ses.payload, &servicelen); 113 methodname = buf_getstring(ses.payload, &methodlen);
|
/external/kernel-headers/original/linux/ |
H A D | key.h | 39 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */ 40 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */ 132 unsigned short datalen; /* payload data length 133 * - may not match RCU dereferenced payload 134 * - payload should contain own length 173 } payload; member in struct:key 187 /* default payload length for quota precalculation (optional) 195 * user's quota will hold the payload 299 const void *payload, 304 const void *payload, [all...] |
/external/libnfc-nxp/src/ |
H A D | phHciNfc_AdminMgmt.c | 743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */ 744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id; 745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id; 746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id; 773 hcp_message->payload[i++] = pipe_id ; 892 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET]; 997 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET]; 1004 hcp_message->payload[index++]; 1007 hcp_message->payload[index++]; 1010 hcp_message->payload[inde [all...] |
H A D | phHciNfc_RFReaderA.c | 836 HCI_DEBUG ("HCI : Multiple tag found : %02X\n", message->payload[i]); 839 && ((RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i] ) 840 || (RDR_A_SINGLE_TAG_FOUND == message->payload[i])) 845 if (RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i]) 1041 hcp_message->payload[i++] = nxp_nfc_mifareraw_timeout; 1043 hcp_message->payload[i++] = RDR_A_MIFARE_STATUS; 1050 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload, 1081 hcp_message->payload[i++] = 1084 hcp_message->payload[i++] = 1086 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload, [all...] |
H A D | phHciNfc_ISO15693.c | 596 && ((ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i]) 597 || (ISO_15693_SINGLE_TAG_FOUND == message->payload[i])) 605 if (ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i]) 692 hcp_message->payload[i++] = 695 hcp_message->payload[i++] = 698 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
|
/external/openssl/ssl/ |
H A D | d1_both.c | 1452 unsigned int payload; local 1455 /* Read type and payload length first */ 1457 n2s(p, payload); 1471 * message type, plus 2 bytes payload length, plus 1472 * payload, plus padding 1474 buffer = OPENSSL_malloc(1 + 2 + payload + padding); 1477 /* Enter response type, length and copy payload */ 1479 s2n(payload, bp); 1480 memcpy(bp, pl, payload); 1481 bp += payload; 1522 unsigned int payload = 18; /* Sequence number + random bytes */ local [all...] |
/external/webkit/Source/JavaScriptCore/jit/ |
H A D | JSInterfaceJIT.h | 192 inline Jump emitLoadJSCell(unsigned virtualRegisterIndex, RegisterID payload); 225 inline JSInterfaceJIT::Jump JSInterfaceJIT::emitLoadJSCell(unsigned virtualRegisterIndex, RegisterID payload) argument 227 loadPtr(payloadFor(virtualRegisterIndex), payload); local 253 return Address(base, (static_cast<unsigned>(virtualRegisterIndex) * sizeof(Register)) + OBJECT_OFFSETOF(JSValue, u.asBits.payload)); 335 return Address(base, (static_cast<unsigned>(virtualRegisterIndex) * sizeof(Register)) + OBJECT_OFFSETOF(EncodedValueDescriptor, asBits.payload));
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sake.c | 310 const u8 *payload, size_t payloadlen) 324 const u8 *payload, size_t payloadlen) 334 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 387 const u8 *payload, size_t payloadlen) 397 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 422 const u8 *payload, size_t payloadlen) 307 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 321 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 384 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 419 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sake.c | 305 const u8 *payload, size_t payloadlen) 319 const u8 *payload, size_t payloadlen) 329 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 382 const u8 *payload, size_t payloadlen) 392 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 417 const u8 *payload, size_t payloadlen) 302 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 316 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 379 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 414 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sake.c | 305 const u8 *payload, size_t payloadlen) 319 const u8 *payload, size_t payloadlen) 329 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 382 const u8 *payload, size_t payloadlen) 392 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 417 const u8 *payload, size_t payloadlen) 302 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 316 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 379 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 414 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 305 const u8 *payload, size_t payloadlen) 319 const u8 *payload, size_t payloadlen) 329 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 382 const u8 *payload, size_t payloadlen) 392 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) 417 const u8 *payload, size_t payloadlen) 302 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 316 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 379 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 414 eap_sake_process_auth_reject(struct eap_sm *sm, struct eap_sake_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
|
/external/antlr/antlr-3.4/runtime/ActionScript/project/src/org/antlr/runtime/tree/ |
H A D | BaseTreeAdaptor.as | 27 * if no token payload but you might have to set token type for diff 215 * token DECL, but you need to create it as a payload or whatever for 218 * If you care what the token payload objects' type is, you should 227 * token DECL, but you need to create it as a payload or whatever for 236 * If you care what the token payload objects' type is, you should 244 public function createWithPayload(payload:Token):Object {
|
/external/webkit/Source/JavaScriptCore/runtime/ |
H A D | JSValue.h | 76 int32_t payload; member in struct:JSC::EncodedValueDescriptor::__anon13022 80 int32_t payload; member in struct:JSC::EncodedValueDescriptor::__anon13023 257 * can encode a 51-bit payload. Hardware produced and C-library payloads typically 258 * have a payload of zero. We assume that non-zero payloads are available to encode 260 * all set represents a NaN with a non-zero payload, we can use this space in the NaN 266 * cell, integer and bool values the lower 32 bits (the 'payload') contain the pointer 267 * integer or boolean value; in the case of all other tags the payload is 0. 280 int32_t payload() const; 288 * can encode a 51-bit payload. Hardware produced and C-library payloads typically 289 * have a payload o [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 142 * @payload: Payload to be sent 143 * @payload_len: Length of the payload 151 size_t buf_size, const u8 *payload, size_t payload_len, 198 os_memmove(pos, payload, payload_len); 217 crypto_hash_update(hmac, payload, payload_len); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument
|