/external/chromium_org/content/public/browser/ |
H A D | resource_dispatcher_host_delegate.cc | 61 std::string* payload) { 57 ShouldInterceptResourceAsStream( net::URLRequest* request, const std::string& mime_type, GURL* origin, std::string* payload) argument
|
/external/chromium_org/media/cast/net/rtcp/ |
H A D | rtcp_builder.h | 58 void AddRtcpHeader(RtcpPacketFields payload, int format_or_count);
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/ |
H A D | SourceMap.js | 67 * @param {!SourceMapV3} payload 69 WebInspector.SourceMap = function(sourceMappingURL, payload) 83 this._parseMappingPayload(payload); 128 var payload = /** @type {!SourceMapV3} */ (JSON.parse(content)); 130 callback(new WebInspector.SourceMap(baseURL, payload));
|
/external/chromium_org/third_party/libxslt/libxslt/ |
H A D | pattern.h | 48 xsltNormalizeCompSteps (void *payload,
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/ |
H A D | dtmf_buffer.h | 67 // Static method to parse 4 bytes from |payload| as a DTMF event (RFC 4733) 71 const uint8_t* payload,
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/tools/ |
H A D | packet.h | 31 // Creates a packet, with the packet payload (including header bytes) in 44 // RTP headers, and no payload (a.k.a RTP dummy files or RTP light). The 46 // including the now discarded payload, whereas |allocated_bytes| is the 47 // length of the remaining payload (typically only the RTP header). 67 // Parses the first bytes of the RTP payload, interpreting them as RED headers 77 const uint8_t* payload() const { return payload_; } function in class:webrtc::test::Packet 109 size_t payload_length_bytes_; // Length of the payload, after RTP header.
|
/external/chromium_org/third_party/webrtc/modules/rtp_rtcp/interface/ |
H A D | rtp_receiver.h | 32 // Is TelephoneEvent configured with payload type payload_type 58 // Registers a receive payload in the payload registry and notifies the media 67 // De-registers |payload_type| from the payload registry. 71 // state. This for instance means that any changes in SSRC and payload type is 74 const uint8_t* payload,
|
/external/chromium_org/third_party/webrtc/modules/rtp_rtcp/source/ |
H A D | producer_fec.h | 29 void AssignPayload(const uint8_t* payload, int length);
|
/external/chromium_org/v8/tools/ |
H A D | SourceMap.js | 73 * @param {SourceMapV3} payload 75 WebInspector.SourceMap = function(sourceMappingURL, payload) 89 this._parseMappingPayload(payload); 118 var payload = /** @type {SourceMapV3} */ (JSON.parse(content)); 120 callback(new WebInspector.SourceMap(baseURL, payload));
|
/external/llvm/include/llvm/ADT/ |
H A D | APFloat.h | 245 const APInt *payload = nullptr) { 246 return makeNaN(Sem, false, Negative, payload); 251 const APInt *payload = nullptr) { 252 return makeNaN(Sem, true, Negative, payload);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | asn1.h | 47 const u8 *payload; member in struct:asn1_hdr
|
H A D | tlsv1_record.h | 65 size_t buf_size, const u8 *payload, size_t payload_len,
|
H A D | tlsv1_server_write.c | 639 u8 payload[4]; local 646 pos = payload; 655 *msgpos, end - *msgpos, payload, pos - payload, 663 tls_verify_hash_add(&conn->verify, payload, pos - payload); 675 u8 payload[1]; local 679 payload[0] = TLS_CHANGE_CIPHER_SPEC; 682 *msgpos, end - *msgpos, payload, sizeof(payload), [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | asn1.h | 47 const u8 *payload; member in struct:asn1_hdr
|
H A D | tlsv1_record.h | 65 size_t buf_size, const u8 *payload, size_t payload_len,
|
H A D | tlsv1_server_write.c | 639 u8 payload[4]; local 646 pos = payload; 655 *msgpos, end - *msgpos, payload, pos - payload, 663 tls_verify_hash_add(&conn->verify, payload, pos - payload); 675 u8 payload[1]; local 679 payload[0] = TLS_CHANGE_CIPHER_SPEC; 682 *msgpos, end - *msgpos, payload, sizeof(payload), [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | asn1.h | 47 const u8 *payload; member in struct:asn1_hdr
|
