/external/dexmaker/src/dx/java/com/android/dx/io/instructions/ |
H A D | InstructionCodec.java | 473 * payload target instructions. 758 PackedSwitchPayloadDecodedInstruction payload = 760 int[] targets = payload.getTargets(); 763 out.write(payload.getOpcodeUnit()); 765 out.writeInt(payload.getFirstKey()); 794 SparseSwitchPayloadDecodedInstruction payload = 796 int[] keys = payload.getKeys(); 797 int[] targets = payload.getTargets(); 800 out.write(payload.getOpcodeUnit()); 864 FillArrayDataPayloadDecodedInstruction payload [all...] |
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/tree/ |
H A D | debug.rb | 21 def create_with_payload( payload ) 23 @debug_listener.create_node( node, payload )
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
H A D | codec.h | 53 bool Matches(int payload, const std::string& nm) const; 103 bool Matches(int payload, const std::string& nm) const;
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
H A D | extensions.py | 224 original_payload_size = len(frame.payload) 233 frame.payload = self._deflater.filter(frame.payload) 236 filtered_payload_size = len(frame.payload) 249 received_payload_size = len(frame.payload) 257 frame.payload = self._inflater.filter(frame.payload) 260 filtered_payload_size = len(frame.payload)
|
/external/dropbear/ |
H A D | cli-tcpfwd.c | 174 buf_eatstring(ses.payload); 176 origport = buf_getint(ses.payload);
|
H A D | svr-authpam.c | 186 changepw = buf_getbool(ses.payload); 193 password = buf_getstring(ses.payload, &passwordlen);
|
H A D | cli-chansession.c | 64 type = buf_getstring(ses.payload, NULL); 65 wantreply = buf_getbool(ses.payload); 68 cli_ses.retval = buf_getint(ses.payload);
|
H A D | common-channel.c | 168 * data packet (ses.payload must be positioned appropriately). 175 chan = buf_getint(ses.payload); 684 datalen = buf_getint(ses.payload); 698 * is payload data */ 705 buf_getptr(ses.payload, buflen), buflen); 707 buf_incrpos(ses.payload, buflen); 728 incr = buf_getint(ses.payload); 768 type = buf_getstring(ses.payload, &typelen); 770 remotechan = buf_getint(ses.payload); 771 transwindow = buf_getint(ses.payload); [all...] |
H A D | common-session.c | 77 ses.payload = NULL; 133 dropbear_assert(ses.payload == NULL); 191 if (ses.payload != NULL) {
|
H A D | svr-auth.c | 111 username = buf_getstring(ses.payload, &userlen); 112 servicename = buf_getstring(ses.payload, &servicelen); 113 methodname = buf_getstring(ses.payload, &methodlen);
|
/external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime.Test/SlimParsing/Tree/ |
H A D | ITreeAdaptor`1.cs | 41 * then the token just becomes the payload. This is the most 49 T Create(IToken payload); argument
|
/external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/tree/ |
H A D | TreeAdaptor.java | 47 * then the token just becomes the payload. This is the most 52 public Object create(Token payload); argument
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
H A D | ANTLRCommonTreeAdaptor.h | 42 - (ANTLRCommonTree *) create:(id<ANTLRToken>) payload;
|
/external/chromium/chrome/browser/sync/notifier/ |
H A D | chrome_invalidation_client.h | 98 const syncable::ModelTypeSet& types, const std::string& payload);
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
H A D | stunport.h | 92 const talk_base::SocketAddress& addr, bool payload);
|
H A D | udpport.cc | 83 const talk_base::SocketAddress& addr, bool payload) { 82 SendTo(const void* data, size_t size, const talk_base::SocketAddress& addr, bool payload) argument
|
/external/valgrind/main/helgrind/ |
H A D | hg_errors.h | 85 /*OUT*/Addr* payload,
|
/external/webkit/Source/WebKit/qt/WebCoreSupport/ |
H A D | InspectorServerQt.cpp | 311 int InspectorServerRequestHandlerQt::webSocketSend(QByteArray payload) argument 315 int nBytes = m_tcpConnection->write(payload); 360 QByteArray payload = m_data.mid(1, length); 365 inspectorController->dispatchMessageFromFrontend(QString::fromUtf8(payload)); 369 // Remove this WebSocket message from m_data (payload, start-of-frame byte, end-of-frame byte).
