Searched refs:payload (Results 276 - 300 of 353) sorted by relevance

<<1112131415

/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_pwd.c186 const u8 *payload, size_t payload_len)
202 id = (struct eap_pwd_id *) payload;
268 const u8 *payload, size_t payload_len)
330 ptr = (u8 *) payload;
460 const u8 *payload, size_t payload_len)
561 ptr = (u8 *) payload;
183 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
265 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
457 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
/external/ipsec-tools/src/racoon/
H A Disakmp_agg.c155 /* make ID payload into isakmp status */
159 /* create SA payload for my proposal */
235 /* set SA payload to propose */
238 /* create isakmp KE payload */
241 /* create isakmp NONCE payload */
244 /* create isakmp ID payload */
253 /* create isakmp CR payload */
263 * set VID payload for NAT-T if NAT-T
360 vchar_t *payload; member in struct:natd_payload
374 /* validate the type of next payload */
[all...]
H A Disakmp.h108 #define ISAKMP_NPTYPE_FRAG 132 /* IKE fragmentation payload */
196 The value of the next payload field MUST only contain the value "2"
198 then this field will be 2. If the current Proposal payload is the
213 The value of the next payload field MUST only contain the value "3"
215 then this field will be 3. If the current Transform payload is the
386 vchar_t *payload; member in struct:payload_list
405 /* IKE fragmentation payload */
/external/libnfc-nxp/src/
H A DphHciNfc_Emulation.c1305 switch (hcp_message->payload[i])
1315 hcp_message->payload[i++];
1317 &(hcp_message->payload[i]),
1332 hcp_message->payload[i++];
1334 &(hcp_message->payload[i]),
H A DphHciNfc_RFReaderB.c645 && ((RDR_B_MULTIPLE_TAGS_FOUND == message->payload[i] )
646 || (RDR_B_SINGLE_TAG_FOUND == message->payload[i]))
651 if (RDR_B_MULTIPLE_TAGS_FOUND == message->payload[i])
H A DphHciNfc_WI.c522 phHciNfc_Append_HCPFrame((uint8_t *)hcp_message->payload,
709 memcpy((void *)p_wi_info->aid, message->payload,
731 (void) memcpy((void *)p_wi_info->aid,message->payload,
H A DphHciNfc_Generic.h524 uint8_t payload[PHHCINFC_MAX_PACKET_DATA - 1]; member in struct:phHciNfc_HCP_Message
537 uint8_t payload[PHHCINFC_MAX_PACKET_DATA]; member in union:phHciNfc_HCP_Packet::__anon7973
1140 * payload to which the data is to be
/external/chromium/third_party/libjingle/source/talk/p2p/base/
H A Drelayport.cc295 const talk_base::SocketAddress& addr, bool payload) {
302 if (entries_[i]->address().IsAny() && payload) {
314 if (!entry && payload) {
294 SendTo(const void* data, size_t size, const talk_base::SocketAddress& addr, bool payload) argument
H A Dstunport.cc186 const talk_base::SocketAddress& addr, bool payload) {
185 SendTo(const void* data, size_t size, const talk_base::SocketAddress& addr, bool payload) argument
H A Dtcpport.cc111 const talk_base::SocketAddress& addr, bool payload) {
110 SendTo(const void* data, size_t size, const talk_base::SocketAddress& addr, bool payload) argument
H A Dport.h158 bool payload) = 0;
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pwd.c570 const u8 *payload, size_t payload_len)
579 id = (struct eap_pwd_id *) payload;
621 const u8 *payload, size_t payload_len)
650 ptr = (u8 *) payload;
736 const u8 *payload, size_t payload_len)
831 ptr = (u8 *) payload;
568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pwd.c570 const u8 *payload, size_t payload_len)
579 id = (struct eap_pwd_id *) payload;
621 const u8 *payload, size_t payload_len)
650 ptr = (u8 *) payload;
736 const u8 *payload, size_t payload_len)
831 ptr = (u8 *) payload;
568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_pwd.c570 const u8 *payload, size_t payload_len)
579 id = (struct eap_pwd_id *) payload;
621 const u8 *payload, size_t payload_len)
650 ptr = (u8 *) payload;
736 const u8 *payload, size_t payload_len)
831 ptr = (u8 *) payload;
568 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
620 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
735 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
/external/webkit/Source/JavaScriptCore/jit/
H A DJITPropertyAccess32_64.cpp318 load32(BaseIndex(regT3, regT2, TimesEight, OBJECT_OFFSETOF(ArrayStorage, m_vector[0]) + OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT0); // payload
373 store32(regT0, BaseIndex(regT3, regT2, TimesEight, OBJECT_OFFSETOF(ArrayStorage, m_vector[0]) + OBJECT_OFFSETOF(JSValue, u.asBits.payload))); // payload