H A D | tlsv1_record.h | 65 size_t buf_size, const u8 *payload, size_t payload_len,
|
H A D | tlsv1_server_write.c | 639 u8 payload[4]; local 646 pos = payload; 655 *msgpos, end - *msgpos, payload, pos - payload, 663 tls_verify_hash_add(&conn->verify, payload, pos - payload); 675 u8 payload[1]; local 679 payload[0] = TLS_CHANGE_CIPHER_SPEC; 682 *msgpos, end - *msgpos, payload, sizeof(payload), [all...] |
/external/chromium_org/sync/android/java/src/org/chromium/sync/notifier/ |
H A D | InvalidationService.java | 109 byte[] payload = invalidation.getPayload(); 110 String payloadStr = (payload == null) ? null : new String(payload); 425 * @param payload the payload of the change, if known. 428 @Nullable String payload) { 431 if (objectId == null && version == null && payload == null) { 442 bundle.putString("payload", (payload == null) ? "" : payload); 427 requestSync(@ullable ObjectId objectId, @Nullable Long version, @Nullable String payload) argument [all...] |
/external/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunication.cpp | 158 GDBRemoteCommunication::CalculcateChecksum (const char *payload, size_t payload_length) argument 166 checksum += payload[i]; 198 GDBRemoteCommunication::SendPacket (const char *payload, size_t payload_length) argument 201 return SendPacketNoLock (payload, payload_length); 205 GDBRemoteCommunication::SendPacketNoLock (const char *payload, size_t payload_length) argument 212 packet.Write (payload, payload_length); 214 packet.PutHex8(CalculcateChecksum (payload, payload_length));
|
/external/libnl/lib/ |
H A D | msg.c | 22 * Netlink headers and an associated payload. If the payload is too big 46 * The netlink message header and payload must be aligned properly: 57 * <--- nlmsg_total_size(payload) ---> 58 * <-- nlmsg_msg_size(payload) -> 66 * The payload may consist of arbitary data but may have strict 102 * // a maximum payload size which defaults to the page size of 121 * // will create a message with a maximum payload size which equals the 182 * @arg payload length of message payload 184 nlmsg_msg_size(int payload) argument 193 nlmsg_total_size(int payload) argument 202 nlmsg_padlen(int payload) argument 611 nlmsg_put(struct nl_msg *n, uint32_t pid, uint32_t seq, int type, int payload, int flags) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gpsk.c | 239 const u8 *payload, size_t payloadlen) 252 pos = payload; 253 end = payload + payloadlen; 430 data->specifier, payload, pos - payload, mic) 457 const u8 *payload, size_t payloadlen) 469 pos = payload; 470 end = payload + payloadlen; 499 data->specifier, payload, pos - payload, mi 237 eap_gpsk_process_gpsk_2(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *payload, size_t payloadlen) argument 455 eap_gpsk_process_gpsk_4(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *payload, size_t payloadlen) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gpsk.c | 239 const u8 *payload, size_t payloadlen) 252 pos = payload; 253 end = payload + payloadlen; 430 data->specifier, payload, pos - payload, mic) 457 const u8 *payload, size_t payloadlen) 469 pos = payload; 470 end = payload + payloadlen; 499 data->specifier, payload, pos - payload, mi 237 eap_gpsk_process_gpsk_2(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *payload, size_t payloadlen) argument 455 eap_gpsk_process_gpsk_4(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *payload, size_t payloadlen) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gpsk.c | 239 const u8 *payload, size_t payloadlen) 252 pos = payload; 253 end = payload + payloadlen; 430 data->specifier, payload, pos - payload, mic) 457 const u8 *payload, size_t payloadlen) 469 pos = payload; 470 end = payload + payloadlen; 499 data->specifier, payload, pos - payload, mi 237 eap_gpsk_process_gpsk_2(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *payload, size_t payloadlen) argument 455 eap_gpsk_process_gpsk_4(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *payload, size_t payloadlen) argument [all...] |