|
/external/dhcpcd/ |
H A D | bpf.c | 168 const unsigned char *payload; local 196 payload = iface->buffer + packet.bh_hdrlen + ETHER_HDR_LEN; 200 memcpy(data, payload, bytes);
|
/external/kernel-headers/original/linux/ |
H A D | key.h | 39 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */ 40 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */ 132 unsigned short datalen; /* payload data length 133 * - may not match RCU dereferenced payload 134 * - payload should contain own length 173 } payload; member in struct:key 187 /* default payload length for quota precalculation (optional) 195 * user's quota will hold the payload 299 const void *payload, 304 const void *payload, [all...] |
/external/libnfc-nxp/src/ |
H A D | phHciNfc_AdminMgmt.c | 743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */ 744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id; 745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id; 746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id; 773 hcp_message->payload[i++] = pipe_id ; 892 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET]; 997 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET]; 1005 hcp_message->payload[index++]; 1008 hcp_message->payload[index++]; 1011 hcp_message->payload[inde [all...] |
H A D | phHciNfc_RFReaderA.c | 836 HCI_DEBUG ("HCI : Multiple tag found : %02X\n", message->payload[i]); 839 && ((RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i] ) 840 || (RDR_A_SINGLE_TAG_FOUND == message->payload[i])) 845 if (RDR_A_MULTIPLE_TAGS_FOUND == message->payload[i]) 1041 hcp_message->payload[i++] = nxp_nfc_mifareraw_timeout; 1043 hcp_message->payload[i++] = RDR_A_MIFARE_STATUS; 1050 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload, 1081 hcp_message->payload[i++] = 1084 hcp_message->payload[i++] = 1086 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload, [all...] |
H A D | phHciNfc_ISO15693.c | 596 && ((ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i]) 597 || (ISO_15693_SINGLE_TAG_FOUND == message->payload[i])) 605 if (ISO_15693_MULTIPLE_TAGS_FOUND == message->payload[i]) 692 hcp_message->payload[i++] = 695 hcp_message->payload[i++] = 698 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
|
/external/openssl/ssl/ |
H A D | d1_both.c | 1452 unsigned int payload; local 1455 /* Read type and payload length first */ 1457 n2s(p, payload); 1471 * message type, plus 2 bytes payload length, plus 1472 * payload, plus padding 1474 buffer = OPENSSL_malloc(1 + 2 + payload + padding); 1477 /* Enter response type, length and copy payload */ 1479 s2n(payload, bp); 1480 memcpy(bp, pl, payload); 1481 bp += payload; 1522 unsigned int payload = 18; /* Sequence number + random bytes */ local [all...] |
/external/webkit/Source/JavaScriptCore/jit/ |
H A D | JSInterfaceJIT.h | 192 inline Jump emitLoadJSCell(unsigned virtualRegisterIndex, RegisterID payload); 225 inline JSInterfaceJIT::Jump JSInterfaceJIT::emitLoadJSCell(unsigned virtualRegisterIndex, RegisterID payload) argument 227 loadPtr(payloadFor(virtualRegisterIndex), payload); local 253 return Address(base, (static_cast<unsigned>(virtualRegisterIndex) * sizeof(Register)) + OBJECT_OFFSETOF(JSValue, u.asBits.payload)); 335 return Address(base, (static_cast<unsigned>(virtualRegisterIndex) * sizeof(Register)) + OBJECT_OFFSETOF(EncodedValueDescriptor, asBits.payload));
|