/external/valgrind/main/coregrind/ |
H A D | pub_core_mallocfree.h | 63 // This is both the minimum payload size of a malloc'd block, and its 113 extern SizeT VG_(arena_malloc_usable_size) ( ArenaId aid, void* payload );
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | rsa.c | 46 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) { 51 return hdr.payload + hdr.length; 95 pos = hdr.payload; 202 pos = hdr.payload;
|
/external/wpa_supplicant_8/src/tls/ |
H A D | rsa.c | 46 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) { 51 return hdr.payload + hdr.length; 95 pos = hdr.payload; 202 pos = hdr.payload;
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | rsa.c | 46 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) { 51 return hdr.payload + hdr.length; 95 pos = hdr.payload; 202 pos = hdr.payload;
|
/external/chromium_org/chrome/browser/chromeos/attestation/ |
H A D | attestation_policy_observer_unittest.cc | 122 // Setup expected key payload queries. 124 std::string payload = CreatePayload(); local 127 FakeDBusData(key_uploaded ? payload : "")))); 133 // status in the key payload matches the upload operation. 140 TpmAttestationSetKeyPayload(_, _, _, payload, _))
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | device_local_account_policy_service_unittest.cc | 147 device_local_account_policy_.payload().mutable_disablespdy()->set_value( 184 device_policy_.payload().mutable_device_local_accounts()->add_account(); 351 device_policy_.payload().mutable_device_local_accounts()->clear_account(); 526 em::StringList* forcelist = device_local_account_policy_.payload() 650 device_policy_.payload().mutable_device_local_accounts()->clear_account(); 693 device_policy_.payload().mutable_device_local_accounts()->clear_account(); 760 device_policy_.payload().mutable_device_local_accounts()->clear_account(); 847 device_policy_.payload().mutable_device_local_accounts()->clear_account(); 871 device_local_account_policy_.payload().mutable_disablespdy()->set_value( 894 device_local_account_policy_.payload() [all...] |
H A D | device_local_account_browsertest.cc | 535 em::ChromeDeviceSettingsProto& proto(device_policy()->payload()); 544 device_local_account_policy_.payload().mutable_userdisplayname()->set_value( 557 device_local_account_policy_.payload().SerializeAsString()); 569 device_local_account_policy_.payload().mutable_sessionlocales(); 580 em::ChromeDeviceSettingsProto& proto(device_policy()->payload()); 592 em::ChromeDeviceSettingsProto& proto(device_policy()->payload()); 804 device_local_account_policy_.payload().mutable_userdisplayname()->set_value( 868 em::ChromeDeviceSettingsProto& proto(device_policy()->payload()); 892 device_local_account_policy_.payload().mutable_restoreonstartup()->set_value( 895 device_local_account_policy_.payload() [all...] |
/external/chromium_org/content/browser/tracing/ |
H A D | etw_system_event_consumer_win.cc | 170 // Base64 encode the payload bytes. 173 std::string payload; local 174 base::Base64Encode(buffer, &payload); 175 value->Set("payload", new base::StringValue(payload));
|
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/ |
H A D | audio_decoder_impl.h | 128 virtual int IncomingPacket(const uint8_t* payload, 164 virtual int IncomingPacket(const uint8_t* payload, 200 // Splits the stereo-interleaved payload in |encoded| into separate payloads 265 virtual int IncomingPacket(const uint8_t* payload, argument
|
H A D | neteq_impl.cc | 87 current_rtp_payload_type_(0xFF), // Invalid RTP payload type. 88 current_cng_rtp_payload_type_(0xFF), // Invalid RTP payload type. 118 const uint8_t* payload, 127 int error = InsertPacketInternal(rtp_header, payload, length_bytes, 397 const uint8_t* payload, 401 if (!payload) { 402 LOG_F(LS_ERROR) << "payload == NULL"; 410 LOG_F(LS_ERROR) << "Sync-packet with an unacceptable payload type " 441 packet->payload = new uint8_t[packet->payload_length]; 443 if (!packet->payload) { 117 InsertPacket(const WebRtcRTPHeader& rtp_header, const uint8_t* payload, int length_bytes, uint32_t receive_timestamp) argument 396 InsertPacketInternal(const WebRtcRTPHeader& rtp_header, const uint8_t* payload, int length_bytes, uint32_t receive_timestamp, bool is_sync_packet) argument [all...] |
/external/dhcpcd/ |
H A D | bpf.c | 168 const unsigned char *payload; local 196 payload = iface->buffer + packet.bh_hdrlen + ETHER_HDR_LEN; 200 memcpy(data, payload, bytes);
|
/external/libnfc-nxp/src/ |
H A D | phHciNfc_AdminMgmt.c | 743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */ 744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id; 745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id; 746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id; 773 hcp_message->payload[i++] = pipe_id ; 892 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET]; 997 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET]; 1005 hcp_message->payload[index++]; 1008 hcp_message->payload[index++]; 1011 hcp_message->payload[inde [all...] |
/external/tcpdump/ |
H A D | print-atm.c | 359 u_int8_t cell_type, func_type, payload, clp; local 373 payload = (cell_header>>1)&0x7; 376 printf("%s, vpi %u, vci %u, payload [ %s ], clp %u, length %u", 379 tok2str(atm_pty_values, "Unknown", payload),
|
/external/android-clat/ |
H A D | clatd_test.cpp | 202 void *payload; local 215 payload = ip + 1; 234 payload = frag + 1; 240 // Since there are no extension headers except Fragment, this must be the payload. 242 payload = ip6 + 1; 257 // If we understand the payload, verify the checksum. 264 checksum = ip_checksum_finish(ip_checksum_add(pseudo_checksum, payload, payload_length)); 267 checksum = ip_checksum(payload, payload_length); 277 struct udphdr *udp = (struct udphdr *) payload; 346 // Copy the payload 525 const void *payload; local 815 uint8_t payload[] = { PAYLOAD }; local [all...] |
