Searched refs:payload (Results 326 - 350 of 665) sorted by relevance

<<11121314151617181920>>

/external/valgrind/main/coregrind/
H A Dpub_core_mallocfree.h63 // This is both the minimum payload size of a malloc'd block, and its
113 extern SizeT VG_(arena_malloc_usable_size) ( ArenaId aid, void* payload );
/external/wpa_supplicant_8/hostapd/src/tls/
H A Drsa.c46 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) {
51 return hdr.payload + hdr.length;
95 pos = hdr.payload;
202 pos = hdr.payload;
/external/wpa_supplicant_8/src/tls/
H A Drsa.c46 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) {
51 return hdr.payload + hdr.length;
95 pos = hdr.payload;
202 pos = hdr.payload;
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Drsa.c46 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) {
51 return hdr.payload + hdr.length;
95 pos = hdr.payload;
202 pos = hdr.payload;
/external/chromium_org/chrome/browser/chromeos/attestation/
H A Dattestation_policy_observer_unittest.cc122 // Setup expected key payload queries.
124 std::string payload = CreatePayload(); local
127 FakeDBusData(key_uploaded ? payload : ""))));
133 // status in the key payload matches the upload operation.
140 TpmAttestationSetKeyPayload(_, _, _, payload, _))
/external/chromium_org/chrome/browser/chromeos/policy/
H A Ddevice_local_account_policy_service_unittest.cc147 device_local_account_policy_.payload().mutable_disablespdy()->set_value(
184 device_policy_.payload().mutable_device_local_accounts()->add_account();
351 device_policy_.payload().mutable_device_local_accounts()->clear_account();
526 em::StringList* forcelist = device_local_account_policy_.payload()
650 device_policy_.payload().mutable_device_local_accounts()->clear_account();
693 device_policy_.payload().mutable_device_local_accounts()->clear_account();
760 device_policy_.payload().mutable_device_local_accounts()->clear_account();
847 device_policy_.payload().mutable_device_local_accounts()->clear_account();
871 device_local_account_policy_.payload().mutable_disablespdy()->set_value(
894 device_local_account_policy_.payload()
[all...]
H A Ddevice_local_account_browsertest.cc535 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
544 device_local_account_policy_.payload().mutable_userdisplayname()->set_value(
557 device_local_account_policy_.payload().SerializeAsString());
569 device_local_account_policy_.payload().mutable_sessionlocales();
580 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
592 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
804 device_local_account_policy_.payload().mutable_userdisplayname()->set_value(
868 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
892 device_local_account_policy_.payload().mutable_restoreonstartup()->set_value(
895 device_local_account_policy_.payload()
[all...]
/external/chromium_org/content/browser/tracing/
H A Detw_system_event_consumer_win.cc170 // Base64 encode the payload bytes.
173 std::string payload; local
174 base::Base64Encode(buffer, &payload);
175 value->Set("payload", new base::StringValue(payload));
/external/chromium_org/third_party/webrtc/modules/audio_coding/neteq/
H A Daudio_decoder_impl.h128 virtual int IncomingPacket(const uint8_t* payload,
164 virtual int IncomingPacket(const uint8_t* payload,
200 // Splits the stereo-interleaved payload in |encoded| into separate payloads
265 virtual int IncomingPacket(const uint8_t* payload, argument
H A Dneteq_impl.cc87 current_rtp_payload_type_(0xFF), // Invalid RTP payload type.
88 current_cng_rtp_payload_type_(0xFF), // Invalid RTP payload type.
118 const uint8_t* payload,
127 int error = InsertPacketInternal(rtp_header, payload, length_bytes,
397 const uint8_t* payload,
401 if (!payload) {
402 LOG_F(LS_ERROR) << "payload == NULL";
410 LOG_F(LS_ERROR) << "Sync-packet with an unacceptable payload type "
441 packet->payload = new uint8_t[packet->payload_length];
443 if (!packet->payload) {
117 InsertPacket(const WebRtcRTPHeader& rtp_header, const uint8_t* payload, int length_bytes, uint32_t receive_timestamp) argument
396 InsertPacketInternal(const WebRtcRTPHeader& rtp_header, const uint8_t* payload, int length_bytes, uint32_t receive_timestamp, bool is_sync_packet) argument
[all...]
/external/dhcpcd/
H A Dbpf.c168 const unsigned char *payload; local
196 payload = iface->buffer + packet.bh_hdrlen + ETHER_HDR_LEN;
200 memcpy(data, payload, bytes);
/external/libnfc-nxp/src/
H A DphHciNfc_AdminMgmt.c743 /* hcp_message->payload[i++] = p_pipe_info->pipe.source.host_id; */
744 hcp_message->payload[i++] = p_pipe_info->pipe.source.gate_id;
745 hcp_message->payload[i++] = p_pipe_info->pipe.dest.host_id;
746 hcp_message->payload[i++] = p_pipe_info->pipe.dest.gate_id;
773 hcp_message->payload[i++] = pipe_id ;
892 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET];
997 pipe_id = hcp_message->payload[RESPONSE_PIPEID_OFFSET];
1005 hcp_message->payload[index++];
1008 hcp_message->payload[index++];
1011 hcp_message->payload[inde
[all...]
/external/tcpdump/
H A Dprint-atm.c359 u_int8_t cell_type, func_type, payload, clp; local
373 payload = (cell_header>>1)&0x7;
376 printf("%s, vpi %u, vci %u, payload [ %s ], clp %u, length %u",
379 tok2str(atm_pty_values, "Unknown", payload),
/external/android-clat/
H A Dclatd_test.cpp202 void *payload; local
215 payload = ip + 1;
234 payload = frag + 1;
240 // Since there are no extension headers except Fragment, this must be the payload.
242 payload = ip6 + 1;
257 // If we understand the payload, verify the checksum.
264 checksum = ip_checksum_finish(ip_checksum_add(pseudo_checksum, payload, payload_length));
267 checksum = ip_checksum(payload, payload_length);
277 struct udphdr *udp = (struct udphdr *) payload;
346 // Copy the payload
525 const void *payload; local
815 uint8_t payload[] = { PAYLOAD }; local
[all...]
/external/chromium_org/components/nacl/loader/nonsfi/
H A Dnonsfi_sandbox_unittest.cc145 std::string payload("foo");
