Searched refs:payload (Results 201 - 225 of 353) sorted by relevance

1234567891011>>

/external/dexmaker/src/dx/java/com/android/dx/io/instructions/
H A DInstructionCodec.java473 * payload target instructions.
758 PackedSwitchPayloadDecodedInstruction payload =
760 int[] targets = payload.getTargets();
763 out.write(payload.getOpcodeUnit());
765 out.writeInt(payload.getFirstKey());
794 SparseSwitchPayloadDecodedInstruction payload =
796 int[] keys = payload.getKeys();
797 int[] targets = payload.getTargets();
800 out.write(payload.getOpcodeUnit());
864 FillArrayDataPayloadDecodedInstruction payload
[all...]
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/tree/
H A Ddebug.rb21 def create_with_payload( payload )
23 @debug_listener.create_node( node, payload )
/external/chromium/third_party/libjingle/source/talk/session/phone/
H A Dcodec.h53 bool Matches(int payload, const std::string& nm) const;
103 bool Matches(int payload, const std::string& nm) const;
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/
H A Dextensions.py224 original_payload_size = len(frame.payload)
233 frame.payload = self._deflater.filter(frame.payload)
236 filtered_payload_size = len(frame.payload)
249 received_payload_size = len(frame.payload)
257 frame.payload = self._inflater.filter(frame.payload)
260 filtered_payload_size = len(frame.payload)
/external/dropbear/
H A Dcli-tcpfwd.c174 buf_eatstring(ses.payload);
176 origport = buf_getint(ses.payload);
H A Dsvr-authpam.c186 changepw = buf_getbool(ses.payload);
193 password = buf_getstring(ses.payload, &passwordlen);
H A Dcli-chansession.c64 type = buf_getstring(ses.payload, NULL);
65 wantreply = buf_getbool(ses.payload);
68 cli_ses.retval = buf_getint(ses.payload);
H A Dcommon-channel.c168 * data packet (ses.payload must be positioned appropriately).
175 chan = buf_getint(ses.payload);
684 datalen = buf_getint(ses.payload);
698 * is payload data */
705 buf_getptr(ses.payload, buflen), buflen);
707 buf_incrpos(ses.payload, buflen);
728 incr = buf_getint(ses.payload);
768 type = buf_getstring(ses.payload, &typelen);
770 remotechan = buf_getint(ses.payload);
771 transwindow = buf_getint(ses.payload);
[all...]
H A Dcommon-session.c77 ses.payload = NULL;
133 dropbear_assert(ses.payload == NULL);
191 if (ses.payload != NULL) {
H A Dsvr-auth.c111 username = buf_getstring(ses.payload, &userlen);
112 servicename = buf_getstring(ses.payload, &servicelen);
113 methodname = buf_getstring(ses.payload, &methodlen);
/external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime.Test/SlimParsing/Tree/
H A DITreeAdaptor`1.cs41 * then the token just becomes the payload. This is the most
49 T Create(IToken payload); argument
/external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/tree/
H A DTreeAdaptor.java47 * then the token just becomes the payload. This is the most
52 public Object create(Token payload); argument
/external/antlr/antlr-3.4/runtime/ObjC/Framework/
H A DANTLRCommonTreeAdaptor.h42 - (ANTLRCommonTree *) create:(id<ANTLRToken>) payload;
/external/chromium/chrome/browser/sync/notifier/
H A Dchrome_invalidation_client.h98 const syncable::ModelTypeSet& types, const std::string& payload);
/external/chromium/third_party/libjingle/source/talk/p2p/base/
H A Dstunport.h92 const talk_base::SocketAddress& addr, bool payload);
H A Dudpport.cc83 const talk_base::SocketAddress& addr, bool payload) {
82 SendTo(const void* data, size_t size, const talk_base::SocketAddress& addr, bool payload) argument
/external/valgrind/main/helgrind/
H A Dhg_errors.h85 /*OUT*/Addr* payload,
/external/webkit/Source/WebKit/qt/WebCoreSupport/
H A DInspectorServerQt.cpp311 int InspectorServerRequestHandlerQt::webSocketSend(QByteArray payload) argument
315 int nBytes = m_tcpConnection->write(payload);
360 QByteArray payload = m_data.mid(1, length);
365 inspectorController->dispatchMessageFromFrontend(QString::fromUtf8(payload));
369 // Remove this WebSocket message from m_data (payload, start-of-frame byte, end-of-frame byte).
/external/dhcpcd/
H A Dbpf.c168 const unsigned char *payload; local
196 payload = iface->buffer + packet.bh_hdrlen + ETHER_HDR_LEN;
200 memcpy(data, payload, bytes);
/external/kernel-headers/original/linux/
H A Dkey.h39 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */
40 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */
132 unsigned short datalen; /* payload data length
133 * - may not match RCU dereferenced payload
134 * - payload should contain own length
173 } payload; member in struct:key
187 /* default payload length for quota precalculation (optional)
195 * user's quota will hold the payload
299 const void *payload,
304 const void *payload,
[all...]
/external/libnfc-nxp/src/
H A DphHciNfc_AdminMgmt.c743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */
744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id;
745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id;
746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id;
773 hcp_message->payload[i++] = pipe_id ;
892 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET];
997 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET];
1005 hcp_message->payload[index++];
1008 hcp_message->payload[index++];
1011 hcp_message->payload[inde
[all...]
H A DphHciNfc_RFReaderA.c836 HCI_DEBUG ("HCI : Multiple tag found : %02X\n", message->payload[i]);
839 && ((RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i] )
840 || (RDR_A_SINGLE_TAG_FOUND == message->payload[i]))
845 if (RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i])
1041 hcp_message->payload[i++] = nxp_nfc_mifareraw_timeout;
1043 hcp_message->payload[i++] = RDR_A_MIFARE_STATUS;
1050 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
1081 hcp_message->payload[i++] =
1084 hcp_message->payload[i++] =
1086 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
[all...]
H A DphHciNfc_ISO15693.c596 && ((ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i])
597 || (ISO_15693_SINGLE_TAG_FOUND == message->payload[i]))
605 if (ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i])
692 hcp_message->payload[i++] =
695 hcp_message->payload[i++] =
698 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
/external/openssl/ssl/
H A Dd1_both.c1452 unsigned int payload; local
1455 /* Read type and payload length first */
1457 n2s(p, payload);
1471 * message type, plus 2 bytes payload length, plus
1472 * payload, plus padding
1474 buffer = OPENSSL_malloc(1 + 2 + payload + padding);
1477 /* Enter response type, length and copy payload */
1479 s2n(payload, bp);
1480 memcpy(bp, pl, payload);
1481 bp += payload;
1522 unsigned int payload = 18; /* Sequence number + random bytes */ local
[all...]
/external/webkit/Source/JavaScriptCore/jit/
H A DJSInterfaceJIT.h192 inline Jump emitLoadJSCell(unsigned virtualRegisterIndex, RegisterID payload);
225 inline JSInterfaceJIT::Jump JSInterfaceJIT::emitLoadJSCell(unsigned virtualRegisterIndex, RegisterID payload) argument
227 loadPtr(payloadFor(virtualRegisterIndex), payload); local
253 return Address(base, (static_cast<unsigned>(virtualRegisterIndex) * sizeof(Register)) + OBJECT_OFFSETOF(JSValue, u.asBits.payload));
335 return Address(base, (static_cast<unsigned>(virtualRegisterIndex) * sizeof(Register)) + OBJECT_OFFSETOF(EncodedValueDescriptor, asBits.payload));

Completed in 1098 milliseconds

1234567891011>>