/external/chromium_org/components/nacl/loader/nonsfi/ |
H A D | nonsfi_sandbox_unittest.cc | 145 std::string payload("foo"); 146 iov.iov_base = &payload[0]; 147 iov.iov_len = payload.size(); 151 BPF_ASSERT_EQ(static_cast<int>(payload.size()), 153 BPF_ASSERT_EQ(static_cast<int>(payload.size()),
|
/external/chromium_org/sync/internal_api/ |
H A D | http_bridge_unittest.cc | 217 std::string payload = "this should be echoed back"; local 221 payload.length() + 1, payload.c_str()); 229 EXPECT_EQ(payload.length() + 1, 231 EXPECT_EQ(payload, std::string(http_bridge->GetResponseContent()));
|
/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
H A D | MainThreadWebSocketChannel.cpp | 576 // All control frames must have a payload of 125 bytes or less, which means the frame must not contain 577 // the "extended payload length" field. 579 failAsError("Received control frame having too long payload: " + String::number(frame.payloadLength) + " bytes"); 590 InspectorInstrumentation::didReceiveWebSocketFrame(m_document, m_identifier, frame.opCode, frame.masked, frame.payload, frame.payloadLength); 599 m_continuousFrameData.append(frame.payload, frame.payloadLength); 630 message = String::fromUTF8(frame.payload, frame.payloadLength); 642 m_continuousFrameData.append(frame.payload, frame.payloadLength); 650 memcpy(binaryData->data(), frame.payload, frame.payloadLength); 657 m_continuousFrameData.append(frame.payload, frame.payloadLength); 670 unsigned char highByte = static_cast<unsigned char>(frame.payload[ [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 225 const u8 *payload, 247 pos = payload; 248 end = payload + payload_len; 358 const u8 *payload, 385 pos = payload; 386 end = payload + payload_len; 502 const u8 *payload, 522 pos = payload; 523 end = payload + payload_len; 628 const u8 *payload, 222 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 499 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 625 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 422 const u8 *payload, size_t payloadlen) 434 pos = payload; 435 end = payload + payloadlen; 438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload"); 518 const u8 *payload, size_t payloadlen) 530 pos = payload; 531 end = payload + payloadlen; 591 const u8 *payload, size_t payloadlen) 613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len, 638 if (os_memcmp_const(auth_p, payload 419 eap_eke_process_identity(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 515 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 588 eap_eke_process_confirm(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 662 eap_eke_process_failure(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 225 const u8 *payload, 247 pos = payload; 248 end = payload + payload_len; 358 const u8 *payload, 385 pos = payload; 386 end = payload + payload_len; 502 const u8 *payload, 522 pos = payload; 523 end = payload + payload_len; 628 const u8 *payload, 222 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 499 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 625 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 422 const u8 *payload, size_t payloadlen) 434 pos = payload; 435 end = payload + payloadlen; 438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload"); 518 const u8 *payload, size_t payloadlen) 530 pos = payload; 531 end = payload + payloadlen; 591 const u8 *payload, size_t payloadlen) 613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len, 638 if (os_memcmp_const(auth_p, payload 419 eap_eke_process_identity(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 515 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 588 eap_eke_process_confirm(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 662 eap_eke_process_failure(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 225 const u8 *payload, 247 pos = payload; 248 end = payload + payload_len; 358 const u8 *payload, 385 pos = payload; 386 end = payload + payload_len; 502 const u8 *payload, 522 pos = payload; 523 end = payload + payload_len; 628 const u8 *payload, 222 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 499 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 625 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 422 const u8 *payload, size_t payloadlen) 434 pos = payload; 435 end = payload + payloadlen; 438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload"); 518 const u8 *payload, size_t payloadlen) 530 pos = payload; 531 end = payload + payloadlen; 591 const u8 *payload, size_t payloadlen) 613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len, 638 if (os_memcmp_const(auth_p, payload 419 eap_eke_process_identity(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 515 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 588 eap_eke_process_confirm(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument 662 eap_eke_process_failure(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument [all...] |
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/ |
H A D | ResourceTreeModel.js | 486 * @param {!PageAgent.Frame=} payload 488 WebInspector.ResourceTreeFrame = function(model, parentFrame, frameId, payload) 495 if (payload) { 496 this._loaderId = payload.loaderId; 497 this._name = payload.name; 498 this._url = payload.url; 499 this._securityOrigin = payload.securityOrigin; 500 this._mimeType = payload.mimeType;
|
/external/openssl/ssl/ |
H A D | d1_both.c | 1484 unsigned int payload; local 1492 /* Read type and payload length first */ 1499 n2s(p, payload); 1500 if (1 + 2 + payload + 16 > s->s3->rrec.length) 1509 payload + padding; 1516 * message type, plus 2 bytes payload length, plus 1517 * payload, plus padding 1522 /* Enter response type, length and copy payload */ 1524 s2n(payload, bp); 1525 memcpy(bp, pl, payload); 1567 unsigned int payload = 18; /* Sequence number + random bytes */ local [all...] |