146 iov.iov_base = &payload[0];
147 iov.iov_len = payload.size();
151 BPF_ASSERT_EQ(static_cast<int>(payload.size()),
153 BPF_ASSERT_EQ(static_cast<int>(payload.size()),
/external/chromium_org/sync/internal_api/
H A Dhttp_bridge_unittest.cc217 std::string payload = "this should be echoed back"; local
221 payload.length() + 1, payload.c_str());
229 EXPECT_EQ(payload.length() + 1,
231 EXPECT_EQ(payload, std::string(http_bridge->GetResponseContent()));
/external/chromium_org/third_party/WebKit/Source/modules/websockets/
H A DMainThreadWebSocketChannel.cpp576 // All control frames must have a payload of 125 bytes or less, which means the frame must not contain
577 // the "extended payload length" field.
579 failAsError("Received control frame having too long payload: " + String::number(frame.payloadLength) + " bytes");
590 InspectorInstrumentation::didReceiveWebSocketFrame(m_document, m_identifier, frame.opCode, frame.masked, frame.payload, frame.payloadLength);
599 m_continuousFrameData.append(frame.payload, frame.payloadLength);
630 message = String::fromUTF8(frame.payload, frame.payloadLength);
642 m_continuousFrameData.append(frame.payload, frame.payloadLength);
650 memcpy(binaryData->data(), frame.payload, frame.payloadLength);
657 m_continuousFrameData.append(frame.payload, frame.payloadLength);
670 unsigned char highByte = static_cast<unsigned char>(frame.payload[
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_eke.c225 const u8 *payload,
247 pos = payload;
248 end = payload + payload_len;
358 const u8 *payload,
385 pos = payload;
386 end = payload + payload_len;
502 const u8 *payload,
522 pos = payload;
523 end = payload + payload_len;
628 const u8 *payload,
222 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
499 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
625 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_eke.c422 const u8 *payload, size_t payloadlen)
434 pos = payload;
435 end = payload + payloadlen;
438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload");
518 const u8 *payload, size_t payloadlen)
530 pos = payload;
531 end = payload + payloadlen;
591 const u8 *payload, size_t payloadlen)
613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len,
638 if (os_memcmp_const(auth_p, payload
419 eap_eke_process_identity(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
515 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
588 eap_eke_process_confirm(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
662 eap_eke_process_failure(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_eke.c225 const u8 *payload,
247 pos = payload;
248 end = payload + payload_len;
358 const u8 *payload,
385 pos = payload;
386 end = payload + payload_len;
502 const u8 *payload,
522 pos = payload;
523 end = payload + payload_len;
628 const u8 *payload,
222 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
499 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
625 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_eke.c422 const u8 *payload, size_t payloadlen)
434 pos = payload;
435 end = payload + payloadlen;
438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload");
518 const u8 *payload, size_t payloadlen)
530 pos = payload;
531 end = payload + payloadlen;
591 const u8 *payload, size_t payloadlen)
613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len,
638 if (os_memcmp_const(auth_p, payload
419 eap_eke_process_identity(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
515 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
588 eap_eke_process_confirm(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
662 eap_eke_process_failure(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_eke.c225 const u8 *payload,
247 pos = payload;
248 end = payload + payload_len;
358 const u8 *payload,
385 pos = payload;
386 end = payload + payload_len;
502 const u8 *payload,
522 pos = payload;
523 end = payload + payload_len;
628 const u8 *payload,
222 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
499 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
625 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_eke.c422 const u8 *payload, size_t payloadlen)
434 pos = payload;
435 end = payload + payloadlen;
438 wpa_printf(MSG_INFO, "EAP-EKE: Too short EAP-EKE-ID payload");
518 const u8 *payload, size_t payloadlen)
530 pos = payload;
531 end = payload + payloadlen;
591 const u8 *payload, size_t payloadlen)
613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len,
638 if (os_memcmp_const(auth_p, payload
419 eap_eke_process_identity(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
515 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
588 eap_eke_process_confirm(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
662 eap_eke_process_failure(struct eap_sm *sm, struct eap_eke_data *data, const struct wpabuf *respData, const u8 *payload, size_t payloadlen) argument
[all...]
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/
H A DResourceTreeModel.js486 * @param {!PageAgent.Frame=} payload
488 WebInspector.ResourceTreeFrame = function(model, parentFrame, frameId, payload)
495 if (payload) {
496 this._loaderId = payload.loaderId;
497 this._name = payload.name;
498 this._url = payload.url;
499 this._securityOrigin = payload.securityOrigin;
500 this._mimeType = payload.mimeType;
/external/openssl/ssl/
H A Dd1_both.c1484 unsigned int payload; local
1492 /* Read type and payload length first */
1499 n2s(p, payload);
1500 if (1 + 2 + payload + 16 > s->s3->rrec.length)
1509 payload + padding;
1516 * message type, plus 2 bytes payload length, plus
1517 * payload, plus padding
1522 /* Enter response type, length and copy payload */
1524 s2n(payload, bp);
1525 memcpy(bp, pl, payload);
1567 unsigned int payload = 18; /* Sequence number + random bytes */ local
[all...]

Completed in 737 milliseconds

<<11121314151617181920>>