438 DataLabel32 displacementLabel1 = loadPtrWithAddressOffsetPatch(Address(regT2, patchGetByIdDefaultOffset), regT0); // payload
512 DataLabel32 displacementLabel1 = storePtrWithAddressOffsetPatch(regT2, Address(regT0, patchGetByIdDefaultOffset)); // payload
568 load32(reinterpret_cast<char*>(&base->m_propertyStorage[cachedOffset]) + OBJECT_OFFSETOF(JSValue, u.asBits.payload), resultPayload);
627 load32(Address(stackPointerRegister, OBJECT_OFFSETOF(JITStackFrame, args[2]) + OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT3);
630 load32(Address(stackPointerRegister, OBJECT_OFFSETOF(JITStackFrame, args[2]) + sizeof(void*) + OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT3);
671 repatchBuffer.repatch(stubInfo->hotPathBegin.dataLabel32AtOffset(patchOffsetGetByIdPropertyMapOffset1), offset + OBJECT_OFFSETOF(JSValue, u.asBits.payload)); // payloa
[all...]
H A DJITOpcodes32_64.cpp53 // regT0 holds payload, regT1 holds tag
602 load32(Address(regT2, Structure::prototypeOffset() + OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT2);
845 load32(BaseIndex(regT2, regT3, TimesEight, OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT0); // payload
1360 loadPtr(Address(regT2, Structure::prototypeOffset() + OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT2);
1439 load32(Address(regT3, OBJECT_OFFSETOF(JSGlobalData, exception) + OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT0);
1441 store32(TrustedImm32(JSValue().payload()), Address(regT3, OBJECT_OFFSETOF(JSGlobalData, exception) + OBJECT_OFFSETOF(JSValue, u.asBits.payload)));
1712 loadPtr(BaseIndex(regT1, regT2, TimesEight, OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT0);
1721 loadPtr(BaseIndex(regT1, regT2, TimesEight, OBJECT_OFFSETOF(JSValue, u.asBits.payload)), regT
[all...]
/external/antlr/antlr-3.4/runtime/CSharp3/Sources/Antlr3.Runtime/Tree/
H A DBaseTreeAdaptor.cs67 * if no token payload but you might have to set token type for diff
362 * token DECL, but you need to create it as a payload or whatever for
367 * If you care what the token payload objects' type is, you should
376 * token DECL, but you need to create it as a payload or whatever for
387 * If you care what the token payload objects' type is, you should
393 public abstract object Create( IToken payload );
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/tree/
H A Dwizard.rb292 def initialize( payload )
293 super( payload )
321 def create_with_payload( payload )
322 return Pattern.new( payload )
/external/chromium/chrome/browser/chromeos/login/
H A Dcookie_fetcher_unittest.cc179 EXPECT_EQ(expected, handler.payload());
/external/chromium/chrome/browser/sync/engine/net/
H A Dserver_connection_manager.h91 // The size of a download request's payload.
192 const std::string& payload,
/external/chromium/net/spdy/
H A Dspdy_framer.h79 // payload will be provided via subsequent calls to
117 SPDY_CONTROL_PAYLOAD_TOO_LARGE, // Control frame payload was too large.
266 // On success, returns a new SpdyFrame with the payload compressed.
273 // On success, returns a new SpdyFrame with the payload decompressed.
416 // Expands the control frame buffer to accomodate a particular payload size.
419 // Given a frame, breakdown the variable payload length, the static header
420 // header length, and variable payload pointer.
422 int* header_length, const char** payload) const;
446 // payload.
451 // are part of the frame's payload, an
[all...]
/external/blktrace/doc/
H A Dblktrace.tex428 commands. blktrace sends the command data block as a payload
687 \item[C -- complete] If a payload is present, this is presented between
690 If no payload is present, the sector and number of blocks are presented
698 \item[B -- bounced] If a payload is present, the number of payload bytes
699 is output, followed by the payload in hexadecimal between parenthesis.
701 If no payload is present, the sector and number of blocks are presented
797 Adds a trace with some payload data -- in this case, an unsigned
799 describes the nature of the payload, and is one of
/external/chromium/chrome/browser/resources/
H A Dmobile_setup.js199 payload: {
/external/chromium/base/
H A Dpickle_unittest.cc198 iter = pickle.payload();
213 // construct a message that will be exactly the size of one payload unit,
252 // this should not overwrite the 'int' payload
/external/chromium/chrome/common/extensions/docs/server/
H A Dchromeextensionsdocs.py166 payload=postdata,

Completed in 2419 milliseconds

<<1112131415